#1 Global Leader in Data Resilience

Sensitive data types in Veeam Backup & Replication and Veeam Backup for Microsoft 365 log files

KB ID: 2462
Product: Veeam Backup & Replication
Veeam Backup for Microsoft 365
Veeam Cloud Connect
Version: All
Published: 2018-03-20
Last Modified: 2022-04-21
Languages: FR
mailbox
Get weekly article updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

error icon

Oops! Something went wrong.

Please, try again later.

Challenge

When you open a support ticket, Veeam Customer Support specialists may request log files. These log files may contain information to which the terms of the data protection laws or internal company policies apply.

Veeam Backup & Replication

Veeam Backup & Replication log files may include the following types of sensitive data: 

  • User names.
  • Object names that are specific for a customer infrastructure, such as hosts, datastores, VMs, clusters.
  • VM file names and paths.
  • FQDN/Hostname or NetBIOS names.
  • IP addresses (IPv4 and IPv6).
  • Customer-specific paths to backup files.
  • Names of backup files.
  • SharePoint information, such as database names, paths to databases, SharePoint site URL.
  • Exchange information, such as database names, paths to databases.
  • SQL information, such as database and instance name, paths to databases.
  • Oracle information, such as database name, home name, Oracle SID, database global name, paths to databases.
  • File copy information, such as customer-specific paths and names of files.
  • File to tape information, such as customer-specific paths and names of files.

Veeam Backup for Microsoft 365

Veeam Backup for Microsoft 365 log files may include the following types of sensitive data:

  • User names and user IDs.
  • Object names that are specific for a customer infrastructure, such as hosts and their hardware configuration, local data storage, and object storage repository.
  • FQDN/Hostname or NetBIOS names.
  • IP addresses (IPv4 and IPv6).
  • Customer-specific paths to backup files.
  • Path to the Veeam license file and license information.
  • Certificate thumbprints.
  • Azure AD application name, ID, and assigned permissions.
  • Assigned Microsoft Office 365 roles.
  • SharePoint and OneDrive information, such as SharePoint IDs, SharePoint site URLs, SharePoint hierarchy, names of files, names of SharePoint lists, site collection membership, information about existing sharing links, and SharePoint settings.
  • Exchange information, such as addresses of user mailboxes, mailbox IDs, mailboxes hierarchy, subjects of the Exchange items (for example, Email, Calendars, Meetings), and their modification date.
  • Groups information: such as group membership, group mailbox address, and group owner address.
  • Teams information, such as teams names, channels names, names of backup files, members of a team and their roles, channel settings. 
  • Exported data information, such as customer-specific paths and names of files.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Spelling error in text

This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply except as noted in our Privacy Policy.
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

Oops! Something went wrong.

Please, try again later.

You have selected too large block!

Please try select less.

KB Feedback/Suggestion

This form is only for KB Feedback/Suggestions, if you need help with the software open a support case

By submitting, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply except as noted in our Privacy Policy.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

error icon

Oops! Something went wrong.

Please, try again later.