Authentication protocols
Choose strong encryption algorithms for SSH. To communicate with Linux servers deployed as part of the backup infrastructure, Veeam Backup & Replication uses SSH. Make sure that for the SSH tunnel you use a strong and proven encryption algorithm, with sufficient key length. Ensure that private keys are kept in a highly secure place and cannot be uncovered by a 3rd party.
Since Veeam Backup & Replication v12, a kerberos-only architecture is possible so disable NTLM authentication whenever it’s possible.