Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
menu
Home
Design
Hardening
Segmentation
Attack surface reduction
Workgroup or Domain ?
Repository Specifics
Roles and Users
Secure by design
Placement
3-2-1 Rule
Sizing
Proxy Server
Disk Repository
Object Storage
Configuration Maximums
Networking
Job Design
Protect VB365
Build & Configure
Physical Security
Management Server
Proxy
Authentication
Repository
Object Storage
Disk Repository
Operate
Organization Config
Auditing
M365 Throttling
Common Issues
Supplemental
Data flows
Exchange
Networking
Security
About
Veeam Help Center
Privacy
Use Cases
This section describes typical use cases encountered in the field and how to handle them.