So I think some of the confusion has come from reading this https://bp.veeam.com/security/Design-an ... ts-removal and then assuming that it is a Veeam recommendation conflicting with another Veeam direction (from support or wherever), but as I recall (and someone at Veeam can correct me if this wrong) the guidelines at https://bp.veeam.com/security (despite being hosted on Veeam's website) are actually NOT written or verified by Veeam. As indicated in the footer at the bottom of every page:
So perhaps the guidelines there are simply inaccurate, although I tend to agree with the idea of "as little unnecessary software as possible to minimize attack footprint, maintenance, etc..." it would seem to actually be AGAINST Veeam's guidelines to remove unused components.Please note that information provided in this guide is not produced or verified by Veeam R&D but is a result of community effort based on the field observations.
Statistics: Posted by BackupBytesTim — Mar 26, 2025 3:42 pm






