Hi David,
Thank you for responding. I was talking about going through all of the steps in the Compliance and Security check that is built into VBR. For example, I don't want to enable MFA if that will break the connection between VRO and VBR.
I guess I'm wondering how much configuration I need to do with the embedded versions of VBR and Veeam One. Is it best practice to leave them alone and let Orchestrator use them as necessary? Also, if I want to use Veeam One, should I put a second instance on its own server?
Thanks again for helping me with my noob questions.
Thank you for responding. I was talking about going through all of the steps in the Compliance and Security check that is built into VBR. For example, I don't want to enable MFA if that will break the connection between VRO and VBR.
I guess I'm wondering how much configuration I need to do with the embedded versions of VBR and Veeam One. Is it best practice to leave them alone and let Orchestrator use them as necessary? Also, if I want to use Veeam One, should I put a second instance on its own server?
Thanks again for helping me with my noob questions.
Statistics: Posted by stryker54141 — Mar 31, 2025 7:56 pm







