Skip to content

NextronSystems/veeam-integration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Integration of THOR into Veeam Backup & Replication

This guide explains how to integrate the Nextron THOR forensic scanner into Veeam Backup & Replication in order to scan restore points for attacker artefacts and anomalies.

Prerequisites

  • Veeam Backup & Replication installed
  • THOR scanner with valid license file (Lab License required for full functionality)

Step 1 – Place THOR

Extract the THOR scanner into the following directory:

C:\Program Files\THOR

Make sure the license file is located in the same directory.

THOR Directory

Step 2 – Adjust Veeam Mount Services

Navigate to:

C:\Program Files\Common Files\Veeam\Backup and Replication\Mount Service

Open the file:

AntivirusInfos.xml

Edit the listing of the antivirus software and add the following entry for THOR.

Veeam Mount Service Directory

See Veeam's official documentation for more information on this file.

Depending on your use case, you can choose between two configurations:

Option A – Intensive Scan (for Incident Response)

This configuration is designed for maximum coverage and speed, for example when verifying backups during an active incident response.

  • Uses almost all CPU cores (--threads -2, leaves 2 free)
  • Scans all files without limitation
  • Ignores memory pressure (--norescontrol), does not stop when free RAM is low
<Antiviruses>
...
    <!-- THOR Scanner (Intensive) -->
    <AntivirusInfo Name='THOR Scanner' IsPortableSoftware='true' ExecutableFilePath='%ProgramFiles%\Thor\thor64.exe' CommandLineParameters='-a Filescan --intense --threads -2 --norescontrol --cross-platform --follow-symlinks --nothordb -e %ProgramFiles%\Thor -p %Path%' RegPath='' ServiceName='' ThreatExistsRegEx='ALERTS:\s*[1-9]\d*|WARNINGS:\s*[1-9]\d*' IsParallelScanAvailable='false'>
        <ExitCodes>
            <ExitCode Type='Success' Description='Command executed successfully'>0</ExitCode>
            <ExitCode Type='Infected' Description='A threat was detected on the system'>1</ExitCode>
        </ExitCodes>
    </AntivirusInfo>
</Antiviruses>

Option B – Gentle Scan (for Preventive Scanning)

This configuration is optimized for continuous or scheduled preventive scans of backups, where system impact must be minimized.

  • Uses only one CPU thread
  • Respects system resources (resource control active, scan stops before memory swapping)
  • Scans only relevant file types (not every single file)
<Antiviruses>
...
    <!-- THOR Scanner (Gentle) -->
    <AntivirusInfo Name='THOR Scanner' IsPortableSoftware='true' ExecutableFilePath='%ProgramFiles%\Thor\thor64.exe' CommandLineParameters='-a Filescan --cross-platform --follow-symlinks --nothordb -e %ProgramFiles%\Thor -p %Path%' RegPath='' ServiceName='' ThreatExistsRegEx='ALERTS:\s*[1-9]\d*|WARNINGS:\s*[1-9]\d*' IsParallelScanAvailable='false'>
        <ExitCodes>
            <ExitCode Type='Success' Description='Command executed successfully'>0</ExitCode>
            <ExitCode Type='Infected' Description='A threat was detected on the system'>1</ExitCode>
        </ExitCodes>
    </AntivirusInfo>
</Antiviruses>

Recommendation:

  • Use Intensive Scan during incident response or when time-to-result matters most.
  • Use Gentle Scan for preventive, regular scanning of backups, where stability of the backup server is more important than scanning speed.

Step 3 – Change Veeam Configuration

In the Veeam Console:

  1. Go to Menu → Inventory → Settings (top left).
  2. Select the Signature Detection tab.
  3. Change the setting from
    Veeam Threat Hunter Recommended
    to
    Bring your own antivirus (Slower).
  4. Confirm with OK.

Veeam Settings

Step 4 – Start a Backup Scan

In the Veeam Console:

  1. Navigate to Home → Backups → Disks.
  2. Select the desired backup → right-click → Scan Backup.
  3. In the Scan Backup dialog, check:
    Scan Restore Points with Your Existing Antivirus Software.
  4. Confirm with OK.

Veeam will now pass the job to THOR.

Veeam Scan Backup

Step 5 – Monitor the Scan

  • Veeam hands off the job to THOR.
  • THOR scans the restore points for forensic artefacts.

Veeam Job Progress

Step 6 – Review the Findings

THOR scans the restore points for forensic artefacts.
After completion, the reports are written to the output directory as:

  • .txt (structured report)
  • .html (for comfortable viewing in the browser)

Result

With this integration, THOR complements existing antivirus integrations in Veeam by scanning backups for webshells, backdoors, obfuscated scripts, and other attacker artefacts.

About

Integration of THOR into Veeam Backup & Replication

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors