Author name: Managecast Technologies

Office 365 Backup, Veeam

Veeam for Microsoft 365 “Item may have a virus reported by the virus scanner plug-in” warning

If your Microsoft 365 backup job report or job log shows a warning like this: a file in your OneDrive, SharePoint Online, or Microsoft Teams data has been flagged by Microsoft’s malware scanning. When our backup service attempts to read the file through Microsoft 365 APIs, that download is blocked by SharePoint Online’s malware protection. The file cannot be backed up until the Microsoft-side malware status is resolved. Every other item in that location processes normally. The supported workflow comes directly from Microsoft. The full Microsoft article is here: Resolve false positive malware detections. The summary below covers the practical steps. Step 1: Investigate before assuming it’s a false positive Look at the file path in the warning before doing anything else. Many of these detections are accurate. Categories that are commonly legitimate detections: If the file looks suspicious based on path, owner, or filename, the right action is to delete it from the tenant. If you want to verify, scan a copy with your endpoint antivirus or submit it to VirusTotal for a multi-engine check before deciding. Only proceed to submission if you are confident the file is clean. Step 2: Identify the engine that flagged the file Microsoft documents four methods. Pick the one that fits your access and what you need to find. Step 3: Submit the file to Microsoft Download the file from the Quarantine Files tab if available, or use Get-SPOMalwareFileContent from SharePoint Online PowerShell. Treat the file as malicious until you have confirmed otherwise. Both submission paths below live under Email & collaboration > Submissions in the Defender portal, but use different tabs depending on which engine flagged the file: Note that both the Quarantine page (Step 2) and the Submissions page (Step 3) have a tab named “Files.” They are different pages with different purposes: Quarantine shows files already flagged in your tenant; Submissions is where you send files to Microsoft for review. Step 4: Wait for Microsoft to verify Submission is the realistic path for most cases. Once Microsoft processes the submission and either updates their definitions or adds an allow entry on the Tenant Allow/Block List, the file becomes accessible again. The next backup run picks it up automatically and the warning clears. Turnaround time is at Microsoft’s discretion. If the file appears in the Defender Quarantine Files tab, an admin may also be able to release it from quarantine within 30 days using the Release file action. Note that the Defender Quarantine for files primarily holds files quarantined by Safe Attachments in tenants with Defender for Office 365 Plan 1 or Plan 2. Files flagged by Microsoft 365’s built-in signature scanning are typically blocked in place rather than placed in the Defender Quarantine, so the Release action often does not apply. Where it does apply, releasing is a separate action from submitting; releasing unblocks the current file but does not by itself correct the detection for future scans. Submit the file as in Step 3 if you want the detection reviewed and corrected. For files that remain blocked longer than 30 days, contact Microsoft Support with the file path, the Get-SPOMalwareFile output, and your evidence that the file is safe. What is not possible The base Microsoft 365 virus scanning that flags files in SharePoint, OneDrive, and Teams is not something a backup service can bypass. Defender for Office 365 Safe Attachments is an additional layer that may be configurable by the tenant, but disabling or changing that setting is a tenant security decision and does not give a backup application permission to ignore a Microsoft malware block. The base engine cannot be disabled at the tenant level, cannot be excluded by file, library, site, user, or extension, and cannot be bypassed by any application permission. We confirmed this directly with Microsoft Support. Per-file submission and review through the Defender portal is the only supported path.

General Cloud Backup

World Backup Day 2026: From Data Backup to Recovery Readiness

March 31 is World Backup Day. While it serves as a global reminder, a single day is not enough to secure a modern enterprise. For 2026, the conversation has shifted. It is no longer about whether you have a backup. It is about how fast and reliably you can recover when production stops. This guide serves as a comprehensive look at the architecture, risks, and requirements of modern data protection. The Evolution of the Threat Landscape In previous years, backups were primarily a defense against hardware failure or accidental deletion. Today, the primary threat is targeted data sabotage. Ransomware developers now write code specifically designed to locate, encrypt, or delete backup files before the main attack begins. If your recovery strategy has not evolved since 2023, your organization is likely carrying more risk than you realize. 1. The Critical Role of Immutability The most significant advancement in data protection is the transition to immutable storage. Immutability creates a digital lock on your data for a specified period. During that window, no one—not even an administrator with full credentials—can modify or delete the files. This is the only guaranteed defense against wiper attacks. When planning your March audit, verify that your primary and secondary repositories both support S3 Object Locking or a similar immutable standard. 2. Solving the Shared Responsibility Myth There is a persistent belief that moving to the cloud removes the need for backups. This is a dangerous misunderstanding of the Shared Responsibility Model used by Microsoft, Google, and Amazon. Cloud providers are responsible for the cloud itself. They ensure the data centers are powered and the software is available. You are responsible for the data in the cloud. If a user accidentally purges a folder or a malicious actor syncs encrypted files to the cloud, the provider generally cannot recover that data beyond a very short retention window. A dedicated third party backup for SaaS workloads is a requirement, not an option. 3. The Economic Reality: Cost of Downtime vs. Cost of Backup Many organizations view backup as a pure expense until they face an outage. To align your strategy with business risk, you must calculate your cost of downtime. Consider the following factors: When these numbers are documented, the investment in faster recovery hardware or immutable cloud storage becomes a clear business decision rather than a technical luxury. 4. Why Restore Testing is Non-Negotiable A backup job that reports success only means the data was transferred. It does not account for corrupted databases, missing encryption keys, or broken application dependencies. Verified restore testing should be performed at least annually. These tests should simulate a worst case scenario where the local office and local servers are unavailable. Ask yourself these questions: Testing provides the data needed to turn guesses into guaranteed recovery timelines. 5. Cyber Insurance and Compliance Requirements In 2026, cyber insurance providers have become much stricter. Most carriers now require proof of multi-factor authentication (MFA) on backup consoles and evidence of offsite, immutable copies. Without these controls, organizations may face higher premiums or a total denial of coverage after an incident. Aligning your backup architecture with insurance requirements is now a fundamental part of risk management. 6. Defining RPO and RTO for the Modern Office Your strategy must be built around two key metrics: Bridging the Gap: From Strategy to Execution Understanding these concepts is the first step toward resilience, but a strategy only has value if it is applied to your specific environment. It is common for there to be a disconnect between high level goals and daily configurations. To help you move from theory to practice, use this detailed audit to evaluate your current posture. The 2026 Resilience Audit Category 1: Architectural Integrity Category 2: Governance and Documentation Category 3: Validation and Performance Conclusion: Preparedness Over Presence World Backup Day is an opportunity to move from a set it and forget it mindset to a proactive stance on resilience. Ensure your recovery strategy is validated and your data is immutable before the calendar turns. Schedule your 2026 Resilience Audit with our team today and move from “having backups” to “being ready.” https://meetings.hubspot.com/ngolden

General Cloud Backup, Troubleshooting, Veeam

Troubleshooting NFC connectivity in Veeam Backup & Replication 

VMware backup or replication jobs may fail with errors such as “Failed to create NFC download stream” or “Failed to create NFC upload stream.” These messages indicate that the backup proxy was unable to open an NFC (Network File Copy) connection to the ESXi host in order to transfer VM disk data.  Cause  NFC stream creation failures most commonly fall into one of these categories:  Steps to resolve  DNS / name resolution  TCP/902 (NFC)  VMware permissions  Granular Permissions Guide  VMware file locks  Veeam KB: https://www.veeam.com/kb1198  If you need help reviewing logs, validating connectivity, or confirming the root cause, contact our support team at support@managecast.com. 

Troubleshooting, Veeam

Understanding “Completing Backup Copy Interval for GFS Full Creation” Warnings – Veeam Backup & Replication

The warning “Completing backup copy interval for GFS full creation” appears at the end of a backup copy interval when Veeam needs to “seal” that cycle by creating the GFS full (weekly, monthly, or yearly) restore point. It’s informational—Veeam wraps up the current copy cycle and then either synthesizes a full on the target or performs an active full, depending on your GFS method. Why It Happens GFS schedule hit: The day/time for a weekly, monthly, or yearly point has arrived, so Veeam finishes the running copy cycle and creates the archive full.Full type matters: When to Take Action Most of the time, no action is needed. If you’re seeing long runs or warnings piling up, check the following: It’s Veeam saying, “I’m ending this copy cycle now so I can make the scheduled GFS full.” It’s normal. Only make adjustments if it’s colliding with your backup windows or impacting duration—adjust the copy interval or schedule, align GFS dates, and choose Active Full for GFS on dedupe targets. For more information, please contact us at Support@Managecast.com.

General Cloud Backup, Office 365 Backup, Troubleshooting, Veeam

Veeam for Microsoft 365 Error: Exchange Account Was Not Found

The “Exchange account was not found” error in Veeam Backup for Microsoft 365 occurs when Veeam attempts to process an Exchange Online mailbox that it cannot locate in Microsoft 365. This can happen during backup or restore operations and is typically caused by missing mailboxes, deleted users, or permission mismatches. Common Causes and Resolutions Cause 1: The Account Does Not Have a Mailbox Assigned Veeam can only protect users that have an active mailbox in Exchange Online. If a user account exists in Microsoft 365 but no mailbox is provisioned, Veeam will display this error. Resolution: Cause 2: The Account Was Deleted or No Longer Exists If the user has been deleted or offboarded from Microsoft 365, Veeam will still attempt to process the object if it remains referenced in the backup job. Resolution: Cause 3: Permissions or Access Have Changed If the organization’s Exchange Online permissions were modified, Veeam may no longer have sufficient rights to access specific mailboxes. Resolution: Additional Notes If you continue to experience this error or need assistance verifying mailbox permissions, please contact Support@Managecast.com.

Troubleshooting, Veeam

Veeam Backup & Replication Warning: RPO Violation

In recent versions of Veeam Backup & Replication, the RPO Monitoring feature tracks how frequently restore points are created for each backup job. RPO (Recovery Point Objective) defines how much data loss your organization can tolerate between backups—essentially, how often backups must occur to meet your protection goals. If RPO Monitoring is enabled and a job does not create a new restore point within the configured timeframe, Veeam will generate an RPO violation warning in the job session or in the RPO Monitoring dashboard. Common Causes and Resolutions Cause 1: Backup Jobs Are Overlapping or Delayed When multiple jobs are scheduled to run at the same time or share repository resources, one or more may enter a “waiting” state and exceed the RPO window. Resolution: Cause 2: Job Size or Duration Exceeds the RPO Window Large jobs that take longer to complete than the defined RPO interval will consistently trigger RPO warnings. Resolution: Cause 3: RPO Target Too Strict Your defined RPO value may be unrealistic for the current backup window, job load, or infrastructure performance. Resolution: Additional Notes If you continue to experience RPO violation warnings or would like help analyzing job duration and scheduling, please contact Support@Managecast.com for assistance.

General Cloud Backup, Troubleshooting, Veeam

Veeam Backup & Replication Error: File Being Used by Another Process

The error “The process cannot access the file because it is being used by another process” is a common issue in Veeam Backup & Replication environments. It occurs when Veeam attempts to read or write to a backup file that is temporarily locked by another process. These conflicts are often caused by scheduling overlaps, slow storage performance, or antivirus activity scanning the backup files. Common Causes and Resolutions Cause 1: Scheduling Conflicts Overlapping backup, copy, or replication jobs can attempt to access the same backup files simultaneously, resulting in file lock conflicts. Resolutions: Cause 2: Network or Storage Performance Issues When data transfer to or from the repository is slower than expected, a job may still be writing to a file when another process tries to open it. Resolutions: Cause 3: Antivirus or Third-Party Software Locking Files Antivirus, endpoint protection, or indexing software may temporarily lock Veeam’s backup files (.vbk, .vib, .vrb) during real-time scans. Resolutions: Additional Troubleshooting If the issue persists: Preventive Recommendations If you continue to experience this error, or would like assistance with scheduling optimization or repository performance tuning, please contact Support@Managecast.com.

General Cloud Backup, Troubleshooting, Veeam

Veeam Backup & Replication Error: Failed to Open Storage for Read/Write Access / File Does Not Exist

When a backup job fails with the errors “Failed to open storage for read/write access” or “File does not exist,” it typically indicates that Veeam was unable to access or write to the backup repository. These issues are often caused by connectivity problems, permission misconfigurations, insufficient storage, or file locks that prevent normal access. Common Causes and Resolutions Cause 1: Repository or Storage Connectivity Issues If Veeam cannot reach or communicate properly with the repository, it will fail to open the backup file for read/write operations. Resolutions: Cause 2: Insufficient Free Space When the repository runs out of space, Veeam cannot write incremental or full backup data, often producing the same error message. Resolutions: Cause 3: Permissions or Ownership Issues If the credentials Veeam uses do not have sufficient rights on the repository, the job may fail to open or write to the storage file. Resolution: Cause 4: File Locks or Interference from Other Software Antivirus, backup agents, or volume snapshot tools may lock Veeam backup files (.vbk, .vib, .vrb), preventing read/write operations. Resolutions: Advanced Troubleshooting If the above resolutions do not resolve the issue: Preventive Recommendations If you continue to experience errors after performing these steps, please contact Support@Managecast.com for assistance.

General Cloud Backup

Veeam for Microsoft 365 Error: Failed to Resolve Personal Site Owner

The “Failed to resolve personal site owner” error in Veeam Backup for Microsoft 365 occurs when Veeam cannot validate or identify the owner of a Microsoft 365 personal site (OneDrive/SharePoint). This typically happens when a personal site is included in a backup job—often through an organizational or group selection—but the associated user account cannot be resolved. Common Causes Resolutions Resolution 1: Verify or Reassign the Personal Site Owner In SharePoint Admin Center, confirm that the personal site has a valid owner: Resolution 2: Create a Dedicated Job for the Personal Site If the personal site cannot be resolved but still needs to be backed up: Resolution 3: Exclude the Personal Site from the Job If the personal site data is not required for backup: Additional Notes If you continue to experience issues, need help reviewing personal site ownership, or have further questions, please contact Support@Managecast.com for assistance.

Scroll to Top