How to detect the unauthorized disabling of Veeam four-eyes authorization

What is four-eyes authorization in Veeam solutions?

Four-eyes authorization is a crucial security governance feature that mandates that any high-impact administrative action within the Veeam Backup & Replication console, such as deleting repositories, modifying job configurations, or altering global security settings, must be initiated by one administrator and then approved by a second, independent administrator. Its significance lies in enforcing the organizational change control policy, ensuring that no single compromised credential can lead to catastrophic data destruction or recovery sabotage.

Category:

  • External threat

MITRE ATT&CK® mapping

  • TA0004 | Privilege escalation
  • TA0005 | Defense evasion

Scenario

A security operations team detected that a highly protected Veeam backup repository had been deleted during non-working hours. Backtracking through the incident, the security analyst traced the event to a privileged service account login and discovered the attacker's initial defense evasion move. Veeam four-eyes authorization had been disabled exactly 15 minutes prior. This critical early warning was missed, granting the adversary the friction-free access needed to subsequently modify global VM exclusions and delete critical job configurations before attempting the repository deletion.

Scenario infographic:

Screenshot

What went wrong?

  • The core security control was defeated: The attacker successfully disabled four-eyes authorization, defeating the core security principle requiring two distinct credentials for sensitive changes.
  • The critical early warning was missed: The security team received no alert when Veeam four-eyes authorization was disabled.

How a SIEM solution helps detect this attack

  • Detects control tampering early by monitoring configuration-level events, such as the disablement of four-eyes authorization, and generating real-time alerts before destructive actions occur
  • Surfaces suspicious context around normal events by correlating routine configuration changes (such as the disablement of four-eyes authorization) with anomalous conditions (like non-business hours, atypical geographic access, and unusual IP addresses)
  • Reconstructs the attack chain by stitching together authentication logs, Veeam solution audit events, and high-risk configuration modifications onto a clear timeline for rapid validation

How to detect the disabling of Veeam four-eyes authorization with Log360

Prerequisites

  • Go to the ManageEngine Marketplace.
  • Under Log360, select Veeam for Log360 and install the extension.
  • Follow the steps provided here to ensure that Veeam solution logs are properly ingested and visible within the Log360 console.

Detecting with Log360

  • Enable the Veeam Four Eyes Authorization Disabled alert under Alerts > Manage Alert Profiles.

    Screenshot

  • Open the alert details to review the timestamp, initiating account, source host, and specific Veeam solution action performed.

    Screenshot

  • Click Zia Insights from the alert to obtain recommended remediation steps and contextual guidance.
  • Access the Veeam Four Eyes Authorization Report and filter the entries by the identified user to view all related actions taken within the environment.

    Screenshot

  • Correlate these events with authentication logs, privileged access logs, and configuration change records to build a clear activity timeline.

Next steps

  • Initiate an immediate incident investigation by validating the authenticity of the account that disabled four-eyes authorization and reviewing all subsequent Veeam solution configuration, job, and repository actions performed by that identity.
  • Contain the threat by temporarily disabling or resetting the implicated account, revoking active sessions, and isolating any host used during the suspicious login.