📖
Blocky for Veeam® Administration Guide
Return to BlockyFAQPricingContact
  • Blocky for Veeam® Administration Guide
    • Chapter 1: Product Information
      • 1.1 Overview
      • 1.2 Key Features
      • 1.3 Restrictions
      • 1.4 Deduplication
    • Chapter 2: Password Protection
    • Chapter 3: Installation
      • 3.1 Installing
      • 3.1.1 Launch the Installation
      • 3.1.2 License Agreement
      • 3.1.3 Select the installation path and additional tasks
      • 3.1.4 Select Components
      • 3.1.5 Start the Installation
      • 3.1.6 Completing the Installation
      • 3.2 Updating
      • 3.3 Upgrading from Version 2.5 and earlier
      • 3.3 Uninstallation
    • Chapter 4: Configuration
      • 4.1 Start the GUI
      • 4.2 Set initial password
      • 4.3 Change password
      • 4.4. Access Control
      • 4.5 Whitelisted Applications
      • 4.5.1 Automatically whitelist applications
      • 4.5.2 Manually whitelist applications
      • 4.5.3 Whitelist via request table
      • 4.5.4 Invalid whitelist entry
      • 4.6 Notifications
      • 4.7 SMTP Server Configuration
      • 4.8 Save / Load Configuration
      • 4.9 Central GUI Mode
      • 4.10 Add Server
      • 4.11 Server selection
      • 4.12 Define a new Group
      • 4.13 Master Configuration
      • 4.14 Lisencing
      • 4.14.1 Initial Licensing
      • 4.14.2 Install License
      • 4.14.3 License upate and renewal
    • Chapter 5: Monitoring
      • 5.1 Request Table
      • 5.2 Status Information
      • 5.3 Access Log
      • 5.4 License Information
      • 5.5 Alert Notifications
      • 5.6 Windows even logs
      • 5.7 Raw volume access
    • Chapter 6: Diagnostics
      • 6.1 Service Report
      • 6.2 Missing privileges
      • 6.3 System clock tampering
    • Appx A: Setup command line parameters
    • Appx B: BlockyCLI parameters
    • Appx C: BlockyforVeeam® Change Log
    • Open Source Licenses
Powered by GitBook
On this page
  • Chapter 5: Monitoring
  • 5.1 Request Table
  • 5.2 Status Information
  • 5.3 Access Log
  • 5.4 License Information
  • 5.5 Alert Notifications
  • 5.6 Windows event logs
  • 5.7 Raw volume access
  1. Blocky for Veeam® Administration Guide

Chapter 5: Monitoring

PreviousChapter 4: ConfigurationNextChapter 6: Diagnostics

Last updated 1 year ago

Chapter 5: Monitoring

5.1 Request Table

If the GUI is running and a non-whitelisted program attempts a file modification, the request will be displayed in the request table, and an administrator may control the file access. If a request isn't answered within 1 minute, access is denied automatically. Access can be manually set by clicking the "Set Access" drop-down list in the Access column and choosing an access option.

The following options are available:

  • GRANT – Allows the running process to modify the specified file object

  • DENY – Denies the running process from modifying the specified file object

  • AUTHORIZE PID – Write access is granted to all files for the specified process until its termination (NT kernel and system processes are excluded.)

  • WHITELIST PROGRAM – The whitelisted program is permanently allowed to modify existing files.

5.2 Status Information

An overall status is shown in the “Monitoring” window in the tab "Status."

5.3 Access Log

BlockyforVeeam® logs all modification requests and responses on protected files to the file C:ProgramDataGrauDataBlockyAccessControl.log. The content of the log file is also displayed in the “Monitoring” window in the "Logging" tab.

5.4 License Information

To show the license status select the tab "License Info" from the “Monitoring” window.

5.5 Alert Notifications

To check for notifications select the tab “Notifications” from the “Monitoring” window.

5.6 Windows event logs

Further status information is available in the Windows application and system event logs.

5.7 Raw volume access

Some Windows System Services may perform raw volume access on certain volumes, for example, Windows components svchost.exe, vssvc.exe, or vds.exe. On Blocky- protected volumes, some of these raw volume accesses are handled by Blocky and will be denied as these components are usually not whitelisted. This results in unauthorized access event or, if the GUI is running, the raw volume access is displayed in the request table. See below for a notification example.

The components svchost.exe and fsdmhost.exe must be whitelisted when using NTFS Deduplication. When using Shadow Copy, either manually or via scheduling, you have to whitelist the components svchost.exe and vssvc.exe. occurred 2 times. (threshold settings: Count: 1 / TimeInterval:0 min)

additional information:

PID: 1724, App: C:\Windows\System32\vds.exe, File: \Device\HarddiskVolume3, User: NT AUTHORITY\SYSTEM

PID: 1724, App: C:\Windows\System32\vds.exe, File: \Device\HarddiskVolume3, User: NT AUTHORITY\SYSTEM