MFA and 4-Eyes Authorization for the Solo Admin

Veeam Security - Access Control

Four-Eyes Authorization exists to prevent a single compromised account from deleting your backups. Most teams skip it because it sounds like an enterprise feature that requires a dedicated security team. It does not. A solo admin can implement it today - the second approver can be a trusted external partner, a break-glass account, or even a gMSA. The threat model justifies the five minutes of setup.


The Threat Model You Are Defending Against

Ransomware operators do not just encrypt your production data. The playbook now includes credential theft, lateral movement to the backup server, and destruction of backup data before the encryption payload runs. If your Veeam administrator account is compromised and 4-Eyes is not enabled, an attacker with that credential set can delete every backup job, remove every repository, and wipe the configuration database before you know anything is wrong. Immutability helps - but only if your retention period is longer than the attacker's dwell time. Credential compromise is a different attack surface and deserves a separate control.

4-Eyes Authorization is that control. With it enabled, no single credential can complete a destructive operation in Veeam. A delete request is created, held in a pending queue, and cannot execute until a second account with Veeam Backup Administrator or Security Administrator rights approves it. An attacker with your primary admin credentials hits a wall. They can create the request, but they cannot approve their own request.

What 4-Eyes Protects

Once enabled, the following operations require a second approval before execution: deleting backup files or snapshots from disk or the configuration database, deleting information about unavailable backups, removing backup repositories and storage from the infrastructure, adding, updating, or deleting users or user groups, enabling or disabling MFA for all users, resetting MFA for a specific user, and enabling or disabling automatic logoff. Disabling 4-Eyes itself also requires a second approval - you cannot quietly turn it off either.

What 4-Eyes Does Not Protect

Veeam's documentation is explicit about this: 4-Eyes Authorization cannot protect the backup infrastructure if the Veeam Backup and Replication server itself is compromised at the OS level. If an attacker has local administrator access to the machine running VBR, they can create additional Windows users with local admin rights and use those accounts to approve their own requests. The protection is at the Veeam application layer, not the OS layer.

This is the strongest argument for running VBR on the VSA or on a hardened Linux appliance rather than a general-purpose Windows server - the OS-level bypass vector is significantly harder to exploit when there is no local Windows administrator surface to pivot through. If you are running VBR on Windows today, 4-Eyes is still worth enabling, but pair it with OS-level hardening and restrict local administrator access to the VBR machine itself.

The other constraint: with 4-Eyes enabled, destructive operations via PowerShell cmdlets, the REST API, and Veeam Backup Enterprise Manager are blocked entirely - those paths do not support the approval workflow. If your automation scripts use PowerShell to clean up old backups or remove repositories, those scripts will break. Audit your automation before enabling.

Check Your Automation First

4-Eyes Authorization blocks all delete operations performed via PowerShell cmdlets, REST API, and Veeam Backup Enterprise Manager. This includes automated backup lifecycle management scripts. Also flag: it blocks file overwriting in file copy jobs - including configuration backup jobs that write to the same filename. A registry modification is required to resolve the file copy job conflict. Audit both before you enable.

License Requirement

4-Eyes Authorization requires either Veeam Universal License (VUL) or the Enterprise Plus edition. It is not available on lower-tier socket licenses. If your environment runs VUL - which is the licensing model for v13 deployments - you already have access. Confirm your edition in the VBR console under Help > About before proceeding.

The Solo Admin Problem - and the Solutions

The feature requires at least two accounts with Veeam Backup Administrator or Security Administrator roles. For a team of one, that means creating a second account before you can enable it. You have several options, each with different security and operational trade-offs.

Recommended
Trusted External Partner
Your VAR, MSP, or a peer engineer at another organization holds a dedicated read-only-plus-approve account. They receive email notifications for pending approvals and can approve or reject via the console. Clean separation of duties - the approver has no operational access to run jobs or modify configurations.
Recommended
Break-Glass Account
A dedicated second account whose credentials are stored offline - printed and sealed in a physical envelope, or in an offline password manager not accessible from the backup network. Used only to approve requests. Credentials rotated on a defined schedule and after any use.
Acceptable
gMSA Account
A Group Managed Service Account assigned the Veeam Security Administrator role. The password is managed by Active Directory and never known to a human. Creates a real second identity that an attacker cannot easily impersonate without AD-level compromise. Note: MFA cannot be enabled on a gMSA - it is a non-interactive account and MFA is only supported on individual interactive user accounts.
Weak - Avoid
Second Local Account
A second local Windows account you own. Technically satisfies the requirement but provides no real separation - an attacker who has your primary credentials likely has access to the same machine and can find or create this account. Better than nothing, but not much better.

The External Partner Model in Practice

The external partner option is the strongest for a solo admin because it creates genuine separation of identity. The partner does not need Veeam operational access - they need only enough permissions to view pending approvals and approve or reject them. Assign them the Veeam Security Administrator role, which provides approval authority without the ability to configure jobs, modify repositories, or access backup data.

The workflow is simple. You initiate a deletion or repository removal. Veeam holds it in the pending queue. An email notification goes to the partner. They review the request, confirm with you out-of-band (a quick message or call), and approve it in the console. The operation executes. The entire interaction is logged in the Authorization Events node under the History view.

Set the approval window to a period that matches your operational tempo. The default is 7 days - requests not approved or rejected within that window are automatically rejected. For a small environment where deletions are infrequent, 7 days is fine. If you need faster turnaround, coordinate with your partner on expected response time. The minimum window is 1 day, maximum 30.

What the Partner Can See

A Veeam Security Administrator can view pending approval requests and the authorization event log. They cannot see backup data, run jobs, modify job configurations, access repositories directly, or make infrastructure changes. The role is scoped specifically to the approval function. Confirm this scope with your partner before assigning the role so expectations are set correctly.

Enabling 4-Eyes Authorization

1
Create and verify the second account
Add the second account to Veeam via Main Menu > Users and Roles. Assign it Veeam Backup Administrator or Veeam Security Administrator. Log in with that account and confirm it can access the console and view the pending approvals node before you enable the feature. If the account cannot log in, you will lock yourself out of the ability to approve your own future requests.
2
Configure email notifications
4-Eyes sends email notifications when a pending approval is created. Go to Main Menu > General Options > Email Notifications and verify the notification settings are configured and the second account's email address is in the recipient list. Without email notifications, the approver may not know a request is waiting.
3
Audit your automation
Before enabling, identify any PowerShell scripts, REST API calls, or Enterprise Manager tasks that perform delete operations or repository management. These will break. Either migrate them to manual console operations or document them as exceptions that require the approval workflow to be temporarily suspended.
4
Check file copy jobs
If you have file copy jobs that overwrite files - including configuration backup jobs writing to the same destination path - test them in a non-production window after enabling 4-Eyes. The known workaround for file copy job conflicts requires a registry modification. Have that documented before you need it.
5
Enable 4-Eyes Authorization
Main Menu > Users and Roles > Authorization tab. Check "Require additional approval for sensitive operations." Set your approval window. Click OK. The feature is now active - the next destructive operation will generate a pending approval request.
6
Test the workflow end to end
Initiate a test deletion of a non-critical backup file. Confirm the request appears in the pending queue. Confirm the second account receives the email notification. Approve the request with the second account. Confirm the operation executes and the approval appears in the Authorization Events log. Do this before you need it in a real scenario.

MFA - The Prerequisite You Should Enable First

4-Eyes Authorization protects against a compromised credential completing a destructive operation. MFA protects against the credential being usable at all. The two controls are complementary - MFA raises the bar for initial access, 4-Eyes raises the bar for damage once access is obtained. Enable MFA on both accounts involved in the 4-Eyes model. If your primary admin account has MFA and the approver account does not, an attacker who compromises the approver account can approve their own malicious requests submitted under your primary account.

Veeam v13 supports TOTP-based MFA for all user accounts. Enable it under Main Menu > Users and Roles > Security tab. MFA must be configured per individual user account - user groups are not supported. For a break-glass account with offline credentials, configure MFA and store the TOTP seed alongside the account credentials - both in the sealed offline location. If you use an external partner as your approver, require them to enable MFA on their Veeam account as a condition of the arrangement.

Control What It Stops What It Does Not Stop
MFA on primary account Credential phishing / password theft enabling console login Attacker with physical access or session hijacking after login
MFA on approver account Approver credential compromise enabling malicious approvals Attacker who compromises both accounts simultaneously
4-Eyes Authorization Single compromised account completing destructive operations OS-level compromise of the VBR server itself
Immutability on repositories Direct file deletion during the immutability window Attacks after the immutability window expires
VBR on VSA / hardened Linux Local Windows admin OS-layer bypass of 4-Eyes Hypervisor-level compromise of the VSA host

The Partner Agreement You Should Have in Writing

If you use an external partner as your approver, document the arrangement. It does not need to be a formal contract but it needs to cover: what the role entails, expected response time for approval requests, out-of-band verification procedure before approving (the partner should confirm with you directly before approving any request, not just click approve on every email), credential rotation schedule for the approver account, and what happens if the partner relationship ends. The last point is important - when the arrangement ends, you need a process to rotate the approver account credentials and verify the account cannot still be used.

The out-of-band verification step is not optional. If an attacker compromises your primary account and submits a deletion request, the email notification to your partner is the only signal that something happened. Without a policy of confirming directly with you before approving, that email alone is not a reliable verification signal.

The Minimum Viable Implementation for a Solo Admin

Enable MFA on your primary admin account. Create a break-glass account with Veeam Security Administrator role, enable MFA on it, and store the credentials and TOTP seed offline in a sealed envelope in a physically secure location. Enable 4-Eyes Authorization with a 7-day approval window. Configure email notifications so you receive alerts on both accounts. Test the workflow. The entire setup takes under 30 minutes and the protection is real.

Key Takeaways
  • 4-Eyes Authorization requires Veeam Universal License or Enterprise Plus edition. It is available in v13 VUL deployments by default - check your edition before assuming you need to upgrade.
  • The feature holds destructive operations in a pending queue until a second account with Veeam Backup Administrator or Security Administrator role approves them. Disabling the feature also requires a second approval.
  • 4-Eyes does not protect against OS-level compromise of the VBR server. On Windows, a local admin can create accounts to self-approve. Running VBR on the VSA or a hardened Linux appliance closes this bypass vector.
  • PowerShell cmdlets, REST API, and Veeam Backup Enterprise Manager delete operations are blocked entirely when 4-Eyes is enabled. Audit automation before enabling. File copy jobs that overwrite files also require a registry workaround.
  • For a solo admin, the external partner model provides the strongest separation - the approver holds a Security Administrator role scoped only to approvals, with no operational access to jobs or data.
  • MFA and 4-Eyes are complementary controls. MFA raises the bar for initial access. 4-Eyes raises the bar for damage after access is obtained. Enable both, on both accounts.
  • The minimum viable solo implementation: MFA on both accounts, break-glass credentials stored offline, 4-Eyes enabled with a 7-day window, email notifications confirmed. Under 30 minutes to configure.

Read more