SureBackup with Nutanix AHV in Veeam v13: What Works, What Doesn't, and What to Do Instead
- The Honest Answer About AHV and SureBackup
- What SureBackup Actually Is (and Its Two Distinct Modes)
- What Works on AHV Today: Verification and Content Scan Mode
- What Doesn't Work: Virtual Lab Boot Verification
- Setting Up SureBackup Verification Mode for AHV
- AV Scan and YARA Rules in the SureBackup Job
- How Infected Restore Point Marking Works
- Hybrid Lab Strategy: Boot Testing AHV Backups on vSphere or Hyper-V
- Using Instant Recovery as a Boot Verification Substitute
- What Veeam Has Said About Full AHV Lab Support
- Closing Thoughts
The Honest Answer About AHV and SureBackup
If you run a pure Nutanix AHV environment and you're reading this hoping to find a guide to setting up a virtual lab that boots your AHV VMs in an isolated network for full recoverability testing, this article is going to disappoint you early and then make up for it with what you can actually do.
As of Veeam v13.0.1, virtual lab boot verification for AHV VMs does not exist. There is no AHV equivalent of the vSphere virtual lab where VMs are powered on in an isolated sandbox, run a heartbeat check, execute application test scripts, and are powered down when done. That full SureBackup experience, which vSphere and Hyper-V shops have had for years, is not available for workloads running natively on AHV compute. It has been an active feature request in Veeam's R&D forums since at least 2022, with no delivery in v12, v12.1, v12.3, or v13.
What does work is meaningful and worth configuring. The verification and content scan mode of SureBackup runs against AHV backup data without booting VMs, performing backup integrity checks, antivirus scans against mounted disk content, and YARA rule matching for malware indicators and sensitive data patterns. It's not full recoverability testing. It is genuine backup health and security verification that should absolutely be running in any AHV environment.
This article covers exactly what the verification mode does and how to configure it, what the boot verification gap means in practice, and what your options are for getting as close to full recoverability testing as the current platform supports.
What SureBackup Actually Is (and Its Two Distinct Modes)
SureBackup is Veeam's automated backup verification technology. In its full form on vSphere or Hyper-V, it spins up a virtual lab: an isolated copy of your network, complete with proxy appliances that provide masqueraded access, and powers on your backed-up VMs inside it. The VMs boot from the backup data, Veeam waits for them to pass a heartbeat check, optionally runs application-specific test scripts, optionally scans them with AV software, and then powers everything down and discards the lab environment. The result is a green or red status on each restore point with a full log of what passed and what failed.
That is one mode. In Veeam v13, SureBackup also has a second mode called Backup verification and content scan only. In this mode, no VMs are powered on. No virtual lab is created or required. Instead, Veeam mounts the backup data directly on the backup server's mount server and performs checks on the disk content: integrity verification of the backup file structure and checksums, antivirus scanning of files on the mounted disks, and YARA rule evaluation for malware signatures and patterns you define. This mode works for AHV. It's what you'll be using.
What Works on AHV Today: Verification and Content Scan Mode
The verification and content scan mode is available for AHV backups through the standard SureBackup job interface in VBR v13. You create a SureBackup job, select your AHV backup jobs or backup files as the source, and at the verification mode selection step choose Backup verification and content scan only. With this mode selected, the virtual lab configuration steps are skipped entirely since no lab is required.
What this mode actually does:
Backup integrity verification confirms that the backup file structure is internally consistent and that checksum validation passes across the data blocks in the restore point. A backup that passes integrity verification is one where the data you'd be restoring from is not corrupted. A failed integrity check on a restore point, and all subsequent restore points in that chain, are marked as suspect. This is the foundational check that tells you the backup is actually usable before you need it in a real recovery event.
Antivirus scanning mounts the VM disk content from the backup on the mount server and runs the AV engine installed there against the filesystem. This is post-backup scanning, not inline scanning during the backup job itself. It catches known malware signatures in backup data, which matters for two reasons: it tells you whether a restore point contains infected files before you restore it into production, and it gives you a historical scan log that can help establish when an infection first appeared in the backup chain.
YARA scanning is the most flexible of the three. You define YARA rules that describe patterns to look for in backup content: ransomware file extensions, specific strings associated with known malware families, sensitive data patterns like credential files or private key material you want to detect if exfiltrated. Veeam mounts the backup content and runs the YARA engine against it. You can use Veeam's built-in YARA rules, import rules from the community or threat intelligence feeds, or write your own.
AntivirusInfos.xml configuration file located in the Mount Service folder on the mount server. Veeam does not auto-detect AV via Windows Security Center. If the AV engine is not in that XML file, Veeam will report that no antivirus software was detected and the scan step will fail or be skipped. Veeam ships with entries for common AV products pre-populated; if yours is not listed, you need to add it manually.
What Doesn't Work: Virtual Lab Boot Verification
To be precise about what's missing: Veeam cannot create an isolated virtual lab on AHV compute, power on AHV VMs from backup data inside that lab, run heartbeat checks or application test scripts against those running VMs, and report on whether they booted and their applications responded correctly. None of that pipeline exists for AHV in v13.
The reason this matters for compliance and operational confidence is that integrity verification and AV scanning confirm that the backup data is not corrupted and not infected. They do not confirm that the guest OS will actually boot from that data, that the applications inside will start correctly, or that the network stack will come up in the expected state. A backup can pass all three content scan checks and still fail to restore to a usable VM if the OS was in a bad state when it was captured, or if application data was inconsistent in ways that don't trigger AV or YARA rules.
For organizations with compliance requirements that specifically call for periodic recoverability testing with documented evidence of successful VM boot, the verification-only mode does not satisfy that requirement on its own. The hybrid lab approach and Instant Recovery testing described later in this article are your options for closing that gap.
Setting Up SureBackup Verification Mode for AHV
In the VBR console, navigate to Home > Jobs, click SureBackup Job on the ribbon, and work through the wizard.
Name the job and select verification mode
Give the job a meaningful name. At the Virtual Lab step you'll be prompted to select a virtual lab or create one. Instead, select Backup verification and content scan only from the verification mode options. This collapses the wizard and removes all virtual lab configuration steps. No lab infrastructure is needed and none will be created.
Add linked backup jobs
At the Linked Jobs step, add the AHV backup jobs whose restore points you want to verify. You can add individual VMs from those jobs to narrow the scope if you don't want every VM in every linked job scanned. For most environments, linking entire backup jobs is the cleaner approach since it ensures every protected VM gets verified on the same schedule.
The SureBackup job will run against the most recent restore point of each linked job by default. You can also configure it to verify a specific number of recent restore points if you want verification coverage across multiple points in the chain.
Configure scan settings
At the Settings step, configure what scans run as part of the job. You'll see checkboxes for:
- Scan the restore point for malware before publishing: runs the AV engine on the mount server against disk content. Enable this if AV is installed on your mount server.
- Scan the restore point with YARA rules: runs YARA rule matching. Enable and select your rule set here.
Enable both if you have AV and YARA rules configured. Running integrity verification alone is better than nothing, but the combined scan gives you the most complete picture of backup health and security posture.
Set the schedule
Schedule the SureBackup job to run after your AHV backup jobs complete. Daily verification is the right default for any environment where backup data integrity and malware-free status matters, which is all of them. If scan times are long due to large VM disk sizes, consider running the full YARA scan weekly and integrity-only verification daily. Never go more than a week without running at minimum the integrity check on your AHV backups.
AV Scan and YARA Rules in the SureBackup Job
Both the AV scan and YARA scan work by mounting the VM's disk content from the backup onto the mount server's filesystem, then running the scan engine against that mounted data. The VM itself is never powered on. The scanning happens at the file and data-block level directly against the backup content.
For AV scanning, Veeam uses whatever AV engine is installed on the mount server, provided it supports a command-line interface and is registered in the AntivirusInfos.xml file in the Mount Service folder on the mount server. Veeam ships this file pre-populated with entries for common AV products including Windows Defender, ESET, Kaspersky, Symantec, and others. If your AV engine is not in the file, you need to add an entry manually before Veeam can invoke it. Keep AV definitions current on the mount server. A scan with stale definitions is worse than a scan with current ones because it creates a false sense of security. Put the mount server on an automatic definition update schedule and verify that updates are actually applying. Use only one AV engine on the mount server: running multiple AV products simultaneously causes file access conflicts that fail the scan session.
For YARA scanning, Veeam ships with a set of built-in rules and supports importing custom rule files in standard YARA format. The built-in rules cover common ransomware indicators, known malware file patterns, and some sensitive data signatures. For environments with specific compliance requirements or threat models, importing community YARA rule sets from sources like the YARA-Rules GitHub repository or threat intelligence feeds gives you broader coverage. Place custom rule files on the backup server and reference them in the SureBackup job configuration.
One practical note on scan duration: YARA scanning against large VM disk content can run for a significant amount of time depending on the amount of data being scanned and the complexity of the rule set. A VM with a 500 GB OS disk and a large YARA rule set can take hours. Test your scan times in a non-production window before setting the production schedule, and right-size the rule set to the threat model rather than importing every available YARA rule regardless of relevance.
How Infected Restore Point Marking Works
When any of the three scan checks fail for a restore point, Veeam marks that restore point as Infected in the backup catalog. Critically, it also marks all subsequent restore points in the backup chain as Infected. This chain propagation matters because incremental restore points depend on earlier points in the chain. If restore point 3 is confirmed clean and restore point 4 triggers an AV detection, restore points 4, 5, 6, and all subsequent incrementals are marked infected because they build on top of a known bad point.
Infected restore points are excluded from automated restore operations by default. Veeam will not let you accidentally restore from a backup it has flagged as containing malware without an explicit administrative override. The infected status is visible in the VBR console under Home > Backups > Disk where infected restore points appear with a distinct warning icon.
From a recovery planning perspective, the infected marking tells you the last clean restore point you can safely restore from. Your recovery objective in a ransomware scenario is to restore from the most recent clean point, which is the last restore point before the infected chain begins. The SureBackup scan history in the job logs gives you the date and time of the first detection, which combined with your restore point timestamps tells you exactly where the clean recovery boundary sits.
Hybrid Lab Strategy: Boot Testing AHV Backups on vSphere or Hyper-V
If you need documented evidence of VM boot recoverability and your organization has any vSphere or Hyper-V infrastructure available, even a small test cluster or a few lab hosts, a hybrid lab approach can give you that coverage.
The mechanism: Veeam can restore AHV VM backups to vSphere or Hyper-V. This is a supported cross-platform restore operation in v13. Combined with a virtual lab already configured on the vSphere or Hyper-V side, you can restore AHV VMs to that platform and bring them up in the isolated lab environment for boot verification and application testing.
This is not automated through the SureBackup job wizard the way native platform labs are. It's a manual workflow or a scripted one using Veeam PowerShell. But it produces the documented evidence of a successful VM boot that verification-only scanning cannot. For quarterly or semi-annual recoverability testing as required by most compliance frameworks, a scripted restore-to-lab workflow on vSphere satisfies the requirement and produces the logs you need.
The workflow at a high level:
- Identify the target VMs for the test cycle.
- Use the Veeam restore wizard or PowerShell to restore those VMs from AHV backup to a vSphere or Hyper-V test cluster, specifying an isolated test network.
- Allow the VMs to boot and confirm OS responsiveness and application health.
- Document the restore point used, the restore time, the boot status, and the application check results.
- Power down and delete the test VMs from the lab environment.
Using Instant Recovery as a Boot Verification Substitute
Instant Recovery for AHV is fully supported in v13. You can boot a VM directly from its compressed backup file into an AHV cluster with no prior data staging, using the backup as the live disk source with a redo log capturing any writes made while the VM runs. This is production Instant Recovery functionality, and used carefully it also serves as a practical boot verification mechanism.
The approach: periodically select a representative set of VMs, initiate Instant Recovery for each into a dedicated test VLAN or isolated network segment in your AHV cluster, verify boot and application responsiveness, and then cancel the recovery operation to discard all changes and return to normal state. No data is committed to production. The backup files remain unchanged. You get documented evidence that the VM booted from the backup and responded correctly.
AOS 6.0 or later is required for Instant Recovery to AHV. The AHV cluster must be registered in your backup infrastructure. The test network isolation is your responsibility to configure at the Prism or AHV networking layer before initiating the recovery. Veeam does not create or manage isolated networks on AHV the way it does with the virtual lab proxy appliance on vSphere.
What Veeam Has Said About Full AHV Lab Support
The R&D forum thread requesting native AHV virtual lab support has been active since 2022. Veeam product management confirmed in that thread that they understood the requirement, that it was noted, and that there was no short-term ETA. The feature was not delivered in v12, v12.1, v12.3, or v13. Veeam's v13 release notes and the v13 what's new documentation do not include AHV virtual lab support in the AHV section, which covers vTPM support, the appliance integration into VBR, and other enhancements.
Veeam has announced for 2026 a Universal Hypervisor Integration API that they describe as a framework for any hypervisor vendor to integrate natively with Veeam's backup and recovery capabilities. Whether that API creates a path for AHV virtual lab functionality is not specified in the current announcement. It's something to watch, but not something to plan around until there's concrete documentation of AHV lab support in a released version.
Closing Thoughts
The SureBackup gap on AHV is real and worth being direct about when you're designing a backup verification strategy for an AHV environment. Verification and content scan mode gives you meaningful protection: you know your backups are structurally sound, you know they're malware-free at the time of scan, and you have a chain-aware infected marking system that tells you exactly where your clean recovery boundary sits. That's not nothing. For organizations primarily concerned with ransomware readiness, those capabilities address the core detection requirement.
What it doesn't give you is the confidence of having actually booted a VM from backup and watched it come up healthy. For that, the hybrid vSphere lab restore and the Instant Recovery test approach are the practical paths available today. Neither is as automated or elegant as a native AHV virtual lab would be, but both are buildable, schedulable, and documentable in a way that satisfies most compliance audit requirements.
Configure the verification-only SureBackup job today. It runs unattended, catches backup corruption and malware in the data you'd be restoring from, and costs nothing extra beyond a bit of mount server CPU time. Then build the boot testing workflow that fits your compliance obligations and operational capacity. The gap is an inconvenience, not a dealbreaker.
What You've Covered
- AHV virtual lab boot verification does not exist in Veeam v13, verified against official docs and release notes
- Verification and content scan mode fully supported on AHV: integrity check, AV scan, YARA scan
- SureBackup job created with Backup verification and content scan only mode selected
- AHV backup jobs linked, scan types enabled, schedule set after backup window
- AV engine installed and definitions current on the mount server
- YARA rules configured and scoped appropriately to threat model
- Infected restore point marking behavior understood: chain propagation confirmed
- Hybrid lab strategy (restore AHV backups to vSphere for boot testing) documented for compliance
- Instant Recovery boot testing workflow established with isolated test VLAN confirmed before use
- Network isolation responsibility on AHV understood: no automatic lab proxy isolation