{"id":18107,"date":"2021-09-07T09:12:01","date_gmt":"2021-09-07T09:12:01","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=18107"},"modified":"2021-09-13T01:57:35","modified_gmt":"2021-09-13T01:57:35","slug":"modern-cyber-resilience-techniques-for-legacy-windows-servers","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers","title":{"rendered":"More than backup &#038; recovery: modern cyber-resilience techniques for legacy Windows Servers"},"content":{"rendered":"\n<p>Legacy business apps often require old operating systems. Administrators then have a tough challenge \u2013 how to back up these old systems securely.&nbsp;<\/p>\n\n\n\n<p>The problem&nbsp;is,&nbsp;backup and disaster recovery (BDR)&nbsp;<strong>strategies from a decade ago won\u2019t cut it<\/strong>\u2026 but many&nbsp;<strong>modern tools aren\u2019t compatible with legacy systems<\/strong>. You need a BDR plan that is both compatible with legacy operating systems&nbsp;and&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\" target=\"_blank\">cyber-resilient<\/a>&nbsp;against modern threats.&nbsp;<\/p>\n\n\n\n<p>So, what does a modern&nbsp;BDR&nbsp;solution that can accommodate legacy Windows operating systems look like? Here,&nbsp;we\u2019ll take a closer look at the security and BDR challenges with old Windows operating systems and help you understand how to implement a secure and robust backup system for legacy machines.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Legacy operating systems are a security double whammy: no patches and new threats&nbsp;<\/h2>\n\n\n\n<p>Legacy operating systems are a double whammy for system administrators. First, Windows no longer provides security patches for these systems. That means you\u2019re on your own when it comes to hardening them. In practice, that often means living with vulnerabilities on production systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Then comes the second problem: a whole new threat model to protect against in the 2020s.<br>A backup and disaster recovery strategy that worked well in the early 2010s isn\u2019t going to cut<br>it today. For example, the prevalence of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\" target=\"_blank\">ransomware<\/a>&nbsp;today makes it a threat model you must address in modern environments.&nbsp;&nbsp;<\/p>\n\n\n\n<p>To understand just how much things have changed, let\u2019s take a closer look at backup security today compared to a decade ago.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Legacy operating system backups: threats of the past vs threats of today&nbsp;<\/h3>\n\n\n\n<p>In the 2000s through the early 2010s, it was still common for all data to be stored on-premise. Even when \u201con-premise\u201d included additional sites (e.g., cold storage locations) as part of a&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/3-2-1-rule-of-backup-happy-world-backup-day\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1 backup strategy<\/a>, data security threats included those that physically compromised storage mediums (e.g., fire, natural disaster, and theft). For practical purposes, cloud backups mitigated&nbsp;that risk. However, along with the rise of cloud&nbsp;computing&nbsp;came the rise of threats like&nbsp;ransomware,&nbsp;account hijacking, and social engineering.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With that in mind, here\u2019s a high-level breakdown of data risks that were common when legacy Windows operating systems were in their prime vs today.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;\">\n    <thead>\n      <tr>\n        <th style=\"width:40%;border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:left;\"><strong>Data risk<\/strong><\/th>\n        <th style=\"width:30%;border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>Common a decade ago?<\/strong><\/th>\n        <th style=\"width:30%;border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>Common today?<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">Hardware failure<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Less so<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:left;border-left:1px solid white;\">Physical theft<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Less so<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">Destruction\/natural disasters<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Less so<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:left;border-left:1px solid white;\">Accidental deletion<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Yes<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">Intentional (malicious) deletion<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:left;border-left:1px solid white;\">Ransomware<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">No<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Yes<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">Account hijacking<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">No<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:left;border-left:1px solid white;\">Account deletion<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">No<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Yes<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:left;\">Compliance (e.g., PCI DSS, HIPAA)<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Yes<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p>As you can see, while some risks have remained the same, the overall data security landscape has changed a lot. In fact, backup strategies that were secure in the past aren\u2019t necessarily secure today.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Case-in-point: backing up to a secure network attached storage (NAS) device may have been \u201cgood enough\u201d in the early 2010s. Today, some ransomware exploits &#8212; like the&nbsp;<a href=\"http:\/\/unit42.paloaltonetworks.com\/ech0raix-ransomware-soho\/\" target=\"_blank\" rel=\"noreferrer noopener\">eCh0raix ransomware variant<\/a>&nbsp;&#8212; specifically target NAS devices.&nbsp;Similarly, the Server Message Block version 1 (SMB v1) protocol, which used to be a popular protocol for copying files,&nbsp;isn\u2019t viable in&nbsp;modern&nbsp;production&nbsp;due to vulnerabilities exploited by malware like WannaCry and&nbsp;NotPeyta.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 Pillars of a robust backup &amp; disaster recovery system for legacy Windows Servers&nbsp;<\/h2>\n\n\n\n<p>Now that we\u2019ve covered the changes in threat models and challenges related to securely backing up legacy Windows Server machines,&nbsp;let\u2019s explore what a modern cyber-resilient&nbsp;solution looks like.&nbsp;A genuinely resilient BDR system requires 6 specific characteristics, which&nbsp;we&nbsp;call the 6&nbsp;Pillars of&nbsp;Legacy&nbsp;Server&nbsp;Backup and&nbsp;Disaster&nbsp;Recovery. They are:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Full system backup and recovery<\/strong>&nbsp;\u2013 If&nbsp;you ever need to restore your legacy Windows Server backup, simply restoring data isn\u2019t enough. You need to be able to restore the system in an operational state without a ton of manual work. That\u2019s where full system backup and recovery, such as&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/classic\/restore-and-recover\" target=\"_blank\">Bare Metal Disaster Recovery (BMDR) with BackupAssist<\/a>, can help. BMDR allows you to restore and recover your legacy servers \u201canywhere\u201d, whether it\u2019s a physical host or virtual machine.&nbsp;&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Fast&nbsp;and predictable&nbsp;recovery&nbsp;<\/strong>\u2013 When<strong>&nbsp;<\/strong>it comes to business continuity, speed matters.<br>Just having the backups isn\u2019t enough; you need to meet your Recovery Time Objective (RTO). A fast recovery means it has to be mistake-free: do&nbsp;it once and do&nbsp;it right. That\u2019s&nbsp;why<br>BackupAssist&nbsp;also comes with the Recovery Bible \u2013 step by step instructions for recovery success.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Onsite&nbsp;and&nbsp;offsite recovery options&nbsp;<\/strong>\u2013&nbsp;Onsite Windows image backups of your old Windows<br>Server,&nbsp;accessible&nbsp;via&nbsp;direct connection or LAN,&nbsp;are the fastest way to get back up and running. Of course, you don\u2019t want your backups to be&nbsp;<em>only<\/em>&nbsp;onsite. Cloud storage adds a layer of flexibility and resilience to your legacy Windows Server BDR plan.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Offline backups<\/strong>&nbsp;\u2013 Hackers&nbsp;can potentially get to anything connected to a network, which is why&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/offline-backups-in-an-online-world\" target=\"_blank\">offline backups are vital<\/a>.&nbsp;The traditional approach to offline backups&nbsp;\u2013&nbsp;a storage medium completely disconnected from the&nbsp;computer and&nbsp;network&nbsp;(e.g., removable hard drives and even tape drives)&nbsp;\u2013 is&nbsp;still viable today.&nbsp;Additionally, many consider cloud backups secured with multi-factor authentication (MFA) to be a viable \u201coffline\u201d backup implementation.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Active protection from ransomware&nbsp;<\/strong>\u2013 Modern<strong>&nbsp;<\/strong>BDR strategies must take a proactive approach to protecting against ransomware. Today, hackers are attacking backups directly (encrypting backup files by overwriting them or deleting them altogether) and indirectly (encrypting files before backup). Tools like&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/solutions\/cryptosafeguard\" target=\"_blank\">CryptoSafeGuard<\/a>&nbsp;can mitigate this risk.<br>CryptoSafeGuard&nbsp;restricts access to your backups with granularity to the process level.<br>This provides much tighter security than traditional network or user-based restrictions.<br>Additionally,&nbsp;CryptoSafeGuard&nbsp;uses intelligent heuristics during a backup to detect suspicious activity, and will notify you if anything requires your attention.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>A robust incident recovery plan&nbsp;<\/strong>\u2013 If&nbsp;ransomware or other malware does compromise your legacy Windows Server backups, forensic analysis to identify the root cause is critical. Accurate analysis helps ensure complete remediation occurs and prevents&nbsp;future attacks. Additionally, fast analysis helps restore normal operation&nbsp;more quickly&nbsp;and makes cyber insurance claims smoother. Traditionally a significant gap in incident response has been the lack of data available to investigators. Cybersecurity investigators did not have something comparable to the \u201cblack box\u201d recorders so useful to aviation investigations.&nbsp;<a href=\"https:\/\/www.backupassist.com\/solutions\/cyber-black-box\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Black Box<\/a>&nbsp;is a new technology designed to solve precisely this problem. It works by transparently logging forensic data in the background and storing current and historical information for&nbsp;later&nbsp;analysis&nbsp;in the event of a hack.&nbsp;&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How to get on the road to cyber-resilience with BackupAssist\u00a0<\/h2>\n\n\n\n<p>Does your current backup solution have all 6 pillars of robust BDR?&nbsp;&nbsp;<\/p>\n\n\n\n<p>Unfortunately, for many admins, the answer is no.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Administrators know their legacy Windows server backup strategy isn\u2019t ideal, but they can\u2019t find the right tools to get things up to par.&nbsp;&nbsp;<\/p>\n\n\n\n<p>BackupAssist&nbsp;with&nbsp;CryptoSafeGuard&nbsp;and Cyber Black Box is purpose-built to address these challenges. With&nbsp;BackupAssist, not only do you get all 6 pillars of robust BDR,&nbsp;but&nbsp;you get them affordably and in a solution that is fast, simple, and designed with best practices out of the box. You\u2019re also constantly in the know with backup report emails and warnings in the event<br>CryptoSafeGuard&nbsp;detects ransomware.&nbsp;&nbsp;<\/p>\n\n\n\n<p>To learn how&nbsp;BackupAssist&nbsp;can help you secure your legacy Windows Server backups,&nbsp;<a href=\"https:\/\/www.backupassist.com\/company\/contact-us\/consultation\" target=\"_blank\" rel=\"noreferrer noopener\">sign up for a free expert consultation today<\/a>!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you running a legacy Windows operating system that has been in end-of-support for years? Don\u2019t worry; I\u2019m not here to give you a lecture on the need to upgrade. For the most part, no administrator wants to run Windows Server 2012 in the 2020s, but they often have to.  <\/p>\n","protected":false},"author":17,"featured_media":15929,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[764,757,95],"tags":[],"class_list":["post-18107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-cyber-resilience","category-guides"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>More than backup &amp; recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More than backup &amp; recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Are you running a legacy Windows operating system that has been in end-of-support for years? Don\u2019t worry; I\u2019m not here to give you a lecture on the need to upgrade. For the most part, no administrator wants to run Windows Server 2012 in the 2020s, but they often have to.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-07T09:12:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-13T01:57:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"More than backup &#038; recovery: modern cyber-resilience techniques for legacy Windows Servers\",\"datePublished\":\"2021-09-07T09:12:01+00:00\",\"dateModified\":\"2021-09-13T01:57:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\"},\"wordCount\":1358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg\",\"articleSection\":[\"Best practices\",\"Cyber Resilience\",\"Guides\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\",\"name\":\"More than backup & recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg\",\"datePublished\":\"2021-09-07T09:12:01+00:00\",\"dateModified\":\"2021-09-13T01:57:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg\",\"width\":1500,\"height\":498},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More than backup &#038; recovery: modern cyber-resilience techniques for legacy Windows Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More than backup & recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers","og_locale":"en_US","og_type":"article","og_title":"More than backup & recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog","og_description":"Are you running a legacy Windows operating system that has been in end-of-support for years? Don\u2019t worry; I\u2019m not here to give you a lecture on the need to upgrade. For the most part, no administrator wants to run Windows Server 2012 in the 2020s, but they often have to.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers","og_site_name":"Cyber Resilience Blog","article_published_time":"2021-09-07T09:12:01+00:00","article_modified_time":"2021-09-13T01:57:35+00:00","og_image":[{"width":1500,"height":498,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"More than backup &#038; recovery: modern cyber-resilience techniques for legacy Windows Servers","datePublished":"2021-09-07T09:12:01+00:00","dateModified":"2021-09-13T01:57:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers"},"wordCount":1358,"commentCount":0,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg","articleSection":["Best practices","Cyber Resilience","Guides"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers","url":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers","name":"More than backup & recovery: modern cyber-resilience techniques for legacy Windows Servers - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg","datePublished":"2021-09-07T09:12:01+00:00","dateModified":"2021-09-13T01:57:35+00:00","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/er-vmdr.jpg","width":1500,"height":498},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/modern-cyber-resilience-techniques-for-legacy-windows-servers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"More than backup &#038; recovery: modern cyber-resilience techniques for legacy Windows Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18107"}],"version-history":[{"count":10,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18107\/revisions"}],"predecessor-version":[{"id":18120,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18107\/revisions\/18120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/15929"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}