These registry values must be created on the SMB gateway, which is specified in the repository settings as “Gateway server”. If the gateway is set to “automatic”, add these registry values to all Windows servers managed by Veeam Backup & Replication.
NetUseShareAccess For Veeam B&R 126.96.36.1997 or later, the following registry value allows Data Movers to open backup files by a resilient method similar to the Windows net use command. Key: HKLM\SOFTWARE\Veeam\Veeam Backup and Replication\ DWORD: NetUseShareAccess Value: 1 Note:If credentials are required, specify Domain\User or Host\User in the repository settings. .\User credentials are not supported with NetUseShareAccess. For example, specify “NAS-01\Admin” instead of “.\Admin”.
SessTimeout This increases the amount of time the Windows SMB client will wait for a response from an SMB server before it aborts the connection. The default timeout is one minute. Note:Reboot Required Key: HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters\ DWORD: SessTimeout Value: 600 Note:This is a value in seconds. Try a value of 600 decimal (10 minutes).
TcpMaxDataRetransmissions This increases the number of times the Windows TCP implementation will retransmit a data segment before it aborts the connection. Note: Reboot Required Key: HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters DWORD: TcpMaxDataRetransmissions Value: 10 (Default: 5)
Prerequisites: Ensure the the target machine has PowerShell Remoting Enabled (as it's Disabled by default)
PS C:\Users\kimconnect\Desktop\Notes> Enable-PSRemoting -Force WinRM has been updated to receive requests. WinRM service type changed successfully. WinRM service started. WinRM has been updated for remote management. WinRM firewall exception enabled.
Alternative method: a. Get PSExec: https://docs.microsoft.com/en-us/sysinternals/downloads/psexec > extract copy contents into %windir% or "C:\Windows"
b. Run this command: psexec \\hdqfswp001 reg add “HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters” /v SessTimeout /t REG_DWORD /d 3600 /f
Add this registry key to increase File Session Timeout:
In the Task Scheduler library, click on the Create Task… link on the right.
In Create Task dialog, fill in the Name box some meaningful text like “Automount of my VHD Drive”.
Set the options as follows: – Configure for Windows 10. – Run whether user is logged on or not – Run with highest privileges box
Switch to the Triggers tab and click on the New… button.
Set the Begin the task option to At startup.
Select to the Actions tab, and click on the New button.
In the Program/script text box type powershell.exe.
Type the following in the Add arguments text box: Mount-VHD -Path "Full\path\to\your\VHD or VHDX\file". Change the Full\path\to\your\VHD or VHDX\file portion to the actual full path of the VHD/VHDX file you want to have automatically mounted at startup.
Switch to the Conditions tab and disable the option Start the task only if the computer is on AC power.
Click on the OK button to create the task.
Type your user account password (or other administrative user account credentials).
You are done!
If your VHD file is encrypted with BitLocker, you may need to add a delay to make a credential prompt appear after you sign in to Windows. Enable the Delay task for option on the New Trigger page, or edit the existing trigger. 30 Seconds should be enough.
You can disable this task to temporarily stop mounting your VHD/VHDX file at startup. You can re-enable it when needed.
To permanently disable the VHD file auto-mount, delete your task under Administrative Tasks > Task Scheduler > Task Scheduler Library.
You can enable the legacy SMB client to access network devices using SMBv1 protocol via the Control Panel (Control Panel -> Programs and Features -> Turn Windows features on or off -> SMB 1.0 / CIFS File Sharing Support -> SMB 1.0 / CIFS Client). In addition, you can access the features installation dialog by running the optionalfeatures.exe command.
If you use anonymous access to connect NAS or other computers, you need to enable the insecure guest logon policy. In Windows 1803/1709 it blocks access to shared network folders over the SMB 2.0 protocol under an anonymous (guest) account. To do this, in the Windows 10 Local Policy Editor (gpedit.msc), enable the Enable insecure guest logons policy in the GPO section: Computer Configuration -> Administrative templates -> Network -> Lanman Workstation.
Windows 10 Consumer Experience adds tiles to the Start Menu for things like Candy Crush, Solitaire, and other non-business applications. There’s a simple way to disable this. Note that this does not remove any of the built-in apps like Calendar, Mail, or even Xbox.
The best and most practical way to disable this would be Group Policy. There’s a setting called “Turn off Microsoft consumer experiences” located at Computer Configuration > Administrative Templates > Windows Components > Cloud Content”. If you enable this policy, the extra stuff will go away.