The Ransomware Protection enables you to efficiently DETECT, BLOCK and PREVENT ransomware attacks. RDS-Advanced Security reacts as soon as it detects ransomware on your session. It possesses both static and behavioral analysis:
You can enable it by clicking on the "Enable Ransomware Protection" on the Ransomware Protection tab:
After enabling the Ransomware Protection feature, the Learning Period is automatically activated. During the Learning Period, all programs detected by the Ransomware Protection feature will be considered as false positive and will be able to resume their execution. The programs detected as false positive will be automatically added to the list of allowed programs.
This feature enables configuration of Ransomware Protection on a production server without disrupting its activity. We recommend to start with a 5 day Learning Period to identify all legitimate business applications.
If you stop the Learning Period, it will deactivate the Ransomware Protection. Click on the "Ransomware Protection is disabled" button to reactivate the Learning Period.
It quickly scans your disks and displays the files or program responsible, in addition to providing a list of the infected items. RDS-Advanced Security automatically stops the attack and quarantines the program(s) along with the files encrypted before its intervention.
Administrators can manually add folders and applications to the approved list by clicking on 'Manage programs allow list'
Click Select Folder or Add Application to select which resources you would like Ransomware Protection to ignore.
RDS-Advanced Security prevents catastrophic events for businesses by removing ransomware at an early stage.
The administrator has access to information regarding the source of the attack and running processes, and therefore learns how to anticipate these threats.
Note: Ransomware Protection observes how programs interact with system and personal files. To ensure a greater level of protection, Ransomware Protection creates bait files in key folders where ransomware often begins its attack. Therefore, a few hidden files may appear in the users' desktop and documents folders, as well as in other locations. When it detects a malicious behaviour, it stops the ransomware immediately (or ask if the logged user is an administrator). Ransomware Protection uses pure behavioural detection techniques and does not rely on malware signatures, allowing it to catch ransomware which does not exist yet.
You can configure your SMTP settings in order for RDS-Advanced Security to send you email alerts to highlight important security events by clicking on the button below the Ransomware activation one:
Enter your SMTP Hostname, Port and check the Use SSL box and change change the port from 25 to 465 if you wish to use SSL.
Enter the SMTP Username and Password, as well as the sender and receiver addresses.
Email Settings can be validated by sending a test when saving SMTP settings.
Snaphshots taken by Ransomware Protection are visible under the Snapshots tab:
The list can be refreshed by clicking on the corresponding button. Each element can be restored or removed.
Quarantined programs are visible under the Quarantine tab:
Each element can be restored or removed.
Ignored files are not used to detect possible malicious actions and are not saved when they are modified. The idea is to exclude any operation on large or irrelevant files (such as log files).
The file extension used for saving modified files is: snapshot. The driver prohibits any modification or deletion action on these files other than by the RDS-Advanced Security service. Stopping the service deletes the backed up files. In order to delete these files manually, you must temporarily unload the driver.
By default, the directory of saved files is located in the installation directory of RDS-Advanced Security and is called "snapshots". However, it is possible to define another location for this directory. This can allow the administrator to define a directory located on a faster disk (SSD) or on a larger disk according to his needs. The backup directory path must not be a UNC path, in the form of:
\\<computer name>\<backup directory>\
We recommend adding backup utilities in the Whitelist.