Viewing Ransomware Protection
After ransomware protection is enabled, if a ransomware attack event occurs on the server, the event will be recorded and displayed in the ransomware event list. You can handle the events based on your service requirements.
Prerequisites
You have enabled premium, WTP, or container edition.
Constraints
- After ransomware protection is enabled, you need to handle ransomware alarms and fix the vulnerabilities in your systems and middleware in a timely manner.
Checking the Ransomware Prevention Overview
- Log in to the management console.
- Click in the upper left corner of the page, select a region, and choose Security > Host Security Service.
- In the navigation pane, choose Prevention > Ransomware Prevention. Check ransomware prevention details.
Table 1 Ransomware prevention parameters Parameter
Description
Example Value
Time range
Select a time range to check ransomware defense statistics.
Valid values: Last 24 hours, Last 3 days, Last 7 days, Last 30 days
Last 30 days
Protection Statistics
Protected Servers
Number of servers protected against ransomware.
-
Events
Number of ransomware-related events detected within the specified time range.
-
Protected Servers
Server Name/ID
Server name and ID. You can click a server name to view its details.
-
IP Address
EIP and private IP address of a server.
-
OS
Server OS.
Linux
Server Status
Server status. It can be:
- Running
- Stopped
-
Ransomware Protection Status
Ransomware protection status of a server. Its value can be:
- Enabling
- Enabled
- Disabling
- Disabled
Enabled
Policy
Policy used for the server.
-
Events
Number of events detected within the selected time range.
-
Policies
Policy
Policy name.
-
Action
Action of a policy. Its value can be:
- Report alarm: If a virus is detected, an alarm will be reported.
- Report alarm and isolate: If a virus is detected, an alarm will be reported and the virus will be isolated.
Report alarm and isolate
Honeypot Protection
Files and directories that store invalid data on servers and are used as honeypots.
If ransomware prevention is enabled, this function is enabled by default.
After honeypot protection is enabled, the system deploys honeypot files in protected directories and key directories (unless otherwise specified by users). A honeypot file occupies only a few resources and does not affect your server performance.
Enabled
OS
OS of the server to which the target policy is bound.
Windows
Associated Servers
Number of servers associated with the policy.
-
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot