Managing Ransomware Prevention Policies
You can use predefined policies, create or modify ransomware prevention policies, or change the policy associated with a server.
Constraints
Only premium, WTP, and container editions support ransomware protection.
Creating a Policy
- Faça logon no console de gerenciamento.
- No canto superior esquerdo da página, selecione uma região, clique em e escolha
.Figura 1 Acessar o HSS
- Escolha
.
Se os servidores forem gerenciados por projetos empresariais, você poderá selecionar o projeto empresarial de destino para visualizar ou operar as informações sobre ativos e detecção.
- Click the Policies tab and click Add Policy.
- Configure policy parameters. For more information, see Tabela 1.
Figura 2 Protection policy parameters
Tabela 1 Protection policy parameters Parameter
Description
Example Value
OS
Server OS.
Linux
Policy
Policy name.
test
Action
How an event is handled.
- Report alarm and isolate
- Report alarm
Report alarm and isolate
Dynamic Honeypot Protection
After honeypot protection is enabled, the system deploys honeypot files in protected directories and key directories (unless otherwise specified by users). A honeypot file occupies only a few resources and does not affect your server performance.
NOTA:Currently, Linux servers support dynamic generation and deployment of honeypot files. Windows servers support only static deployment of honeypot files.
Enabled
Honeypot File Directories
Protected directories (excluding subdirectories). You are advised to configure important service directories or data directories.
Separate multiple directories with semicolons (;). You can configure up to 20 directories.
This parameter is mandatory for Linux servers and optional for Windows servers.
Linux: /etc/lesuo
Windows: C:\Test
Excluded Directory (Optional)
Directories where honeypot files are not deployed.
Separate multiple directories with semicolons (;). You can configure up to 20 excluded directories.
Linux: /test
Windows: C:\ProData
Protected File Type
Types of files to be protected.
More than 70 file formats can be protected, including databases, containers, code, certificate keys, and backups.
This parameter is mandatory for Linux servers only.
Select all
(Optional) Process Whitelist
Paths of the process files that can be automatically ignored during the detection, which can be obtained from alarms.
This parameter is mandatory only for Windows servers.
-
- Click OK.
Changing a Policy
You can change the protection policy associated with a server.
- Click the Protected Servers tab.
- Select a server and click Change Policy.
- In the Change Policy dialog box, select a protection policy.
- Click OK.
Modifying a Policy
- Log in to the management console and go to the HSS page.
- In the navigation pane, choose Prevention > Ransomware Prevention. Click the Policies tab.
- Click Edit in the Operation column of a policy. Edit the policy configurations. For more information, see Tabela 2.
The following uses a Linux server as an example.
Tabela 2 Protection policy parameters Parameter
Description
Example Value
OS
Server OS.
Linux
Policy
Policy name.
test
Action
How an event is handled.
- Report alarm and isolate
- Report alarm
Report alarm and isolate
Dynamic Honeypot Protection
After honeypot protection is enabled, the system deploys honeypot files in protected directories and key directories (unless otherwise specified by users). A honeypot file occupies only a few resources and does not affect your server performance.
NOTA:Currently, Linux servers support dynamic generation and deployment of honeypot files. Windows servers support only static deployment of honeypot files.
Enabled
Honeypot File Directories
Protected directories (excluding subdirectories). You are advised to configure important service directories or data directories.
Separate multiple directories with semicolons (;). You can configure up to 20 directories.
This parameter is mandatory for Linux servers and optional for Windows servers.
Linux: /etc/lesuo
Windows: C:\Test
Excluded Directory (Optional)
Directories where honeypot files are not deployed.
Separate multiple directories with semicolons (;). You can configure up to 20 excluded directories.
Linux: /test
Windows: C:\ProData
Protected File Type
Types of files to be protected.
More than 70 file formats can be protected, including databases, containers, code, certificate keys, and backups.
This parameter is mandatory for Linux servers only.
Select all
(Optional) Process Whitelist
Paths of the process files that can be automatically ignored during the detection, which can be obtained from alarms.
This parameter is mandatory only for Windows servers.
-
- Confirm the policy information and click OK.
Deleting a Policy
- Log in to the management console and go to the HSS page.
- In the navigation pane, choose Prevention > Ransomware Prevention. Click the Policies tab.
- Click Delete in the Operation column of the target policy.
After a policy is deleted, the associated servers are no longer protected. Before deleting a policy, you are advised to bind its associated servers to other policies.
- Confirm the policy information and click OK.