On what versions of Windows can I install Veriato RansomSafe™ ?
Veriato RansomSafe™ can be installed on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Vista, Windows 7, Windows 8, and Windows 10.
How does Veriato RansomSafe™ protect me from a ransomware infection?
Veriato RansomSafe™ creates a safe and secure copy of each file on a protected server before that file can be modified or deleted by any user or process, including ransomware processes, and provides you with a very easy way to recover those files if necessary.
Additionally, RansomSafe™ uses a combination of “honeypot” files along with File Screening to detecting the existence of ransomware. When the ransomware’s activities are detected, the user whose process is creating, modifying, or deleting the file(s) is immediately blocked and prevented from affecting any additional files. The administrator is automatically notified and can take action to remove the infected computer from the network and, in a few quick clicks, restore all of the files the ransomware affected.
Does one installation of Veriato RansomSafe™ protect all of my Windows file servers?
No. Installation of Veriato RansomSafe™ will protect only the files contained on the file server on which it is installed. However, you may use a single Veriato RansomSafe™ console to manage Veriato RansomSafe™ on multiple Windows file servers.
Where does Veriato RansomSafe™ save the files that it has created protected copies of?
The files contained in RansomSafe™ are stored in a protected folder on the same local drive where they originally existed. If you prefer, you may relocate the RansomSafe™ to another local drive on the same server.
Won’t the files stored in the RansomSafe™ eventually consume all of the space on my server?
No. You may select how much space the RansomSafe™ is allowed to consume on the drive it is protecting. This may be selected as a percentage of total drive capacity or a percentage of drive free space. By default, the RansomSafe™ is allowed to consume a maximum of 80% of the drive’s free space.
Can I limit how long files are stored in RansomSafe™ ?
Yes. Each time a file is modified, a new version of that file is created in RansomSafe™ . You may configure both the maximum number of versions kept and the maximum age of files stored within RansomSafe.
I’m using RansomSafe™ and I’ve been affected by ransomware. What do I need to do to recover from it?
If the ransomware attempted to modify a “honeypot” file or was detected by File Screening, the activities of the ransomware would stop at that point. It will no longer be able to affect any additional files on your file server. If you had configured email notifications, you would have been notified of this.
The first thing you will want to do is remove the infected computer from your network so you can take steps to clean it of its infection before allowing it to re-join the network.
On your file server, you can use the Veriato RansomSafe™ console to quickly search for files that had recently been modified or deleted by the user who ran the ransomware. You can then take the files found through the search and restore any of them you’d like to. Note that after you restore them, the encrypted versions of the files may still exist alongside the restored files. You’ll want to remove the encrypted versions of the files using Windows Explorer at your convenience.
As soon as you are sure that the user is no longer infected and a threat to your file server, you may use the Veriato RansomSafe™ console to unblock that user and allow them to continue to manage files on your server.