list-bullets alert-diamond attachment-1 keyboard-arrow-down add-square tags-double smiley-sad-1 check-1 open-quote envelope-letter network-browser pencil-1 copy-paste filter-1 smiley-indifferent arrow-right-1 messages-bubble-square arrow-up-1 smiley-smile-1_1 rating-star smiley-happy ticket-1 navigation-menu smiley-happy send-email-1 ticket-1 social-media-twitter expand-6 envelope-letter hierarchy-9 folder-file-1 archive time-clock-circle analytics-pie-2 smiley-unhappy single-neutral-actions pencil-write archive view-off smiley-sad-1 button-record rating-star navigation-menu-horizontal remove-square-1 love-it information-circle smiley-indifferent diagram-fall-down synchronize-arrows-1 smiley-thrilled wench lock-unlock-1 shield-warning download-thick-bottom multiple-circle view-1 close-quote time-clock-midnight arrow-down-1 multiple-users-1 close alarm-bell-1 floppy-disk undo search arrow-down-2 add book-star add-circle-bold remove-circle common-file-stack smiley-unhappy single-neutral lock-2 file-code close hyperlink-2 pencil-1 cog print-text expand-6 multiple-neutral-1 keyboard-arrow-up view move-to-top drawer-send add-circle cog-1 headphones-customer-support bin-paper-1 disable layout-module-1 check-circle-1 flying-insect-honey arrow-left-1 credit-card-1

DATASTOR Lockdown from Ransomware

Background

Ransomware processes run within the security context of the user account that started the infection. These processes can target all accessible files and folders including DATASTOR storage.

Goal

To prevent ransomware encryption of DATASTOR storage and implement storage redundancy for expanded recovery options.

The Strategy

Implement correct security settings on storage devices through NTFS permissions and/or Share permissions, and refrain from logging onto any computers with the user accounts associated with DATASTOR.

Download the paper, "DATASTOR Lockdown from Ransomware" for complete steps.

DATASTOR Lockdown from Ransomware.pdf