Creating Ransomware Protection GuardPoints
Steps to create GuardPoints on individual clients and client groups are similar. GuardPoints can be created on the GuardPoints tab of individual clients and client groups.
Note
Using Ransomware Protection GuardPoints to protect Network Shares in CTE for Windows is compatible with CipherTrust Manager v2.14 and subsequent versions.
Using Ransomware Protection GuardPoints to protect Network Shares in CTE for Linux is compatible with CipherTrust Manager v2.17 and subsequent versions.
To create an RWP GuardPoint:
Open the Transparent Encryption application.
Select the client or client group on which you want to create a GuardPoint.
Click an RWP-enabled client under the Client Name column (Clients > Clients). These are the clients with RWP or CTE RWP as Protection Mode.
Click a client group under the Client Group Name column (Clients > Client Groups).
On the GuardPoints tab, click Create GuardPoint.
When creating an RWP GuardPoint, you do not need to specify a CTE policy when Guardpoint Type is "Ransomware Protection Only". For clients with the RWP protection mode, the Policy field is unavailable.
On clients with the CTE RWP protection mode, you can create RWP GuardPoints as well as other types of GuardPoints with policies. The Policy field is available for such clients. Although the field is available, do not select any policy when creating an RWP GuardPoint.
Refer to Protection Modes for information on CTE protection modes.
(For clients with the CTE RWP protection mode) Select Ransomware Protection Only as the Type of device to protect. This is a mandatory field.
For clients with the RWP protection mode, Ransomware Protection Only is the default Type and cannot be modified.
Note
A process set and the default operation that you want CTE to perform on Ransomware protected GuardPoint can be configured in the profile linked with the client. Refer to Setting Ransomware Protection Configuration for details.
Specify the Path (volume or network share) to be protected. This is a mandatory field. Options to specify the GuardPoint paths are:
Enter/Browse Path: Select this option, and enter the path (for example, C:\, D:\, shared volume, or network share) by either typing or clicking the Browse button.
Note
For CTE for Windows, Ransomware Protection GuardPoints are applied at the volume level. Even if you specify the path of a folder or a file, the GuardPoint will be applied at the volume level.
For CTE for Linux, Ransomware Protection is applied at GuardPoint level.
If you specify a network share, all the network shares to be mounted subsequently will be protected.
A CTE client administrator can configure protection of all existing volumes and mount points, and those to be added to the client subsequently. Refer to the CTE Agent for Windows Advanced Configuration Guide for details.
Note
A maximum of 200 GuardPaths can be specified using the Enter/Browse Path option.
Browse Method
Click Browse to select the volume by browsing the client file system. This method prevents typographical errors and verifies client availability. This is the recommended method to specify individual paths.
File system of a client that is not registered with the CipherTrust Manager cannot be browsed.
In the Enter Path field, specify the volume path. Alternatively, in the Select Path field, select the path from the on-screen file system browser, and click Select Path.
Click Add.
Manual Method
Alternatively, if you know the volume, manually enter volume in the given text box. Enter one volume per line.
Upload CSV: Select this option and click Browse to upload the CSV file containing the list of one or more paths. This is the recommended method to specify a large number of paths in one step.
Note
If a manually entered path does not yet exist, be sure to enter the path correctly. The CipherTrust Manager does not parse manually entered paths for correct syntax.
See Considerations Before Creating GuardPoints for what to be aware of before creating a GuardPoint.
A maximum of 1000 paths per CSV file can be uploaded.
Click Create. A message appears prompting to confirm the reuse of these GuardPoint settings on another path.
Click Yes to use the same settings on another path. The Use Settings on Another Path dialog box is displayed. Perform the following steps:
In the Enter Path field, specify the path. Alternatively, in the Select Path field, select the path from the on-screen file system browser, and click Select Path.
Click Add Path. The newly added path appears under the Paths list on the left. Similarly, add as many paths as required.
Click OK.
Click No if you do not want to use the same settings on another path.
Depending on the number of paths you add to a GuardPoint, a status information message may appear. Refer to GuardPoint Status Information for details.
The newly created GuardPoint appears on the GuardPoints tab. The status remains Unknown
until the client sends the response after processing the GuardPoint request. Click the Refresh GuardPoints icon () to view the updated status.
Status of a GuardPoint can be checked at any time on the GuardPoints tab. Refer to Viewing GuardPoint Status for details.