Installing Ransomware Protection
Ransomware is a type of malicious software that is designed to block access to a computer system until a sum of money is paid. CTE for Windows Agent supports detection of Ransomware and protection of sensitive data from Ransomware.
CTE Agent monitors volumes and looks for processes that perform suspicious behavior such as processes that try to encrypt files or open thousands of files. If a process displays suspicious behavior, then it is either audited, which means it is flagged in a log file, or it is blocked. The action taken is preconfigured by the user in the profile linked to the client.
Protection Modes
Based on the enabled capabilities, CTE clients can support the following protection modes:
-
Filesystem protection (CTE): Allows you to protect and encrypt CTE files with policies
-
Ransomware Protection (RWP): Protects volumes
-
Both Filesystem and Ransomware Protection (RWP CTE): Protects volumes from Ransomware and allows you to protect and encrypt CTE files with policies
Use Ransomware Protection GuardPoints to monitor or block Ransomware access attempts to a protected volume on the CTE clients. A Ransomware Protection Protected GuardPoint does not require any protection policies.