A customer is in need of a solution for possible ransomware attacks that are originated from unprotected endpoints that may have write access to some folder on protected endpoints.
A script to monitor file operations on a given folder that’ll;
Create a backup of a deleted file at a given folder
When a file is created in this protected folder, the script should check if the file itself is encrypted or not.
If it is encrypted, it will block the operation and trigger the alarm, log all relevant information including the information which user (IP address etc whatever&whenever is applicable) created this encrypted file.
If possible, it should be optionally possible to ignore password protected files such as zip, rar, word etc.
Based on our Analysis for your request, Creating a backup of a deleted file at a given folder is not possible by script it requires Third party application to work manually.
For your more wish we are working on your script in encryption and password protection.
Thanks for the script. Can you clarify some details about it;
In this scenario, actual encryption is done by an endpoint that doesn’t have Comodo. This script is running on the endpoint with the Comodo side. This script says; This Script will generate alert if any file is Encrypted in Specified path and kill the process.
Do we stop the connection from the unprotected endpoint? Which process are we talking about there?
In this Script, process defines deletes that encrypted file in the endpoint, because encrypted file will no more make useful things rather than corrupting data. So, we preferred to remove the encrypted file. This script will work only if specified endpoint has Comodo and that has encrypted file.
Deleting the encyrpted file is not a good solution since sometimes (rarely though) it may be possible to revent back the original from the encrypted file. If we delete it, we’ll loose that possibility.
Can you clarify the rest, what do you mean by ‘kill the process.’ there? If this encryption is done by another endpoint from the network, will it drop its connection to prevent further encryption of the other files?
Please ensure that VEEAM AGENT is installed in Endpoint.
This Script will generate alert if any file is Encrypted in Specified path and Trigger the VEEAM AGENT BACKUP to backup the given path.
Tracking the User and killing the process couldn't done if that user is not in network.
Output will have User details of where and when file is encrypted (i.e) created, modified date and time of encrypted file, owner of Encrypted file and Veeam agent status in the Endpoint.