Ransomware detection

NAVIGATION   Modules > Endpoint Protection > Policies

NAVIGATION   Modules > Devices > Device List > select a device

SECURITY  Endpoint Protection > View Policy

SECURITY  Endpoint Protection > Edit Policy

VSA 10's ransomware detection policy monitors for the existence of crypto-ransomware on endpoints by using proprietary behavioral analysis of files. Once ransomware is detected, VSA can alert you, isolate the device, and attempt to stop the ransomware processes to keep the infection from spreading. When paired with our BCDR solutions, ransomware detection offers a powerful early warning and rapid recovery system against malware.

This topic provides an overview of ransomware detection in VSA 10.

Key benefits

  • Know about ransomware infections instantly. Instead of waiting for a user to report the issue, VSA 10 will notify you when files get encrypted by the ransomware. You'll have more time to respond and possibly prevent the spread.
  • Easily monitor by using policy-driven configuration. The policy-driven approach of VSA 10 enables MSPs to monitor targeted devices easily and at scale for the presence of ransomware. Integrations with key MSP tools, such as Autotask, BMS, and ConnectWise, along with email notification options, ensure that the right resources can be immediately alerted if ransomware is detected.
  • Prevent spreading of ransomware with automatic network isolation. Once ransomware is detected, VSA 10 can isolate the affected device from the network and attempt to stop suspected ransomware processes to prevent further spread of the infection to other devices.
  • Remediate issues remotely. Devices automatically isolated from the network can still contact VSA 10, enabling you to take effective action to resolve the issue.
  • Recover with Datto Continuity products. When VSA 10 is integrated with a Professional Services Automation (PSA) platform and Datto BCDR, you can quickly recover from the ransomware outbreak by restoring the device to a previous state.

Requirements

  • You must have an active VSA subscription.
  • Your Ransomware Detection license must be active. You can check its status by navigating to Endpoint Protection > License in your VSA 10 instance.
  • Ransomware detection must be enabled and configured. For more information, refer to Create a ransomware detection policy.
  • The VSA 10 Agent must be installed on all endpoints you wish to monitor, and those devices must be able to communicate with your VSA 10 instance.

Supported operating systems

The ransomware monitor is supported by Windows 8.1 and up only.

Ransomware monitor features

You can configure ransomware monitoring to scan an entire host or only the paths you specify. You can also designate the action it takes when it suspects an infection on a host. The ransomware monitoring policy includes the following features:

  • Scan parameters that enable you to choose between scanning all local drives on an endpoint or only specific drives. For further granularity, you can designate specific paths on the host to monitor.
  • Host isolation that automatically terminates all of the endpoint's network connections except to the VSA portal, which helps prevent the spread of ransomware to other endpoints. You can augment host isolation with custom policies that attempt to terminate known ransomware processes when they are detected, slowing or stopping the spread of ransomware on the infected host.

How to...

Ransomware detection FAQ

The following frequently-asked questions will help you get the most out of your ransomware detection license.

Need support?

Kaseya is always available to assist further. Your Kaseya Account Executive can enroll you in basic and intermediate-level platform training. For technical assistance, visit our Kaseya Helpdesk article to learn how to get in touch.