Enable alerts for suspected cases on ransomware on file servers

Background / Value

To efficiently capture security incidents, ARM focuses on user-initiated file server events. If these occur in unusually high numbers and additionally in a short period of time, ARM proactively informs all those responsible.

Ransomware Attack: The combination of file creation and deletion by one user account.

 

Related features

Enable alerts for file server directories

Enable alerts for suspected data theft (file server)

Enable alerts for data deletion (file server)

Run a script after an alert

Manage alerts

 

Step-by-step process

  1. Choose Resources.
  2. Expand the "file server".
  3. Already configured alerts are displayed with a bell symbol.
  4. Right-click on a resource and select "Create alert" in the context menu to create a new alert.
  5. Right-click a resource and select Manage alerts in the context menu to customize or delete existing alerts.

 

  1. Give the alert configuration a name.
  2. Choose "Event".
  3. Define which events trigger an alert. Typical for ransomware: a combination of "file created" and "file deleted".
  4. Optional: Click on "Blacklist users".

 

Optional: Use the blacklist to define which users do not trigger an alert.

Each alert configuration has its own blacklist configuration.

You can only add users, not groups.

  1. Use the search function to find the users you want.
  2. Use double-click or drag-and-drop to add users to the blacklist.
  3. Use the "Delete" key to remove users from the blacklist.
  4. Click "Apply" to save the changes.

 

Optional: Select "Blacklist directories".

 

Optional: Use the blacklist to define which directories are not monitored.

  1. Use the filter function to find the desired directories. When you filter, the tree view changes to a result list of the directory paths.
  2. Use double-click or drag-and-drop to add directories to the blacklist.
  3. Use the "Delete" key to remove directories from the blacklist.
  4. Enable or disable monitoring of subdirectories.
  5. Click "Apply" to save the changes.

 

  1. Select "Threshold".
  2. Enable threshold.
  3. Activate the option. When ransomware is suspected, typically all events are triggered by a single user.
  4. Define how many events within a period trigger the alert.

 

  1. Choose Actions. Here you specify which actions are executed when an alert is triggered. You must activate at least one action (arrows).
  2. Activate the option if an email should be sent in case of an alert.

The content of the emails can be customized. This is analogous to the recertification emails.

  1. The alert is written to the Windows Event Log. The categorization is used.
  2. Enable the execution of a script. To activate this option, a script configuration  for alerts must be stored.

 

Choose a category. This is used when writing to the Windows Event Log and for the email subject.

This option is especially useful if you are using a SIEM system.

 

  1. You must specify a reason for the alert configuration in order to save it.
  2. Click "Create".