Manage potential ransomware threats

When threat detection is enabled in a backup job, the agent checks for potential ransomware threats when running the backup job. You can enable ransomware threat detection in:

Note: The agent does not check for potential ransomware threats in a seed backup or the first backup when threat detection is enabled in a job.

If an agent detects a potential ransomware threat, the job or backup is flagged in Portal. Potential threats are flagged:

If a Windows server has a potential threat, the server is not scanned for threats again until the potential threat warning is cleared for the job.

If a VM has a potential threat, the VRA does not scan the VM again during backups until the potential threat warning is cleared for the job. If a VM has a potential threat but is missing from the vSphere environment during the next backup, the backup will still have a potential threat flag until an Admin user clears the potential threat warning.

When a potential threat is detected on a Windows server or VM, you can sign in to the server or VM in your environment and investigate whether it is infected with ransomware. An Admin user in Portal can then manage the threat:

To manage a potential ransomware threat:

  1. When signed in to Portal as an Admin user, click Computers on the navigation bar.

    The Computers page shows registered computers.

  2. Find the computer or environment with the potential threat, and expand its view by clicking its row.

  3. Click the Jobs tab.

  4. Find the job with the potential threat, and click Manage Potential Threat in its Select Action menu.

    Note: The Manage Potential Threat option does not appear for a job that is restored from another computer. To manage a potential threat for a job, you must find the job on the original computer, if it exists, or re-register a new computer to the vault as the original computer. See Restore data to a replacement computer.

  5. In the Manage Potential Threat box, do one of the following:

    • To restore from a backup before the potential ransomware threat was detected, select Recover and then click Continue.

      • If you are restoring from a Windows Local System backup job, a calendar with a list of backups appears in the Restore dialog box. "Potential Threat" appears beside each backup where a potential ransomware threat was detected. Select the backup (also known as safeset) from which you want to restore files, select restore options, and then click Run Restore. See Restore Windows files and folders.

      • If you are restoring from an Image backup job, restore options appear in the Image Restore dialog box. You can restore entire data volumes or individual files and folders. See Restore Windows volumes from an Image backup and Restore files and folders from an Image backup.

      • If you are restoring from a vSphere backup job, restore options appear in the vSphere Restore dialog box. You can restore entire VMs, restore a VM within minutes, or restore files and folders to a VM. See Restore vSphere data.

      Note: After a restore, backups with potential ransomware threats remain in the vault and available for restore. To remove these backups, delete them from the vault and synchronize the job. See Delete specific backups from vaults and Synchronize a job. An Admin user can clear the potential threat flag from the job.

    • If you investigated or addressed the potential threat and are sure that the server or VM is not affected by ransomware, select Clear Potential Threat Warning and then click Continue. In the warning dialog box, click Continue to remove the potential threat flag from the job and all of its backups (safesets).

      Note: Clearing potential threat warnings will clear all existing threat warnings from the job and its backups (safesets). However, warning information will still be available in the log files.