nav-img
Advanced

Creating a Protection Policy

To protect your servers from ransomware, you can create a policy, set critical file paths in the policy, and enable machine learning.

Machine learning automatically collects and aggregates normal application behavior on the servers associated with the policy. Operations on files performed by untrusted applications or applications that are not specified in the policy will trigger alarms.

Creating a Protection Policy

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security > Host Security Service.
  3. On the Ransomware page, click the Policies tab, and click Create Policy, as shown in Figure 1.

    Figure 1 Policy management


  4. Set policy details, as shown in Figure 2.

    Figure 2 Configuring a ransomware prevention policy


    Table 1 Basic information parameters

    Parameter

    Description

    Policy Name

    Ransomware prevention policy name

    Intelligent Learning Period

    Select 7 days, 15 days, or 30 days.

    HSS uses a machine learning engine to identify if an application has possibly tampered with any of the files on your servers.

    Action

    Action taken when suspicious operations on monitored files are detected. For example, report alarms.

    Monitored File

    Path of monitored files. Multiple paths are separated by semicolons (;). Operations on the files in these paths are monitored.

    If no paths are specified, all the files on the servers associated to the policy are monitored.

    Extension

    Extension of monitored files. Multiple paths are separated by semicolons (;).

  5. Click Add Server. In the displayed Add Server dialog box, select associated servers, as shown in Figure 3.

    Figure 3 Associating servers


  6. Click OK.

    Note
    • You can check the name, IP address, and system of the associated server.
    • To remove an associated server, click Delete in the Operation column.

  7. Click Create and Learn.

    Created policies will be displayed in the policy list, as shown in Figure 4.

    Figure 4 Ransomware prevention policy list


    Table 2 Policy list parameters

    Parameter

    Description

    Policy Name

    Intelligent learning policy name

    Servers Protected

    Number of servers protected by the policy

    Servers Being Studied

    Number of servers where the learning is performed

    Trusted Processes

    Number of trusted processes. After the intelligent learning policy takes effect, HSS automatically identifies and counts trusted processes on your server.

    Monitored File

    Path of monitored files. Multiple paths are separated by semicolons (;). Operations on the files in these paths are monitored.

    If no paths are specified, all the files on the servers associated to the policy are monitored.

    Extension

    Extension of monitored files. Multiple paths are separated by semicolons (;).

    Action

    Action taken when suspicious operations on monitored files are detected.

    For example, report alarms.

Associating Servers

You can associated servers to an existing intelligent learning policy on the Associated Servers tab on the policy details page.

  1. Click the name of a policy. The policy details page is displayed, as shown in Figure 5.

    Figure 5 Accessing the policy details page


  2. Click the Associated Servers tab and click Add Server, as shown in Figure 6.

    Figure 6 Adding associated servers


  3. In the displayed Add Server dialog box, select servers, as shown in Figure 7.

    Figure 7 Associating servers


  4. Click OK.

    After associated servers are added, you can check their server names, IP addresses, systems, and policy. By default, the initial policy status is Learning.

    After the learning is complete, the policy status changes to Learning complete. Policy in effect. The ransomware prevention policy will automatically take effect on all servers associated with it.

Follow-Up Procedure

Editing a policy

You can click Edit to modify the policy name, intelligent learning period, protection status, monitored file paths, and file extensions.

Deleting a policy

You can click the Delete button to delete a policy. Servers associated with it will no longer be protected.