Skip to main content

Restore data after a ransomware attack

Contributors netapp-ahibbard netapp-forry netapp-dbagwell netapp-aherbin

Autonomous Ransomware Protection (ARP) creates Snapshot copies named Anti_ransomware_backup when it detects a potential ransomware threat. You can use one of these ARP Snapshot copies or another Snapshot copy of your volume to restore data.

About this task

If the volume has SnapMirror relationships, manually replicate all mirror copies of the volume immediately after you restore from a Snapshot copy. Not doing so can result in unusable mirror copies that must be deleted and recreated.

To restore from a Snapshot other than the Anti_ransomware_backup Snapshot after a system attack was identified, you must first release the ARP Snapshot.

If no system attack was reported, you must first restore from the Anti_ransomware_backup Snapshot copy then complete a subsequent restoration of the volume from the Snapshot copy of your choosing.

Steps

You can use System Manager or the ONTAP CLI to restore your data.

System Manager
Restore after a system attack
  1. To restore from the ARP Snapshot, skip to step two. To restore from an earlier Snapshot copy, you must first release the lock on the ARP Snapshot.

    1. Select Storage > Volumes.

    2. Select Security then View Suspected File Types

    3. Mark the files as "False Positive" .

    4. Select Update and Clear Suspect File Types

  2. Display the Snapshot copies in volumes:

    Select Storage > Volumes, then select the volume and Snapshot Copies.

  3. Select Menu Option next to the Snapshot copy you want to restore then Restore.

Restore if a system attack was not identified
  1. Display the Snapshot copies in volumes:

    Select Storage > Volumes, then select the volume and Snapshot Copies.

  2. Select Menu Option them choose the Anti_ransomware_backup Snapshot.

  3. Select Restore.

  4. Return to the Snapshot Copies menu, then choose the Snapshot copy you want to use. Select Restore.

CLI
Restore after a system attack
  1. To restore from the ARP Snapshot copy, skip to step two. To restore data from earlier Snapshot copies, you must release the lock on the ARP Snapshot.

    Note It is only necessary to release the anti-ransomware Snaplock before restoring from earlier Snapshot copies if you are using the volume snap restore command as outlined below. If you are restoring data using Flex Clone, Single File Snap Restore or other methods, this is not necessary.

    Mark the attack as a "false positive" and "clear suspect":
    anti-ransomware volume attack clear-suspect -vserver svm_name -volume vol_name [extension identifiers] -false-positive true
    Use one of the following parameters to identify the extensions:
    [-seq-no integer] Sequence number of the file in the suspect list.
    [-extension text, … ] File extensions
    [-start-time date_time -end-time date_time] Starting and ending times for the range of files to be cleared, in the form "MM/DD/YYYY HH:MM:SS".

  2. List the Snapshot copies in a volume:

    volume snapshot show -vserver SVM -volume volume

    The following example shows the Snapshot copies in vol1:

    clus1::> volume snapshot show -vserver vs1 -volume vol1
    
    Vserver Volume Snapshot                State    Size  Total% Used%
    ------- ------ ---------- ----------- ------   -----  ------ -----
    vs1	 vol1   hourly.2013-01-25_0005  valid   224KB     0%    0%
                   daily.2013-01-25_0010   valid   92KB      0%    0%
                   hourly.2013-01-25_0105  valid   228KB     0%    0%
                   hourly.2013-01-25_0205  valid   236KB     0%    0%
                   hourly.2013-01-25_0305  valid   244KB     0%    0%
                   hourly.2013-01-25_0405  valid   244KB     0%    0%
                   hourly.2013-01-25_0505  valid   244KB     0%    0%
    
    7 entries were displayed.
  3. Restore the contents of a volume from a Snapshot copy:

    volume snapshot restore -vserver SVM -volume volume -snapshot snapshot

    The following example restores the contents of vol1:

    cluster1::> volume snapshot restore -vserver vs0 -volume vol1 -snapshot daily.2013-01-25_0010
Restore if a system attack was not identified
  1. List the Snapshot copies in a volume:

    volume snapshot show -vserver SVM -volume volume

    The following example shows the Snapshot copies in vol1:

    clus1::> volume snapshot show -vserver vs1 -volume vol1
    
    Vserver Volume Snapshot                State    Size  Total% Used%
    ------- ------ ---------- ----------- ------   -----  ------ -----
    vs1	 vol1   hourly.2013-01-25_0005  valid   224KB     0%    0%
                   daily.2013-01-25_0010   valid   92KB      0%    0%
                   hourly.2013-01-25_0105  valid   228KB     0%    0%
                   hourly.2013-01-25_0205  valid   236KB     0%    0%
                   hourly.2013-01-25_0305  valid   244KB     0%    0%
                   hourly.2013-01-25_0405  valid   244KB     0%    0%
                   hourly.2013-01-25_0505  valid   244KB     0%    0%
    
    7 entries were displayed.
  2. Restore the contents of a volume from a Snapshot copy:

    volume snapshot restore -vserver SVM -volume volume -snapshot snapshot

    The following example restores the contents of vol1:

    cluster1::> volume snapshot restore -vserver vs0 -volume vol1 -snapshot daily.2013-01-25_0010
  3. Repeat steps 1 and 2 to restore the volume using the desire Snapshot copy.