Protect against ransomware attacks on ASA r2 storage systems
For enhanced protection against ransomware attacks, replicate snapshots to a remote cluster, then lock the destination snapshots to make them tamper-proof. Locked snapshots cannot be deleted accidentally or maliciously. You can use locked snapshots to recover data if a storage unit is ever compromised by a ransomware attack.
Initialize the SnapLock compliance clock
Before you can create tamper-proof snapshots, you must initialize the SnapLock compliance clock on your local and destination clusters.
-
Select Cluster > Overview.
-
In the Nodes section, select Initialize SnapLock Compliance Clock.
-
Select Initialize.
-
Verify that the compliance clock is initialized.
-
Select Cluster > Overview.
-
In the Nodes section, select ; then select SnapLock Compliance Clock.
-
After you have initialized the SnapLock compliance clock on your local and destination clusters, you are ready to create a replication relationship with locked snapshots.