Skip to main content
NetApp Ransomware Resilience

Manage alerts in NetApp Ransomware Resilience

Contributors amgrissino netapp-ahibbard

When NetApp Ransomware Resilience detects a possible attack, it displays an alert on the dashboard and in the Notifications menu. Ransomware Resilience immediately takes a snapshot. When you receive an alert, review the potential risk in the Ransomware Resilience Alerts tab to assess the impact on your data and prevent a potential ransomware attack.

If Ransomware Resilience detects a possible attack, a notification appears in the Console Notification settings, and an email is sent to the configured addresses. The email includes information about the severity, the impacted workload, and a link to the alert in the Ransomware Resilience Alerts tab.

You can dismiss false positives or decide to recover your data immediately.

Tip If you dismiss the alert, Ransomware Resilience learns this behavior, associates it with normal operations, and doesn't initiate an alert on it again.

To begin to recover your data, mark the alert as ready for recovery so that your storage administrator can begin the recovery process.

Each alert might include multiple incidents on different volumes and statuses. Review all incidents.

How alerts are generated

Ransomware Resilience relies on evidence about data entropy patterns, file extension types, and encryption to produce alerts. Alerts are based on the following events:

  • Data breach

  • Data destruction

  • File extensions were created or changed

  • File creation with a comparison of detected versus expected rates

  • File deletion with a comparison of detected versus expected rates

  • Suspicious user behavior

  • When encryption is high, without file extension changes

Note For data breach, data destruction, and suspicious user behavior alerts, you must configure user activity detection.

Alert types and statuses

Alerts have one of two statuses: New or Inactive.

An alert is classified as one of the following types:

  • Potential attack: An alert is classified as a potential attack when:

    • Autonomous Ransomware Protection detects a new extension and the occurrence is repeated more than 20 times in the last 24 hours (default behavior).

    • Data breaches are detected.

    • Data destruction is detected.

  • Warning: A warning occurs based on the following behaviors:

    • Detection of a new extension has not been identified before and the same behavior does not repeat enough times to declare it as an attack.

    • High entropy is observed.

    • File read, write, rename, or delete activity doubled compared to normal levels.

Note For SAN environments, warnings are based on high entropy only.

Evidence is based on information from Autonomous Ransomware Protection in ONTAP. For details, refer to Autonomous Ransomware Protection overview.

Alert states

An alert incident can have the following states:

State

Description

New

All incidents are marked "new" when they are first identified.

In review

You can manually mark an alert incident as "in review" while you evaluate it.

Dismissed

If you suspect that the activity is not a ransomware attack, you can change the status to "dismissed."
CAUTION: After you dismiss an attack, you can't revert its status. If you dismiss a workload, all snapshot copies taken automatically in response to the potential ransomware attack will be permanently deleted.

Resolved

The incident has been fixed.

Auto Resolved

For low priority alerts, the incident is automatically resolved if there has been no action taken on it within five days.

View alerts

You can access alerts from the Ransomware Resilience dashboard or from the Alerts tab.

Required Console role
To perform this task, you need the Organization admin, Folder or project admin, Ransomware Resilience admin, or Ransomware Resilience viewer role. Learn about Ransomware Resilience roles for NetApp Console.

Steps
  1. In the Ransomware Resilience dashboard, review the Alerts pane.

  2. Select View all under one of the statuses.

  3. Select an alert to review all incidents on each volume for each alert.

  4. To review additional alerts, select Alert in the breadcrumbs at the upper left.

  5. Review the alerts on the Alerts page.

    Alerts page

  6. Continue with one of the following:

Respond to an alert email

When Ransomware Resilience detects a potential attack, it sends an email notification to the subscribed users based on their subscription notification preferences configured in the NetApp Console settings. The email contains information about the alert, including the severity and resources impacted.

Tip To set up email notifications in the Console, see Set email notification settings.

Required Console role
To perform this task, you need the Organization admin, Folder or project admin, Ransomware Resilience admin, or Ransomware Resilience viewer role. Learn about Ransomware Resilience roles for NetApp Console.

Steps
  1. View the email.

  2. In the email, select View alert and log in to Ransomware Resilience.

    The Alerts page appears.

  3. Review all incidents on each volume for each alert.

  4. To review additional alerts, select Alert in the breadcrumbs at the upper left.

  5. Continue with one of the following:

Detect malicious activity and anomalous user behavior

Looking at the Alerts tab, you can identify whether there is malicious activity or anomalous user behavior.

You must have configured a user activity agent and enabled a protection policy with user behavior detection to view user-level alerts. The Suspicious user column appears in the Alerts dashboard only when user behavior detection is enabled. To enable suspicious user detection, see Suspicious user activity.

View malicious activity

When Autonomous Ransomware Protection triggers an alert in Ransomware Resilience, you can view the following details:

  • When the alert was triggered

  • When access was changed or denied

  • Entropy of incoming data

  • Expected creation rate of new files compared to detected rate

  • Expected deletion rate of files compared to detected rate

  • Expected rename rate of files compared to detected rate

  • Impacted workloads, volumes, files, and directories

Note These details are viewable for NAS workloads. For SAN environments, only the entropy data is available.
Steps
  1. From the Ransomware Resilience menu, select Alerts.

  2. Select an alert.

  3. Review the incidents in the alert.

    Alert incidents page

  4. Select an incident to review the details of the incident.

View anomalous user behavior

If you've configured suspicious user detection to view anomalous user behavior, you can view user-level data and block specific users. To enable suspicious user settings, see Configure agents and collectors for user activity detection.

Steps
  1. From the Ransomware Resilience menu, select Alerts.

  2. Select an alert.

  3. Review the incidents in the alert.

    1. To block a suspected user in your environment, select Block next to the user's name.

    2. To disable alerts on a given user who is the subject of an alert you know to be false, select the three dots (…​) then Exclude this user from monitoring. Review the dialog then select Exclude to confirm.

Tip To re-enable alerts for a user, return the alert. Select the three dots then Include this user in monitoring. You can also Exclude users from monitoring.

Mark ransomware incidents as ready for recovery (after incidents are neutralized)

After stopping the attack, notify your storage administrator that the data is ready so they can initiate the recovery process.

Required Console role
To perform this task, you need the Organization admin, Folder or project admin, or Ransomware Resilience admin role. Learn about Ransomware Resilience roles for NetApp Console.

Steps
  1. From the Ransomware Resilience menu, select Alerts.

    Alerts page

  2. In the Alerts page, select the alert.

  3. Review the incidents in the alert.

    Alert incidents page

  4. If you determine that the incidents are ready for recovery, select Mark restore needed.

  5. Confirm the action and select Mark restore needed.

  6. To initiate the workload recovery, select Recover workload in the message or select the Recovery tab.

Result

After the alert is marked for restore, the alert moves from the Alerts tab to the Recovery tab.

Dismiss incidents that are not potential attacks

After you review incidents, you need to determine whether the incidents are potential attacks. If they aren't actual threats, they can be dismissed.

You can dismiss false positives or decide to recover your data immediately. If you dismiss the alert, Ransomware Resilience learns this behavior and associates it with normal operations, and doesn't initiate an alert on such a behavior again.

If you dismiss a workload, all snapshot copies taken automatically in response to a potential ransomware attack are permanently deleted.

Caution If you dismiss an alert, you can't change its status or undo this change.

Required Console role
To perform this task, you need the Organization admin, Folder or project admin, or Ransomware Resilience admin role. Learn about Ransomware Resilience roles for NetApp Console.

Steps
  1. From the Ransomware Resilience menu, select Alerts.

    Alerts page

  2. In the Alerts page, select the alert.

    Alert incidents page

  3. Select one or more incidents. Alternately, select all incidents by selecting the Incident ID box at the top left of the table.

  4. If you determine that the incident is not a threat, dismiss it as a false positive:

    • Select the incident.

    • Select the Edit status button above the table.

      Alert Edit Status page

  5. From the Edit status box, choose the Dismissed status.

    Additional information about the workload and the snapshot copies are deleted appears.

  6. Select Save.

    The status on the incident or incidents changes to "Dismissed."

View a list of impacted files

Before you restore an application workload at the file level, you can view a list of impacted files. You can access the Alerts page to download a list of impacted files. Then use the Recovery page to upload the list and choose which files to restore.

Required Console role
To perform this task, you need the Organization admin, Folder or project admin, or Ransomware Resilience admin role. Learn about Ransomware Resilience roles for NetApp Console.

Steps

Use the Alerts page to retrieve the list of impacted files.

Tip If a volume has multiple alerts, you might need to download the CSV list of impacted files for each alert.
  1. From the Ransomware Resilience menu, select Alerts.

  2. On the Alerts page, sort the results by workload to show the alerts for the application workload that you want to restore.

  3. From the list of alerts for that workload, select an alert.

  4. For that alert, select a single incident.

    list of impacted files for a specific alert

  5. For that incident, select the download icon to download the list of impacted files in CSV format.