Ransomware Protection allows detection of processes that attempt to encrypt user's files using known algorithm that defines processes as a security threat. Ransomware is one of these processes. When entering a computer such malicious programs block access to user data and then demand ransom for decryption. They are considered among the most common malicious programs and cause great annual losses both to companies and ordinary users. The most common way of getting infected are bulk emails containing malicious files or a link to malware.
According to Doctor Web statistics, probability of restoring files compromised by encryption ransomware is only 10%, that is why the most efficient way of fighting it is to prevent the infection. Recently the number of users that have suffered such infection has decreased. However, the number of Dr.Web technical support requests for decryption reaches 1000 every month.
To enable or disable Ransomware Protection
1.Open Dr.Web , then select .
2.In the open window, click tile.
3.Enable or disable Ransomware Protection by using the switcher .
Figure 64. Enabling/Disabling Ransomware Protection
In this section:
To configure Ransomware Protection parameters
1.Make sure Dr.Web operates in (the lock at the bottom of the program window is open ). Otherwise, click the lock .
2.Click the tile. A component parameter window opens.
3.In the drop-down menu, select an action to be applied to all applications.
Figure 65. Selecting Dr.Web reaction
•—all the applications are not allowed to encrypt user's files. This mode is enabled by default. When an application attempts to encrypt user's files the following notification will be shown:
Figure 66. Notification example with a blocked application attempt to modify user's files
•—when an application attempts to encrypt a user's file, a notification appears, where you can prevent the encryption or ignore it:
Figure 67. Notification example with an application attempt to modify user's files
▫When clicking button the process is blocked and moved to quarantine. Even if the application is restored from the quarantine it cannot be launched until the computer restart.
▫If you close the notification window, the application will not be neutralized.
If necessary, you can desktop and email notifications on Ransomware Protection actions.
You can create a list of applications, excluded from Ransomware Protection scanning. The following management elements are available to work with objects in the list:
•The button—add the application to the exclusion list.
•The button—delete the application from the exclusion list.
Figure 68. Excluding from Ransomware protection scanning
To add an application to the list
1.Click and select a necessary application in the open window.
To protect your data from unauthorized changes, you can also .