<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->


<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html
  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="DC.Type" content="topic">
<meta name="DC.Title" content="Using Real-Time Ransomware Detection">
<meta name="product" content="">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001284368078.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001335597804.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001335629021.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001849157165.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001284536120.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001339006246.html">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001802478100.html">
<meta name="prodname" content="">
<meta name="version" content="">
<meta name="brand" content="Anti-Ransomware ProtectManager">
<meta name="DC.Publisher" content="20220726">
<meta name="DC.Format" content="XHTML">
<meta name="DC.Identifier" content="EN-US_TOPIC_0000001336647925">
<meta name="DC.Language" content="en-us">
<link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
<title>Using Real-Time Ransomware Detection</title>
</head>
<body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px"><a name="EN-US_TOPIC_0000001336647925"></a><a name="EN-US_TOPIC_0000001336647925"></a>

<h1 class="topictitle1">Using Real-Time Ransomware Detection</h1>
<div id="body0000001336647925"><p id="EN-US_TOPIC_0000001336647925__p131087692812">Ransomware attacks have similar I/O behavior characteristics. By analyzing file I/O behavior characteristics, the system quickly filters out abnormal files and performs deep content analysis on the abnormal files to detect files attacked by ransomware. Then, secure snapshots are created for the corresponding file systems, and alarms are reported to notify the data protection administrator, limiting the impact of ransomware and reducing losses.</p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="en-us_topic_0000001335597804.html">Configuring the Real-Time Ransomware Detection Whitelist</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0000001335629021.html">Enabling Real-Time Ransomware Detection</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0000001849157165.html">Setting Honeypot Detection</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0000001284536120.html">Viewing Real-Time Ransomware Detection Results</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0000001339006246.html">Managing the Real-Time Ransomware Detection Whitelist</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0000001802478100.html">Managing Honeypot Detection</a></strong><br>
</li>
</ul>

<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0000001284368078.html">Explore</a></div>
</div>
</div>

<div class="hrcopyright"><hr size="2"></div><div class="hwcopyright">Copyright &copy; Huawei Technologies Co., Ltd.</div></body>
</html>