<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->


<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html
  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="DC.Type" content="topic">
<meta name="DC.Title" content="Viewing Real-Time Ransomware Detection Results">
<meta name="product" content="">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001336647925.html">
<meta name="prodname" content="">
<meta name="version" content="">
<meta name="brand" content="Anti-Ransomware ProtectManager">
<meta name="DC.Publisher" content="20220726">
<meta name="DC.Format" content="XHTML">
<meta name="DC.Identifier" content="EN-US_TOPIC_0000001284536120">
<meta name="DC.Language" content="en-us">
<link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
<title>Viewing Real-Time Ransomware Detection Results</title>
</head>
<body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px"><a name="EN-US_TOPIC_0000001284536120"></a><a name="EN-US_TOPIC_0000001284536120"></a>

<h1 class="topictitle1">Viewing Real-Time Ransomware Detection Results</h1>
<div id="body0000001284536120"><p id="EN-US_TOPIC_0000001284536120__p14535141513518">This section describes how to view real-time ransomware detection results.</p>
<div class="section" id="EN-US_TOPIC_0000001284536120__section727615470"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0000001284536120__ol13790921131411"><li id="EN-US_TOPIC_0000001284536120__en-us_topic_0000001166366216_en-us_topic_0000001091431193_li1570821013536"><span>Choose <span class="menucascade" id="EN-US_TOPIC_0000001284536120__en-us_topic_0000001283108982_menucascade1430734715144"><b><span class="uicontrol" id="EN-US_TOPIC_0000001284536120__en-us_topic_0000001283108982_uicontrol1130711473148">Explore</span></b> &gt; <b><span class="uicontrol" id="EN-US_TOPIC_0000001284536120__en-us_topic_0000001283108982_uicontrol19639185119145">Ransomware Protection</span></b> &gt; <b><span class="uicontrol" id="EN-US_TOPIC_0000001284536120__en-us_topic_0000001283108982_uicontrol47992011157">Overview</span></b></span>.</span></li><li id="EN-US_TOPIC_0000001284536120__li38991851114713"><span>In the <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol1955420316480"><b>Real-time Ransomware Detection Alarms</b></span> area, view alarms.</span><p><ul id="EN-US_TOPIC_0000001284536120__ul129611655185119"><li id="EN-US_TOPIC_0000001284536120__li12961135511518">No alarm information is displayed on the page.<p id="EN-US_TOPIC_0000001284536120__p7540212194514"><a name="EN-US_TOPIC_0000001284536120__li12961135511518"></a><a name="li12961135511518"></a><span><img id="EN-US_TOPIC_0000001284536120__image13105813204515" src="en-us_image_0000001343354633.png"></span></p>
</li><li id="EN-US_TOPIC_0000001284536120__li184895576513">An alarm is generated for the file system.<p id="EN-US_TOPIC_0000001284536120__p34861342195112"><a name="EN-US_TOPIC_0000001284536120__li184895576513"></a><a name="li184895576513"></a><span><img id="EN-US_TOPIC_0000001284536120__image1948644217517" src="en-us_image_0000001337455913.png"></span></p>
</li></ul>
</p></li><li id="EN-US_TOPIC_0000001284536120__li459918253504"><span>If an alarm exists, perform the following steps to view the alarm information.</span><p><ol type="a" id="EN-US_TOPIC_0000001284536120__ol1166014378506"><li id="EN-US_TOPIC_0000001284536120__li846417150519">Click the alarm information to go to the <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol583011392515"><b>Alarms and Events</b></span> page.</li><li id="EN-US_TOPIC_0000001284536120__li194406553516">Locate the alarm and click the alarm description. The alarm details show the vStore and file system infected by ransomware. Click <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol960093895316"><b>Export Detection Report</b></span>.<p id="EN-US_TOPIC_0000001284536120__p12331441134811"><span><img id="EN-US_TOPIC_0000001284536120__image1761320414486" src="en-us_image_0000001287971234.png"></span></p>
</li><li id="EN-US_TOPIC_0000001284536120__li4103227151319">Enter a <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol20858174031317"><b>File Name After Exporting</b></span> and click <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol167981742151314"><b>OK</b></span>. A message is displayed indicating that the file export command is delivered successfully.<p id="EN-US_TOPIC_0000001284536120__p4638124193415"><span><img id="EN-US_TOPIC_0000001284536120__image4322189195410" src="en-us_image_0000001634332077.png"></span></p>
</li><li id="EN-US_TOPIC_0000001284536120__li1995818341411">Click <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol1041115814143"><b>Export Records</b></span>, select the latest detection report, and choose <span class="menucascade" id="EN-US_TOPIC_0000001284536120__menucascade1518381131513"><b><span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol518312117154">More</span></b> &gt; <b><span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol59171025157">Download</span></b></span>.</li><li id="EN-US_TOPIC_0000001284536120__li4557177181518">You are advised to open the downloaded report using Notepad. The <span class="uicontrol" id="EN-US_TOPIC_0000001284536120__uicontrol265362241616"><b>file</b></span> column in the report displays the file system name and information about the files infected by ransomware.</li></ol>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0000001336647925.html">Using Real-Time Ransomware Detection</a></div>
</div>
</div>

<div class="hrcopyright"><hr size="2"></div><div class="hwcopyright">Copyright &copy; Huawei Technologies Co., Ltd.</div></body>
</html>