<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->


<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html
  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="DC.Type" content="topic">
<meta name="DC.Title" content="Creating a Ransomware Protection and WORM Policy">
<meta name="product" content="">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001792385660.html">
<meta name="prodname" content="">
<meta name="version" content="">
<meta name="brand" content="30-OceanProtect Appliance 1.5.0-1.6.0 Help Center">
<meta name="DC.Publisher" content="20240608">
<meta name="DC.Format" content="XHTML">
<meta name="DC.Identifier" content="EN-US_TOPIC_0000001839264733">
<meta name="DC.Language" content="en-us">
<link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
<title>Creating a Ransomware Protection and WORM Policy</title>
</head>
<body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px"><a name="EN-US_TOPIC_0000001839264733"></a><a name="EN-US_TOPIC_0000001839264733"></a>

<h1 class="topictitle1">Creating a Ransomware Protection and WORM Policy</h1>
<div><p>This section describes how to set a ransomware protection and WORM policy for backup and replication copies.</p>
<div class="section"><h4 class="sectiontitle">Procedure</h4><ol><li><span>Choose <strong id="EN-US_TOPIC_0000001839264733__en-us_topic_0000001839142377_b17391139122519">Explore</strong> &gt; <strong id="EN-US_TOPIC_0000001839264733__en-us_topic_0000001839142377_b103911493252">Data Utilization Policies</strong>.</span></li><li><span>Click <strong>Ransomware Protection and WORM Policies</strong>.</span></li><li><span>Click <span class="uicontrol"><b><span><strong>Create</strong></span></b></span>.</span></li><li><span>Enter basic information in the displayed dialog box. <a href="#EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table37151336202216">Table 1</a> describes the basic parameters.</span><p>
<div class="tablenoborder"><a name="EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table37151336202216"></a><a name="en-us_topic_0000001311216213_table37151336202216"></a><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table37151336202216" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Basic parameters of a ransomware protection and WORM policy</caption><colgroup><col style="width:19.02%"><col style="width:80.97999999999999%"></colgroup><thead align="left"><tr><th align="left" class="cellrowborder" valign="top" width="19.02%" id="mcps1.3.2.2.4.2.1.2.3.1.1"><p>Parameter</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="80.97999999999999%" id="mcps1.3.2.2.4.2.1.2.3.1.2"><p>Description</p>
</th>
</tr>
</thead>
<tbody><tr><td class="cellrowborder" valign="top" width="19.02%" headers="mcps1.3.2.2.4.2.1.2.3.1.1 "><p><span><strong>Name</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="80.97999999999999%" headers="mcps1.3.2.2.4.2.1.2.3.1.2 "><p>Ransomware protection and WORM policy name, which can be customized.</p>
<div class="note"><span class="notetitle"> NOTE: </span><div class="notebody"><p>The name cannot be changed after creation.</p>
</div></div>
</td>
</tr>
<tr><td class="cellrowborder" valign="top" width="19.02%" headers="mcps1.3.2.2.4.2.1.2.3.1.1 "><p><span><strong>Description</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="80.97999999999999%" headers="mcps1.3.2.2.4.2.1.2.3.1.2 "><p>Ransomware protection and WORM policy description. You are advised to enter description related to ransomware protection and WORM to facilitate subsequent management.</p>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li><span>Configure the ransomware protection and WORM policy. <a href="#EN-US_TOPIC_0000001839264733__table537916590513">Table 2</a> describes the parameters.</span><p>
<div class="tablenoborder"><a name="EN-US_TOPIC_0000001839264733__table537916590513"></a><a name="table537916590513"></a><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0000001839264733__table537916590513" frame="border" border="1" rules="all"><caption><b>Table 2 </b>Ransomware protection and WORM policy parameters</caption><colgroup><col style="width:19.15%"><col style="width:80.85%"></colgroup><thead align="left"><tr><th align="left" class="cellrowborder" valign="top" width="19.15%" id="mcps1.3.2.2.5.2.1.2.3.1.1"><p>Parameter</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="80.85%" id="mcps1.3.2.2.5.2.1.2.3.1.2"><p>Description</p>
</th>
</tr>
</thead>
<tbody><tr><td class="cellrowborder" valign="top" width="19.15%" headers="mcps1.3.2.2.5.2.1.2.3.1.1 "><p><strong>Ransomware Protection Policy</strong></p>
</td>
<td class="cellrowborder" valign="top" width="80.85%" headers="mcps1.3.2.2.5.2.1.2.3.1.2 "><p>This option is disabled by default. After this option is enabled, you can set a scheduling plan for the ransomware protection policy to perform ransomware detection on backup and replication copies.</p>
</td>
</tr>
<tr><td class="cellrowborder" valign="top" width="19.15%" headers="mcps1.3.2.2.5.2.1.2.3.1.1 "><p><span><strong>Schedule</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="80.85%" headers="mcps1.3.2.2.5.2.1.2.3.1.2 "><p>This parameter is displayed after <span class="uicontrol"><b>Ransomware Protection Policy</b></span> is enabled.</p>
<p>Scheduling plan of the ransomware protection policy.</p>
<ul><li><strong><span><strong>Detect immediately after successful backup or replication</strong></span></strong></li><li><strong><span><strong>Periodic Detection</strong></span></strong><div class="p">Periodic detection parameters:<ul><li><strong><span><strong>Detection Frequency</strong></span></strong>: every <em>xx</em> minutes, hours, days, or weeks</li><li><strong><span><strong>Time of the First Detection</strong></span></strong>: start time of the first detection<div class="note"><span class="notetitle"> NOTE: </span><div class="notebody"><p>If the first detection time is set to an earlier time, detection starts in the next ransomware protection policy period after the setting is complete.</p>
</div></div>
</li><li><strong><span><strong>Detection Range</strong></span></strong>: You can perform detection for the latest copy, all copies, and copies generated after a specified time point.</li></ul>
</div>
</li></ul>
</td>
</tr>
<tr><td class="cellrowborder" valign="top" width="19.15%" headers="mcps1.3.2.2.5.2.1.2.3.1.1 "><p><span><strong>WORM Policy</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="80.85%" headers="mcps1.3.2.2.5.2.1.2.3.1.2 "><p>This option is disabled by default. After this option is enabled, you can set WORM for backup and replication copies.</p>
</td>
</tr>
<tr><td class="cellrowborder" valign="top" width="19.15%" headers="mcps1.3.2.2.5.2.1.2.3.1.1 "><p><span><strong>WORM Setting</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="80.85%" headers="mcps1.3.2.2.5.2.1.2.3.1.2 "><p>This parameter is displayed after <span class="uicontrol"><b><span><strong>WORM Policy</strong></span></b></span> is enabled.</p>
<ul><li>After backup or replication is successful, copies can be set as WORM copies. If you have not set a ransomware protection policy, only this function is supported.</li><li>After ransomware detection is complete, uninfected copies can be set as WORM copies. If you have set a ransomware protection policy, only this function is supported.</li></ul>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li><span>Select detection objects. <a href="#EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table1915523121510">Table 3</a> describes the parameters.</span><p>
<div class="tablenoborder"><a name="EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table1915523121510"></a><a name="en-us_topic_0000001311216213_table1915523121510"></a><table cellpadding="4" cellspacing="0" summary="" id="EN-US_TOPIC_0000001839264733__en-us_topic_0000001311216213_table1915523121510" frame="border" border="1" rules="all"><caption><b>Table 3 </b>Detection object parameters</caption><colgroup><col style="width:25.919999999999998%"><col style="width:74.08%"></colgroup><thead align="left"><tr><th align="left" class="cellrowborder" valign="top" width="25.919999999999998%" id="mcps1.3.2.2.6.2.1.2.3.1.1"><p>Parameter</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="74.08%" id="mcps1.3.2.2.6.2.1.2.3.1.2"><p>Description</p>
</th>
</tr>
</thead>
<tbody><tr><td class="cellrowborder" valign="top" width="25.919999999999998%" headers="mcps1.3.2.2.6.2.1.2.3.1.1 "><p><span><strong>Type</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="74.08%" headers="mcps1.3.2.2.6.2.1.2.3.1.2 "><p>Detection object type.</p>
<ul><li><strong><span><strong>Backup Copy</strong></span></strong>: Backup copies of the local cluster</li><li><strong><span><strong>Replicated Copy</strong></span></strong>: Replication copies replicated from other clusters to the local cluster<div class="note"><span class="notetitle"> NOTE: </span><div class="notebody"><p>Ensure that the local cluster functions as the secondary end of the remote replication pair and a replication copy has been generated.</p>
</div></div>
</li></ul>
</td>
</tr>
<tr><td class="cellrowborder" valign="top" width="25.919999999999998%" headers="mcps1.3.2.2.6.2.1.2.3.1.1 "><p><span><strong>Resource Type</strong></span></p>
</td>
<td class="cellrowborder" valign="top" width="74.08%" headers="mcps1.3.2.2.6.2.1.2.3.1.2 "><p>Resource type. Ransomware detection supports only <span class="uicontrol"><b>VMware</b></span>, <span class="uicontrol"><b><span><strong>NAS File Systems</strong></span></b></span>, <span class="uicontrol"><b><span><strong>Filesets</strong></span></b></span>, and <span class="uicontrol"><b><span><strong>NAS Shares</strong></span></b></span>. WORM is supported for all resources except GaussDB (DWS).</p>
</td>
</tr>
</tbody>
</table>
</div>
</p></li><li><span>Select the resource on which detection is to be performed and click <span class="uicontrol"><b><span><strong>OK</strong></span></b></span>. The system performs detection on the copies of the selected resource according to the scheduling plan configured in the ransomware protection and WORM policy.</span><p><div class="note"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p>Dynamic detection is performed by default after a ransomware protection policy is configured. For details about how to switch to static detection, see <a href="en-us_topic_0000001839184781.html">Managing the Detection Mode</a>.</p>
</div></div>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0000001792385660.html">Configuring Ransomware Protection for Copies</a></div>
</div>
</div>

<div class="hrcopyright"><hr size="2"></div><div class="hwcopyright">Copyright &copy; Huawei Technologies Co., Ltd.</div></body>
</html>