<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
 <head>
  <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  <meta http-equiv="X-UA-Compatible" content="IE=edge">
  <meta name="DC.Type" content="topic">
  <meta name="DC.Title" content="Using Real-Time Ransomware Detection (Applicable to File Services)">
  <meta name="product" content="">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079002529.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079518441.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079639853.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002043559110.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002043400830.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079518445.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079639857.html">
  <meta name="prodname" content="">
  <meta name="version" content="">
  <meta name="brand" content="Online Help for Ransomware Protection-Dorado V700R001C00">
  <meta name="DC.Publisher" content="20241226">
  <meta name="DC.Format" content="XHTML">
  <meta name="DC.Identifier" content="EN-US_TOPIC_0000002043400826">
  <meta name="DC.Language" content="en-us">
  <link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
  <title>Using Real-Time Ransomware Detection (Applicable to File Services)</title>
 </head>
 <body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px">
  <a name="EN-US_TOPIC_0000002043400826"></a><a name="EN-US_TOPIC_0000002043400826"></a>
  <h1 class="topictitle1">Using Real-Time Ransomware Detection (Applicable to File Services)</h1>
  <div id="body8662426">
   <p id="EN-US_TOPIC_0000002043400826__en-us_topic_0000001336647925_p131087692812">Ransomware attacks have similar I/O behavior characteristics. By analyzing file I/O behavior characteristics, the system quickly identifies abnormal files and performs deep content analysis on the abnormal files to detect files attacked by ransomware. Then, secure snapshots are created for file systems where files have been attacked, and alarms are reported to notify the data protection administrator, limiting the impact of ransomware and reducing losses.</p>
  </div>
  <div>
   <ul class="ullinks">
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002079518441.html">Configuring the Real-Time Ransomware Detection Whitelist</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002079639853.html">Enabling Real-Time Ransomware Detection</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002043559110.html">Configuring Honeypot Detection</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002043400830.html">Viewing Real-Time Ransomware Detection Results</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002079518445.html">Managing Real-Time Ransomware Detection Whitelists</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002079639857.html">Managing Honeypot Detection</a></strong><br></li>
   </ul>
   <div class="familylinks">
    <div class="parentlink">
     <strong>Parent topic:</strong> <a href="en-us_topic_0000002079002529.html">Data Security</a>
    </div>
   </div>
  </div>
 </body>
</html>