<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
 <head>
  <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  <meta http-equiv="X-UA-Compatible" content="IE=edge">
  <meta name="DC.Type" content="topic">
  <meta name="DC.Title" content="Using Ransomware File Interception (Applicable to File Services)">
  <meta name="product" content="">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079002529.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002042963220.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002042804936.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002079043901.html">
  <meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002042963196.html">
  <meta name="prodname" content="">
  <meta name="version" content="">
  <meta name="brand" content="Online Help for Ransomware Protection-Dorado V700R001C00">
  <meta name="DC.Publisher" content="20241119">
  <meta name="DC.Format" content="XHTML">
  <meta name="DC.Identifier" content="EN-US_TOPIC_0000002042963200">
  <meta name="DC.Language" content="en-us">
  <link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
  <title>Using Ransomware File Interception (Applicable to File Services)</title>
 </head>
 <body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px">
  <a name="EN-US_TOPIC_0000002042963200"></a><a name="EN-US_TOPIC_0000002042963200"></a>
  <h1 class="topictitle1">Using Ransomware File Interception (Applicable to File Services)</h1>
  <div id="body0000001284208138">
   <p id="EN-US_TOPIC_0000002042963200__p15897172414263">When launching attacks, ransomware usually generates encrypted files with special file name extensions. In light of this, the system intercepts writes to files with specific file name extensions to block the extortion from known ransomware and protect file systems in the storage system.</p>
  </div>
  <div>
   <ul class="ullinks">
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002042963220.html">Configuring a File Name Extension Filtering Rule</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002042804936.html">Enabling File Interception</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002079043901.html">Managing File Name Extension Filtering Rules</a></strong><br></li>
    <li class="ulchildlink"><strong><a href="en-us_topic_0000002042963196.html">Scanning for File Systems</a></strong><br></li>
   </ul>
   <div class="familylinks">
    <div class="parentlink">
     <strong>Parent topic:</strong> <a href="en-us_topic_0000002079002529.html">Data Security</a>
    </div>
   </div>
  </div>
 </body>
</html>