<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->


<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->

<!DOCTYPE html
  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="DC.Type" content="topic">
<meta name="DC.Title" content="Scanning for File Systems">
<meta name="product" content="">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000001284208138.html">
<meta name="prodname" content="">
<meta name="version" content="">
<meta name="brand" content="Anti-Ransomware ProtectManager">
<meta name="DC.Publisher" content="20220726">
<meta name="DC.Format" content="XHTML">
<meta name="DC.Identifier" content="EN-US_TOPIC_0000001288113686">
<meta name="DC.Language" content="en-us">
<link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
<title>Scanning for File Systems</title>
</head>
<body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px"><a name="EN-US_TOPIC_0000001288113686"></a><a name="EN-US_TOPIC_0000001288113686"></a>

<h1 class="topictitle1">Scanning for File Systems</h1>
<div id="body0000001288113686"><p id="EN-US_TOPIC_0000001288113686__p8060118">After a file name extension filtering rule is applied to a file system of a vStore, the system automatically performs file system scanning every hour. If a new file system is detected under the vStore, the file name extension filtering rule of the current vStore is synchronized to the new file system. After the new file system is added, you can manually scan the file system and synchronize the file name extension filtering rules of the current vStore.</p>
<div class="section" id="EN-US_TOPIC_0000001288113686__section78291440507"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0000001288113686__ol1498311525414"><li id="EN-US_TOPIC_0000001288113686__en-us_topic_0000001166366216_en-us_topic_0000001091431193_li1570821013536"><span>On the navigation pane, choose <strong id="EN-US_TOPIC_0000001288113686__en-us_topic_0000001337156461_b968420581014">Explore</strong> &gt; <strong id="EN-US_TOPIC_0000001288113686__en-us_topic_0000001337156461_b1768411561010">Ransomware Protection</strong> &gt; <strong id="EN-US_TOPIC_0000001288113686__en-us_topic_0000001337156461_b176841857102">Ransomware Detection</strong>.</span></li><li id="EN-US_TOPIC_0000001288113686__li5362122616287"><span>On the <span class="uicontrol" id="EN-US_TOPIC_0000001288113686__uicontrol22091226105115"><b>Detection Settings</b></span> page, click <span class="uicontrol" id="EN-US_TOPIC_0000001288113686__uicontrol18611912135117"><b>Scan</b></span>.</span></li><li id="EN-US_TOPIC_0000001288113686__li19451947195417"><span>In the displayed dialog box, click <span class="uicontrol" id="EN-US_TOPIC_0000001288113686__uicontrol15466115710236"><b>OK</b></span>.</span></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0000001284208138.html">Using Ransomware File Interception</a></div>
</div>
</div>

<div class="hrcopyright"><hr size="2"></div><div class="hwcopyright">Copyright &copy; Huawei Technologies Co., Ltd.</div></body>
</html>