Anti-Ransomware FAQs

  1. Does Anti-Ransomware function along with anti-virus solution or as a replacement?

    Anti-Ransomware does not replace anti-virus software; rather, it coexists with it to provide an additional layer of protection against ransomware and helps with instant file recovery.

  2. How much system resource does Anti-Ransomware utilize?

    Anti-Ransomware is a lightweight application that consumes negligible system resources. The CPU usage is less than 1% , and the RAM utilization is less than 100MB.

  3. Does Anti-Ransomware need to be tuned or baselined before going to production?

    No, Anti-Ransomware does not need tuning or baselining before being deployed to a production environment. Focusing on the user's Out-Of-Box experience, Anti-Ransomware is incredibly simple to set up and use right after installation.

  4. Does Anti-Ransomware work when the device is offline?

    Anti-ransomware offers offline native protection, allowing devices to be continuously monitored even when they are not connected to the network. This is possible since Anti-Ransomware is not cloud dependent, and unlike traditional antivirus solutions, there is no need to update signature files on a regular basis.

  5. Does Anti-Ransomware scan my systems periodically?

    No, Anti-Ransomware does not scan your systems periodically. Rather, it conducts a real-time analysis of the systems, continuously monitoring them in order to detect and report a ransomware attack as quickly as possible.

  6. Can Anti-Ransomware detect other malware attacks?

    Currently, Anti-Ransomware solution is designed to specifically detect ransomware attacks only.

  7. Are macOS and Linux supported?

    Anti-Ransomware currently supports only Windows operating system.

  8. Why is my recovered file a 3 hour older version?

    Microsoft's Volume Shadow Copy Service (VSS) is utilized to obtain shadow copies of the data stored on your device, every three hours. As a rest, the recovered file is from the most recent backup cycle which could be 3 hours old.

  9. Why am I unable to delete VSS snapshots?

    Anti-Ransomware's VSS recovery is protected by a patented tamper-proof technique ensuring that ransomware does not encrypt or delete the backup data when an attack occurs. This also prevents any accidental or intentional deletion of backups by the user.

  10. Where is my data backup stored?......

    The shadow copies of all the files on an endpoint are stored on the endpoint itself. These shadow copies are further tamper-protected and take up negligible system resources for storage.

  11. Does Anti-Ransomware interfere with other programs?

    Anti-Ransomware is built to work alongside other programs in your network without interfering with their functionality.

  12. How long does it take to start protecting from ransomware after deployment?

    Anti-Ransomware starts functioning nearly immediately after being deployed onto the network.

  13. Should the system be restarted after deploying Anti-Ransomware?

    No, the system need not be restarted after deploying the Anti-Ransomware tool.

  14. How much network bandwidth is consumed by the Anti-Ransomware agent ?

    The network bandwidth consumption of Anti-Ransomware is nil. This distinguishes Anti-Ransomware from other cloud-based EDR and Anti-Virus solutions because there is no need to often fetch signature database files, which cuts network traffic.

  15. Can Anti-Ransomware protect against file-less attacks?

    File-less attacks are particularly difficult to detect since they leave little or no trace on the system. However, Anti-Ransomware's patented ML-assisted behavior detection technique makes it possible to detect file-less attacks on the network.

  16. How to restore files encrypted by ransomware when Anti-Ransomware has not raised any alerts?

    The files encrypted by ransomware can be restored as long as backup is available even if the incident was not raised as an alert.

  17. How to prevent the user from stopping/killing the Anti-Ransomware agent?

    Anti-Ransomware employs anti-hook and anti-kill methods to keep users from killing the agent.

  18. How can the admin stop the Anti-Ransomware agent.

    The admin can stop the Anti-Ransomware agent by terminating the commands.