ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Backup File Server to DAS

    IT Discussion
    das storage backup file server
    13
    497
    363.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jason Banned @Dashrender
      last edited by

      @Dashrender said:

      Would hiding the shares with a $ make any difference in this situation?

      doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @Jason
        last edited by

        @Jason said:

        @Dashrender said:

        Would hiding the shares with a $ make any difference in this situation?

        doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

        Which means that the ransomeware code is not going to hide it either. Likely it won't even notice that you've attempted to hide something. Much like MS Office security, open those files with something other than MS Office and that private data hidden in there is exposed in such a way that the people using it are not even aware that you thought that you were hiding it.

        DashrenderD 1 Reply Last reply Reply Quote 1
        • IT-ADMINI
          IT-ADMIN
          last edited by

          wow, those ransomware are scary, did anyone experience them ?? i think it is very rare to get affected by them ??

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @IT-ADMIN
            last edited by

            @IT-ADMIN said:

            wow, those ransomware are scary, did anyone experience them ?? i think it is very rare to get affected by them ??

            Very common, actually. Go on Spiceworks and someone gets one nearly once a week. They are the biggest threat in IT right now. It's VERY scary.

            There is a reason why people are moving to fully decoupled backup systems across the board (never running the backup software from the same system.) Because they need the protection for normal issues like ransonware. Anything talking over DAS, NAS or SAN protocols is vulnerable, extremely vulnerable.

            You ideally want stuff that is offline like tape but most make due with systems that at least have an air cap like Unitrends.

            1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @scottalanmiller
              last edited by

              @scottalanmiller said:

              @Jason said:

              @Dashrender said:

              Would hiding the shares with a $ make any difference in this situation?

              doubt it, that's not really hidden, it's up to the client device to hide it from the end user. Windows explorer hides it from the user. Linux and others do not.

              Which means that the ransomeware code is not going to hide it either. Likely it won't even notice that you've attempted to hide something. Much like MS Office security, open those files with something other than MS Office and that private data hidden in there is exposed in such a way that the people using it are not even aware that you thought that you were hiding it.

              LOL - wow.. I didn't know that about that feature. I'll try to remember to remind others it's really a pointless feature.

              1 Reply Last reply Reply Quote 0
              • dafyreD
                dafyre @IT-ADMIN
                last edited by

                @IT-ADMIN said:

                @scottalanmiller said:

                @IT-ADMIN said:

                how to make a NAS not mapped, is it by using username and password right ??

                Simply don't map it! 🙂

                great, so i shouldn't create a map drive (pointing to NAS) in the server sending the backup to the NAS

                You can configure that in Veeam so that it doesn't need the mapped drive. However, as others have mentioned, I would create an AD account specifically for backups. Create your share on the NAS so that only the backup account has access to it.

                1 Reply Last reply Reply Quote 1
                • IT-ADMINI
                  IT-ADMIN
                  last edited by

                  i think those ransomware engineers attack US businesses, because they know that the core economy reside in USA, they will not spend their time to attack worthless data of business in countries like qatar, lol

                  scottalanmillerS 2 Replies Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    And backup the NAS to something that goes offline, like a USB external drive or tape.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @IT-ADMIN
                      last edited by

                      @IT-ADMIN said:

                      i think those ransomware engineers attack US businesses, because they know that the core economy reside in USA, they will not spend their time to attack worthless data of business in countries like qatar, lol

                      That's not in any way how any of this works.

                      http://www.joeyoungblood.com/wp-content/uploads/2015/02/reddit-thats-not-how-this-works.jpg

                      1 Reply Last reply Reply Quote 0
                      • IT-ADMINI
                        IT-ADMIN
                        last edited by

                        hhhhhhhhhhhhhhhhhhhhhhhhhh

                        1 Reply Last reply Reply Quote 0
                        • IT-ADMINI
                          IT-ADMIN
                          last edited by

                          images.png

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @IT-ADMIN
                            last edited by

                            @IT-ADMIN said:

                            i think those ransomware engineers attack US businesses, because they know that the core economy reside in USA, they will not spend their time to attack worthless data of business in countries like qatar, lol

                            That you have said this makes you the absolute most likely candidate for this to happen to. This is the least secure thinking I could imagine.

                            Why do you feel that ransomware "targets" anyone? It does not. It hits everyone. EVERYONE. There is no concept of "don't take HIS money, he doesn't have a lot." That's crazy. They aren't going to waste their own time and effort avoiding you, if you can afford the ransom they will just shut you down and use you as an example to others. They have no way to know, nor would they care, that you are in Qatar.

                            Take a moment to empathize with ransomware writers, their goals, their effort, how this works. Clearly being in Qatar provides you absolutely zero protection from this. If anything it makes it far more likely because you do business with similar insecure companies.

                            DashrenderD 1 Reply Last reply Reply Quote 0
                            • IT-ADMINI
                              IT-ADMIN
                              last edited by

                              now i see, and how people get affected by this damn ransomware, ??
                              spam emails or maybe an affected USB ???
                              so that we can take our precaution

                              DustinB3403D scottalanmillerS dafyreD 4 Replies Last reply Reply Quote 0
                              • DustinB3403D
                                DustinB3403 @IT-ADMIN
                                last edited by

                                @IT-ADMIN said:

                                now i see, and how people get affected by this damn ransomware, ??
                                spam emails or maybe an affected USB ???
                                so that we can take our precaution

                                All of the above are sources of Ransomware.

                                1 Reply Last reply Reply Quote 0
                                • IT-ADMINI
                                  IT-ADMIN
                                  last edited by

                                  first-screen.png

                                  very scaaaary, i hope never waking up in the morning with a screen like this, damn

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @IT-ADMIN
                                    last edited by

                                    @IT-ADMIN said:

                                    now i see, and how people get affected by this damn ransomware, ??
                                    spam emails or maybe an affected USB ???

                                    Anything could do it.

                                    1 Reply Last reply Reply Quote 0
                                    • dafyreD
                                      dafyre @IT-ADMIN
                                      last edited by

                                      @IT-ADMIN said:

                                      now i see, and how people get affected by this damn ransomware, ??
                                      spam emails or maybe an affected USB ???
                                      so that we can take our precaution

                                      Pretty much all of those. All it takes is one person to pick up a strange USB device and plug it in at their office computer... or to click one bad link in an email... or even one malicious ad on a legit website (https://blog.malwarebytes.org/malvertising-2/2015/08/angler-exploit-kit-strikes-on-msn-com-via-malvertising-campaign/)

                                      1 Reply Last reply Reply Quote 1
                                      • DashrenderD
                                        Dashrender @scottalanmiller
                                        last edited by

                                        @scottalanmiller said:

                                        Why do you feel that ransomware "targets" anyone? It does not. It hits everyone. EVERYONE. There is no concept of "don't take HIS money, he doesn't have a lot."

                                        This is the problem. For some reason, people (in general) think that there is someone at a keyboard running these virii. They clearly don't understand that they are completely automated and are happy to steal $0.01 vs 1 billion dollars. And by happy I mean, no feelings at all.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 2
                                        • scottalanmillerS
                                          scottalanmiller @IT-ADMIN
                                          last edited by

                                          @IT-ADMIN said:

                                          so that we can take our precaution

                                          • Never use software from third parties like download sites.
                                          • Never use cracked software
                                          • Keep your systems fully up to date and patched
                                          • Run the latest software, not old versions
                                          • Follow the principle of least necessary privilege
                                          • Never let users be administrators
                                          • Use a good AntiVirus like WebRoot and keep it updated
                                          • Use a good firewall with Layer 7 filtering, like Palo Alto
                                          • Restrict what users can do on the network, like going to random websites or inserting USB sticks
                                          • Move from file servers to decoupled storage like many cloud products have
                                          • Use decoupled backups
                                          • Use backup media that is offline (like tape)
                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @Dashrender
                                            last edited by

                                            @Dashrender said:

                                            @scottalanmiller said:

                                            Why do you feel that ransomware "targets" anyone? It does not. It hits everyone. EVERYONE. There is no concept of "don't take HIS money, he doesn't have a lot."

                                            This is the problem. For some reason, people (in general) think that there is someone at a keyboard running these virii. They clearly don't understand that they are completely automated and are happy to steal $0.01 vs 1 billion dollars. And by happy I mean, no feelings at all.

                                            And also happy if you cannot pay and will just post online about how you lost everything and went out of business because that makes them money too from other companies that now know that they will have to pay.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 11
                                            • 12
                                            • 13
                                            • 14
                                            • 15
                                            • 24
                                            • 25
                                            • 13 / 25
                                            • First post
                                              Last post