Javascript must be enabled to download our products and perform other essential functions.

ionicons-v5-m
ionicons-v5-j
Buy Now Download Free Trial
ionicons-v5-m
ionicons-v5-f

Back to Setup Guide for Ransomware Protection

Run an External Program During a Ransomware Attack

Some customers have come up with their own mitigation techniques during a ransomware attack. These might involve removing user rights from directories, forcing a logout of a user account, etc.

To run an external program as an action in response to the monitor detecting active ransomware activity, use the Start Application action.

Run an application during a ransomware attack
ionicons-v5-h

IMPORTANT: When setting up the Start Application action it is important to pay attention to where the application/program is going to be run. This is shown near the top of the action configuration dialog.

Sometimes things have to be said twice, your support simply rocks. This industry would be way more fun if most other companys we work with would at least try to reach 50% of what you deliver.

Hanjo P., Pohlmann & Dimai GbR, Germany ionicons-v5-b