The table describes all available values and the default values of all the settings that you can specify for the Anti-Cryptor task.
Anti-Cryptor settings
Setting |
Description |
Values |
|---|---|---|
|
Enables or disables blocking of untrusted computers. If blocking of untrusted computers is disabled, the application still scans remote computers actions on network file resources for malicious encryption, when the Anti-Cryptor task is running. If malicious activity is detected, the |
|
|
Specifies the amount of time an untrusted computer is blocked (in minutes). If a compromised computer is blocked, and you change the value of the |
Integer from The default value is |
|
Enables or disables exclusion of objects specified by the This setting only applies if the |
|
|
Specifies a list of masks that define objects to be excluded from the protection scope. Before specifying this setting, make sure the Masks are specified in command shell format. If you want to specify several masks, specify each mask on a new line with a new index ( |
The default value is not defined. |
The [ScanScope.item_#] section contains the scopes protected by the application. For the Anti-Cryptor task, you need to specify at least one protection area; you can only specify shared directories. You can define several [ScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ScanScope.item_#] section contains the following settings: |
||
|
Specifies the name of the protection scope. |
Default value: |
|
Enables or disables protection of the specified scope. |
|
|
Specifies the path to the objects to be protected. |
Absolute path accessible via SMB/NFS (for example,
|
|
Specifies a command line shell mask that defines the objects to be protected. You can specify several |
Default value: |
The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section are not scanned. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can define several [ExcludedFromScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ScanScope.item_#] section contains the following settings: |
||
|
Specifies the name of the scope to be excluded from scans. |
Default value: |
|
Specifies whether the designated scope will be excluded from protection. |
|
|
Specifies the path to the objects to be excluded from protection. You can specify only an absolute path to a local directory (for example, You can use masks to specify the path. |
The default value is not defined. |
|
Specifies a command line shell mask that defines the objects to be excluded from protection. You can specify several |
Default value: |