Anti-Cryptor allows you to protect your files in local directories with network access by SMB/NFS protocols from remote malicious encryption.
While the Anti-Cryptor component is enabled, Kaspersky Industrial CyberSecurity for Linux Nodes controls remote computers attempts to access files located in the shared network directories of the protected device. If the application considers a remote computer's actions on network file resources to be malicious encrypting, then this computer is added to a list of untrusted hosts and loses access to the shared network directories. The application does not consider activity to be malicious encryption if it is detected in the directories excluded from the protection scope of the Anti-Cryptor component.
For the Anti-Cryptor component to operate correctly, at least one of the services (Samba or NFS) must be installed in the operating system. For the NFS service, the rpcbind package must be installed.
Anti-Cryptor operates correctly with the SMB1, SMB2, SMB3, NFS3, TCP/UDP, and IP/IPv6 protocols. Working with NFS2 and NFS4 protocols is not supported. It is recommended to configure your server settings so that the NFS2 and NFS4 protocols cannot be used to mount resources.
Anti-Cryptor does not block access to network file resources until the device activity is identified as malicious. So at least one file will be encrypted before the application detects a malicious activity.
Anti-Cryptor settings
Setting |
Description |
---|---|
Anti-Cryptor protection enabled / disabled |
This toggle button enables or disables protection of files in the local directories with network access by SMB/NFS protocols from remote malicious encryption. The toggle button is switched off by default. |
Protection scopes |
Clicking the Configure protection scope link opens the Protection scopes window. |
Untrusted hosts blocking enabled / disabled |
This toggle button enables or disables untrusted hosts blocking. This toggle switch is turned off by default. |
Block untrusted host for (min) |
In this field you can specify the untrusted device blocking duration in minutes. After the specified time is reached, Kaspersky Industrial CyberSecurity for Linux Nodes removes untrusted hosts from the list of blocked hosts. The access of the host to network file resources is restored automatically, after it is deleted from the list of untrusted hosts. If a compromised host is blocked and you change this setting value, the blocking time for this host will not change. The blocking time is not a dynamic value, and it is calculated at the moment of blocking. Available values: integer from The default value is |
Exclusions |
Clicking the Configure exclusions link opens the Exclusion scopes window. |
Exclusions by mask |
Clicking the Configure exclusions by mask link opens the Exclusions by mask window. |