Anti-Cryptor task settings
February 8, 2024
ID 15170
The table describes all available values and the default values of all the settings that you can specify for the Anti-Cryptor task.
Anti-Cryptor task settings
Setting | Description | Values |
---|---|---|
| Enables or disables blocking of untrusted computers. If blocking of untrusted computers is disabled, the application still scans remote computers actions on network file resources for malicious encryption, when the Anti-Cryptor task is running. If malicious activity is detected, the |
|
| Specifies the amount of time an untrusted computer is blocked (in minutes). If a compromised computer is blocked, and you change the value of the | Integer from The default value is |
| Enables or disables exclusion of objects specified by the This setting only applies if the |
|
| Excludes objects from the protection scope by names or masks. You can use this setting to exclude an individual file from the specified protection scope by name or exclude several files at once using masks in the shell format. Before specifying a value for this setting, make sure that the If you want to specify several masks, specify each mask on a new line with a new index ( | The default value is not defined. |
The [ScanScope.item_#] section contains the scopes protected by the application. For the Anti-Cryptor task, you need to specify at least one protection scope; you can only specify shared directories. You can define several [ScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ScanScope.item_#] section contains the following settings: | ||
| Description of protection scope; contains additional information about the protection scope. | Default value: |
| Enables protection of the specified scope. To run the task, enable protection of at least one scope. |
|
| Protection scope limitation. Within the protection scope, the application protects only the files that are specified using the masks in the shell format. You can specify several | Default value: |
| Path to the directory with the objects to be protected. |
|
The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section are not scanned. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can define several [ExcludedFromScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ExcludedFromScanScope.item_#] section contains the following settings: | ||
| Description of the protection exclusion scope, which contains additional information about the exclusion scope. | Default value: |
| Excludes the specified scope from protection. |
|
| Limitation of the protection exclusion scope. In the exclusion scope, the application excludes only the objects that are specified using masks in the shell format. You can specify several | Default value: |
| Path to the directory with objects excluded from protection. |
|