<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIFS share isolation following virus identification in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147519#M9216</link>
    <description>&lt;P&gt;Hi Jenner,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best thing against malicious attacks would consist of at least the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. proper backup (plus snapshot) policy&lt;/P&gt;
&lt;P&gt;2. setup fpolicy to prevent known extensions, thus preventing encryption&lt;/P&gt;
&lt;P&gt;3. in case of a known malicious attack:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;a. Create a snapshot IMMEDIATELY so you know what is going on&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;b. either stop CIFS services&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;c. or set all CIFS shares to readonly (this will impact your business less and prevent encryption/deletion as well&lt;/P&gt;
&lt;P&gt;The steps in point 3 can be easily automated using powershell SDK or linux shell scripting depending on your environment.&lt;/P&gt;
&lt;P&gt;Make sure to make the scripting dynamic so newly created/deleted CIFS shares are automatically added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Besides that you should look into a good security information and event monitoring service so you get early alerting on when attacks happen. Unfortunately we cannot prevent such attacks but timely detection can save you loads of work and problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Xander&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2019 06:52:30 GMT</pubDate>
    <dc:creator>xandervanegmond</dc:creator>
    <dc:date>2019-03-29T06:52:30Z</dc:date>
    <item>
      <title>CIFS share isolation following virus identification</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147493#M9214</link>
      <description>&lt;P&gt;Hi, I have received a request to put together a process&amp;nbsp; tostop access to CIFS shares mapped to virtual desktops in the event of a malicous attack to limit the the impact of users inadvertantly spreading the corruption. My first thought is to simply stop sharing the individual CIFS share or disabling CIFS altogether thus disabling access completely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both would stop access to the shares but I'm wondering if there are any other options either NetApp or third party that anyone has used and would recommend?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;JennerSRB&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 12:41:07 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147493#M9214</guid>
      <dc:creator>JennerSRB</dc:creator>
      <dc:date>2025-06-04T12:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS share isolation following virus identification</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147519#M9216</link>
      <description>&lt;P&gt;Hi Jenner,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best thing against malicious attacks would consist of at least the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. proper backup (plus snapshot) policy&lt;/P&gt;
&lt;P&gt;2. setup fpolicy to prevent known extensions, thus preventing encryption&lt;/P&gt;
&lt;P&gt;3. in case of a known malicious attack:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;a. Create a snapshot IMMEDIATELY so you know what is going on&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;b. either stop CIFS services&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;c. or set all CIFS shares to readonly (this will impact your business less and prevent encryption/deletion as well&lt;/P&gt;
&lt;P&gt;The steps in point 3 can be easily automated using powershell SDK or linux shell scripting depending on your environment.&lt;/P&gt;
&lt;P&gt;Make sure to make the scripting dynamic so newly created/deleted CIFS shares are automatically added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Besides that you should look into a good security information and event monitoring service so you get early alerting on when attacks happen. Unfortunately we cannot prevent such attacks but timely detection can save you loads of work and problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Xander&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 06:52:30 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147519#M9216</guid>
      <dc:creator>xandervanegmond</dc:creator>
      <dc:date>2019-03-29T06:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS share isolation following virus identification</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147529#M9217</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/2791"&gt;@xandervanegmond&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi Jenner,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best thing against malicious attacks would consist of at least the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. proper backup (plus snapshot) policy&lt;/P&gt;
&lt;P&gt;2. setup fpolicy to prevent known extensions, thus preventing encryption&lt;/P&gt;
&lt;P&gt;3. in case of a known malicious attack:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;a. Create a snapshot IMMEDIATELY so you know what is going on&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;b. either stop CIFS services&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;c. or set all CIFS shares to readonly (this will impact your business less and prevent encryption/deletion as well&lt;/P&gt;
&lt;P&gt;The steps in point 3 can be easily automated using powershell SDK or linux shell scripting depending on your environment.&lt;/P&gt;
&lt;P&gt;Make sure to make the scripting dynamic so newly created/deleted CIFS shares are automatically added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Besides that you should look into a good security information and event monitoring service so you get early alerting on when attacks happen. Unfortunately we cannot prevent such attacks but timely detection can save you loads of work and problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Xander&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hi Xander,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply and I concur with all the points you have made. i hadn't consdiered making the CIFS shares readonly but that is a good suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jenner.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 10:12:22 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147529#M9217</guid>
      <dc:creator>JennerSRB</dc:creator>
      <dc:date>2019-03-29T10:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: CIFS share isolation following virus identification</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147538#M9218</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you want - NetApp has a full DOC about that topic - "The NetApp Solution for Ransomware"&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.netapp.com/us/media/tr-4572.pdf" target="_blank"&gt;https://www.netapp.com/us/media/tr-4572.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gidi&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 11:23:21 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/CIFS-share-isolation-following-virus-identification/m-p/147538#M9218</guid>
      <dc:creator>GidonMarcus</dc:creator>
      <dc:date>2019-03-29T11:23:21Z</dc:date>
    </item>
  </channel>
</rss>

