Skip to main content
All CollectionsCyber ResilienceRansomware Recovery
Overview page for Ransomware Recovery
Overview page for Ransomware Recovery
Updated over 3 months ago

It is the first page you see when you click Global Navigation icon > Cyber Resilience > Ransomware Recovery, and it provides information about:

The sections of the page are described below.

Last Updated at <date timestamp> UTC

Displays the most recent date and timestamp (UTC) when the data was refreshed.

Quarantined Resources

RR_overview_Quarantine Bay.png
Quarantined Resources_overview_marked.png

The following table describes the information in the Quarantined Resources section:

Field

Description

Resources

Shows the total number of active quarantined resources. The resources can be Endpoints, Microsoft 365, Google Workspace, File Servers, NAS devices, or VMware. You can view the individual count details of active and latest quarantined resources for each resource-Endpoints, Microsoft 365, Google Workspace, File Servers, NAS devices, or VMware using the graphical representation. The X-axis displays the specific date when the resource was last quarantined while the Y-axis displays the corresponding count of quarantined resources. For more information, see,

Curated Snapshots

CS_overview_updated.png

The following table describes the information in the Curated Snapshots section:

Field

Description

Curated Snapshots

Shows the total number of active curated snapshots created for your resources. Resources can be Endpoints, File Backupsets (File Servers, or NAS devices), or Microsoft 365 (OneDrive, SharePoint). You can view the individual count details of active and latest Curated Snapshots for each resource-File Backupsets (File Servers, or NAS devices), or Microsoft 365 (OneDrive, SharePoint) using the graphical representation. The X-axis displays the specific date and time when the curated snapshot was last created while the Y-axis displays the corresponding count of curated snapshots created for your resources. For more information, see Curated Snapshots.

Data

Shows the total size of the data within the active curated snapshots created for your resources. For more information, see Curated Snapshots.

Malicious File Scan

Malicious File Scan_overview.png

The following table describes the information in the Malicious File Scan section:

Field

Description

Total Malicious File Scan

Shows the total number of Malicious File Scan jobs run for your resources in the past 30 days. Resources can be Endpoints, File Servers, NAS devices, or VMware.

Files Blocked

Shows the total number of malicious files that were blocked out of the total number of files selected for restore for your resources in the past 30 days. Resources can be Endpoints, File Servers, NAS devices, or VMware.

File Scan Skipped

Shows the total number of files that were skipped from the scan out of the total number of files selected for restore for your resources in the past 30 days. Resources can be Endpoints, File Servers, NAS devices, or VMware.

Clean Files

Shows the total number of files that were found safe out of the total number of files selected for restore for your resources in the past 30 days. Resources can be Endpoints, File Servers, NAS devices, or VMware.

#Files Scanned

The X-axis on the graphical representation displays the number of files scanned for your resources. Resources can be Endpoints, File Servers, NAS devices, or VMware.

Restore File Status in Last 30 days

The Y-axis on the graphical representation displays the status of file restores for the last 30 days for your resources. Resources can be Endpoints, File Servers, NAS devices, or VMware. Hover over the bar graph to view details.

Unusual Data Activity-Alerts Activity

UDA_AlertActivity_Jan 25.png

The following table describes the information in the Unusual Data Activity-Alerts Activity section for the last 60 days:

Field

Description

Anomalous Snapshot

Shows the total number of anomalous snapshots for which Unusual Data Activity alerts were generated for your resources. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive). For more information, see Unusual Data Activity.

Impacted Resources

Shows the total number of impacted resources on which unusual data activity was identified. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive). For more information, see Unusual Data Activity.

Deletion Alert

Shows the total number of alerts generated for deletion of files from the snapshot. For more information, see Unusual Data Activity.

Encryption Alert

Shows the total number of alerts generated for encryption of files. For more information, see Unusual Data Activity.

Creation Alert

Shows the total number of alerts generated for the creation of too many files. For more information, see Unusual Data Activity.

Modification Alert

Shows the total number of alerts generated for the modification or edits of too many files. For more information, see Unusual Data Activity.

# Total Alerts

The X-axis on the graphical representation displays the total number of alerts generated for Unusual Data Activity for your resources. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive). For more information, see Unusual Data Activity.

Alerts in Last 30 days

The Y-axis on the graphical representation displays the number of anomalous snapshots for which Unusual Data Activity alerts were generated on specific days over a span of the last 30 days for your resources. Resources can be Endpoints, File Servers, NAS devices,VMware, or Microsoft 365 (SharePoint and OneDrive). Hover over the bar graph to view details. For more information, see Unusual Data Activity.

Unusual Data Activity-Service Status

UDA_Service Status.png

The following table describes the information in the Unusual Data Activity-Service Status section:

Field

Description

Total Resources

Shows the total number of resources present.

Healthy Resources

Shows the total number of resources that were found safe out of the total number of resources for which Unusual Data Activity alerts were generated. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive). For more information, see Unusual Data Activity.

Impacted Resources

Shows the total number of resources that were found infected out of the total number of resources for which Unusual Data Activity alerts were generated. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive). For more information, see Unusual Data Activity.

Not Scanned Resources

Shows the total number of resources that were not scanned for Unusual Data Activity. Resources can be Endpoints, File Servers, NAS devices, VMware, or Microsoft 365 (SharePoint and OneDrive).


πŸ“ Note: This count includes:

  • Resources for which the learning period is in progress for the data backup pattern analysis

  • Resources for which the snapshot does not comply with the minimum files required parameter


For more information, see Unusual Data Activity.

Details for each resource for Unusual Data Activity (UDA)

  • Endpoint

  • File Server

  • NAS

  • VMware

  • Microsoft 365

Shows the UDA service status for each resource. Hover over the graph to view the details. For more information, see Unusual Data Activity.


πŸ’‘ Tip

If you encounter UDA errors for VMware resources, see VMware errors for UDA to resolve them.


Did this answer your question?