I'm going to have to go with B). Turning on that ransomware-like behavior rule is the way to go. Gotta stay one step ahead of those sneaky ransomware guys, am I right?
D) Start in the monitored policy until it's clear no attacks are happening? Seriously? That's like putting your head in the sand and hoping for the best. Not a fan.
Hmm, I'm not sure I trust the analytics to handle this. I'd go with A) Look at current attacks to see if the software is vulnerable. Better to be safe than sorry, you know?
C) Recognize that analytics will automatically block the attacks that may occur seems like a pretty convenient and hands-off approach. I'm all for that!
I think the most effective way is B) Turn on the performs ransomware-like behavior rule in the policies. That's the best way to proactively detect and block ransomware attacks.
Fausto
4 months agoGoldie
4 months agoMike
3 months agoAileen
3 months agoSarah
3 months agoRonny
3 months agoZoila
4 months agoHerman
3 months agoJulieta
4 months agoRosendo
4 months agoNan
3 months agoLorrine
3 months agoBettye
3 months agoArlie
4 months agoBarney
5 months agoHannah
5 months agoChristene
3 months agoElmira
4 months agoAdelle
4 months agoEthan
5 months agoBarney
5 months ago