@DustinB3403 said in Tracking user steps on files:
@crustachio has the answer you need.
Although I don't know how you'd be able to get copy records....
Not natively. Possibly with third party tools but it's not surefire.
@DustinB3403 said in Tracking user steps on files:
@crustachio has the answer you need.
Although I don't know how you'd be able to get copy records....
Not natively. Possibly with third party tools but it's not surefire.
@Dashrender said in How Do So Many People in IT Not Know What a Database Is?:
@crustachio said in How Do So Many People in IT Not Know What a Database Is?:
Fast forward a few years and the next wave of IT pro's will be lamenting how the "old guys" can't tell the difference between a container, an application and a VM.
Sadly I'm there right now.
It's a funny feeling, isn't it? Knowing that technology will absolutely pass you by, if it hasn't already, in some respects. And being able to do little about it.
Not saying we can't learn about containers or whatever the technology du jour is. But the momentum, the "push" of the industry just tends to slide past us when we're not looking.
Fast forward a few years and the next wave of IT pro's will be lamenting how the "old guys" can't tell the difference between a container, an application and a VM.
It's all the same, right?
@scottalanmiller I imagine the hacker world operates like anything else: Don't work any harder than you have to. It appears the well of ransomware victimes is still deep and easily accessible, so why spend time actively exploiting what is, by comparison to the whole spectrum of ransomware victims, a niche case?
If and when the gravy train slows down for ransomware perpetrators, I imagine they'll get more vicious.
Oh right right. Derp. I was assuming we were talking about getting a hack on the backup host, but right, if it's on a user PC or whatever then yes, that gap is valuable.
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@crustachio said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@scottalanmiller If CryptoLocker exists that can manipulate the binaries of backup software, we're all !@&ed
I'm going out on a @Dashrender limb here (He knows what I mean) but I think we have to assume that this is either here, or right around the corner as a risk vector.
OK, I'll grant that. So what's your recommendation? You said earlier to put backup software on a machine in front of the NAS. Now what?
/devilsadvocate
Don't forget you can define standalone service accounts for Veeam itself on the host machine. It doesn't have to run as the local user/admin/etc.
@scottalanmiller If CryptoLocker exists that can manipulate the binaries of backup software, we're all !@&ed
@scottalanmiller all the software I have used accesses remote storage using credentials supplied within the application. In Veeam, for instance, you can choose unique credentials when adding the backup repository:
You could be running Domain Admin on the backup host machine, but Domain Admin has no permissions on the NAS share.
A cryptolocker ran on the Domain Admin account on that machine would encrypt all the local files and share-accessible files, but since the Domain Admin has no permissions on the NAS, it's safe.
Also, to the OP's question... isn't any backup software capabl;e
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
- Software that can isolate backup destination to protect from ransom-ware so that PC got infected will not effect backup target.
Isn't any backup software capable of this? As long as your backup storage target has unique permissions that can't be mapped, browsed or written by any domain users, the software you choose is irrelevant.
@scottalanmiller said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
@openit said in PCs Backup software that can isolate backup destination to protect from Ransomware virus.:
The backup destination will be NAS box and we got around 100 PCs.
You must have a backup server in place between the PCs and the NAS in order to have any protection against ransomware, otherwise the ransomware can attack the NAS directly using the same permissions as the backup mechanism on the PCs.
NAS snapshots could mitigate this risk. Just like Exablox advertises Continuous Data Protection (CDP) as a remedy to ransomware - you can go back to any snapshot in 10 second intervals out until your retention policy limit (file level or share level).
Even basic QNAP and Synology boxes offer scheduled snapshots. Not necessarily a replacement for an intermediate backup server, just an option to consider.
@alex.olynyk I can't remember specifically. I know there are differences depending on which model Fire you have. I have the plain jane, bargain basement one, it was like $30 last year on Black Friday. I think it's just called the Kindle Fire, not the HD. Anyway, I used instructions from XDA forums. Wasn't too bad. The Fire HD's could be completely different beasts.
Can you wait until all the Black Friday sales start in earnest? Tablets are always a big discount item.
Actually the Amazon Fire devices have great hardware for the price, and they can be rooted easily enough and replaced with CyanogenMod + Play store. Just sayin
I actually just started test UrBackup last week myself, kind of in the same boat. Works pretty good, not nearly as pretty as the paid competitors but for standalone physical boxes it makes for a nice free incremental backup tool. Biggest downside I see is there is no dedupe or compression facility whatsoever and therefore you have to rely on the storage target's filesytem level capabilities for that. But still, beggar's can't be choosers.
Choose Make Secret first
You can't make a pulbic playlist collaborative
Nice, mostly offsets the upcoming 11/1 price increase
for lifetime though!
@Kelly I appreciate your opinion, but I think it's important not to be dismissive until you try it. Many many people thought the concept of an entirely touchscreen phone with no physical keys was gimmicky as well.
For keyboard warriors, this opens up the world of GUI-oriented contextual shortcuts without needing to memorize hundreds of keyboard shortcut combos per app. To say nothing of the completely unique UI opportunities that arise from hands-on manipulation of live controls, as demonstrated in the Photoshop and DJ demos.
That Photoshop demo was legit. Mock if you wish, but this is a great arrow in the quiver for power users in almost any context.