Enabling Ransomware Protection on HyperScale Edge

You can enable ransomware protection for a HyperScale Edge node. The software enables ransomware protection for the backup data, the Commvault metadata on the Commvault Cloud Backup Gateway computer.

Note

Ransomware protection is automatically enabled on new installations of the HyperScale Edge node.

Before You Begin

  • Review the system requirements and the considerations for ransomware protection.

  • If any disk libraries or mount paths that are mounted are already present on the HyperScale Edge node, you must take a backup of the /etc/fstab system file.

  • If the HyperScale Edge node is a client computer, make sure that there are no active backup or restore operations running on the node.

Procedure

  1. Turn on the maintenance mode for the Commvault Cloud Backup Gateway available in the node.

  2. Login to a node.

  3. Go to the /opt/commvault/MediaAgent64 directory.

  4. Run the following command to enable ransomware protection:

    ./cvsecurity.py enable_protection -i InstanceID

    Where:

    InstanceID is the ID of the instance. For example, Instance001.

  5. Reboot the node for the ransomware protection to take effect.

    The reboot operation is required only when you enable the protection for the first time.

  6. Repeat the above steps on all the nodes in the HyperScale environment.

  7. Turn off the maintenance mode on all the Commvault Cloud Backup Gateway available in the nodes.

Result

Ransomware will be enabled in the HyperScale Edge node and can be viewed as follows:

  1. From the navigation pane, go to Manage > Infrastructure.

    The Infrastructure page appears.

  2. Click the Commvault Cloud Backup Gateway tile.

    The Commvault Cloud Backup Gateways page appears.

  3. Click the HyperScale Edge node in which you enabled ransomware

    In the Control section, the Ransomware Protection toggle key will be enabled. (The toggle key will appear grayed out.)

Additional Information

  • The software logs the activities of the ransomware protection in the /var/log/cvsecurity.log file.

  • The software logs any unauthorized activities in the /var/log/audit/audit.log file.

Loading...