Threat Indicators Report for Threat Scan

The Threat Indicators Report summarizes the file data-related anomalies on backed-up files. The report also allows you to mark bad or corrupted files so that clean versions of data will be recovered automatically.

To generate the report, Commvault Cloud uses the following techniques to find corrupted files:

  • Threat Analysis: Analyzes backup content in files and file systems to discover possible malware infections. All backup data is recovered to the scanning server, scanned for malware, and then immediately removed from the cache. When malware threats are found, no action is required. The system automatically quarantines these threats so any restore operations will not reinfect the server, thus minimizing the impact of reinfection and impact on your recovery objectives.

  • File Data Analysis: Analyzes backup content for unusual file changes (which can be caused by encryption) and file corruption (which can be caused by ransomware or other threats). File data analysis utilizes several techniques for detection, including reading and previewing files, analyzing files for high levels of entropy, and analyzing SIM hash changes across multiple versions of backed up files. When suspicious files are detected, the user can view these files on the Threat Indicators dashboard,

The following options are available in the upper-right corner of the page in the report:

  • To delete anomalies of a server with unusual file data-related activity, from the client list in the report, click Delete anomaly.

  • To restore a file from a server that has unusual file data-related activity, click Recover files.

    By default, the Browse option lists the previous good version of files available in latest cycle. If there are no good versions available in the latest backup cycle, the files are not listed.

    The file version prior to the anomaly is recovered.

Report Description

The Threat Indicators Report is divided into tiles, charts, and a table.

Threat Indicators Report Tiles

Total Files

This tile displays the total number of files analyzed on the selected server.

Total Size

This tile displays the total size of the files analyzed.

Suspicious Files

This tile displays the number of suspicious files found.

Suspicious File Size

This tile displays the total size of the suspicious files.

Threats Detected

This tile displays the total number of threats detected (that is, possible malware).

Marked as Corrupt

This tile displays the number of files marked as "Corrupt" on the selected server.

Threat Indicators Report Charts

Suspicious File Types

This chart displays the number of suspicious files based on file type.

The following image is an example of the Suspicious File Types chart:

suspicious_file_types_chart

Suspicious Files and Threats

This chart displays the number of suspicious files found and threats detected.

The following image is an example of the Suspicious Files and Threats chart:

suspicious_files_and_threats

Suspicious Activity Timeline

This chart displays a trending timeline, showing the number of files impacted during a specified time range.

The following image is an example of the Suspicious Activity Timeline chart:

suspicious_activity_timeline

Suspicious Files Table

The following table includes descriptions of columns in the Suspicious Files table.

Column

Description

File Path

The path to the affected file.

Versions

The number of versions of the affected file.

Actions

  • To restore a good version of the file, click the action button action_button, and then click Restore.

    The version of the file that existed before the anomaly is restored.

  • To ignore an anomaly, click the action button action_button, and then click Mark safe.

  • To download the file that has the anomaly, click the action button action_button, and then click Download.

  • To view all the affected files in a file path, click the action button action_button, and then click Open folder.

    A window that lists all the affected files in the file path appears. You can ignore, download, or restore the good version of all the affected files.

To see all file versions for a set of files, click the down arrow Threat Indicators Report for File Data-Related Anomalies (2) next to a file path. The following columns will appear in the Suspicious files sub-table:

Column

Description

File name

The path to the affected set of files.

Modified time

The number of file versions analyzed.

Suspicious

Indicates if the system identifies the file as suspicious.

Marked corrupt

Indicates if a user has already marked a version of file corrupt.

Backup job ID

The ID of the backup job that backed up that file.

Actions

  • To ignore an anomaly for a version of a file, click the action button action_button, and then click Mark safe.

  • To mark a version of a file as corrupt, click the action button action_button, and then click Mark corrupt. The file will be quarantined at the index layer, thus ensuring that any restore operations will recover clean versions of the files.

To see detailed information for a file, do the following:

  • Click the name of the file.

    A window appears, showing a preview of the file (if available), the status of the file, the entropy value, the file path, the file's modified time, the backup job ID for the file, and the file's owner.

    Note

    The entropy value is displayed only if the file's entropy value is 6 or higher (on a scale from 1 to 8).

  • To download the file to your computer, click the Download button (if available).

Loading...