nunya
Jan 10, 2022 1:21:13 PM

Syncrify Devs should be ashamed and fired

The following alert message is not very useful. How can I know if this is a false positive. How can I find out which file(s) triggered this alert?

 

A security policy violation has occurred in Syncrify, resulting in this email
message. Details are printing below.

Client's IP Address:             192.1*.*.*
Date/Time:                       1/10/22 1:11 PM
User Email:                      *****
Alert Type:                      POSSIBLE_RWP
Message:                         A possible ransomware attack detected while running backup on profile: DESKTOP-******. If this is a false alarm, click 'Reset RWP' under 'Tools' menu in Syncrify Client.



Synametrics support engineer
Jan 10, 2022 1:35:42 PM

Syncrify Devs should be ashamed and fired

Nunya,

Please refer to https://web.synametrics.com/syncrify-ransom-ware.htm to see why you're getting this warning and how to either fix or disable this feature.

 



Anonymous
Jan 10, 2022 1:54:35 PM

Syncrify Devs should be ashamed and fired

Ya, cool, thx. I already knew that. How can I find which files triggered it?



Synametrics support engineer
Jan 10, 2022 2:30:50 PM

Syncrify Devs should be ashamed and fired

Please refer to the log files on the machine where Syncrify client is running to see the file name. Refer to https://web.synametrics.com/syncrifylogfiles.htm for instructions on how to see the log files from the server's end.

Note: I have added this as a feature request to include the folder name in this alert. You will see it in the next build. Let us know if you would like to get this build before it is released publicly.

Navigation

Social Media

Powered by 10MinutesWeb.com