Revolving around the core of technology
The following alert message is not very useful. How can I know if this is a false positive. How can I find out which file(s) triggered this alert?
A security policy violation has occurred in Syncrify, resulting in this email message. Details are printing below. Client's IP Address: 192.1*.*.* Date/Time: 1/10/22 1:11 PM User Email: ***** Alert Type: POSSIBLE_RWP Message: A possible ransomware attack detected while running backup on profile: DESKTOP-******. If this is a false alarm, click 'Reset RWP' under 'Tools' menu in Syncrify Client.
Nunya,
Please refer to https://web.synametrics.com/syncrify-ransom-ware.htm to see why you're getting this warning and how to either fix or disable this feature.
Ya, cool, thx. I already knew that. How can I find which files triggered it?
Please refer to the log files on the machine where Syncrify client is running to see the file name. Refer to https://web.synametrics.com/syncrifylogfiles.htm for instructions on how to see the log files from the server's end.
Note: I have added this as a feature request to include the folder name in this alert. You will see it in the next build. Let us know if you would like to get this build before it is released publicly.