In order to enable ransomware prevention, Standard or Aggressive ransomware policies must be defined. Enhanced ransomware prevention rules can be enabled based on reputation or application path. The operation, Performs ransomware-like behavior must be selected.
**\*.a3x **\*.bat **\*.bin **\*.btm **\*.cmd **\*.com **\*.dll → Please test prior to implementing, particularly when using full drive encryption **\*.doc **\*.docb **\*.docm **\*.docx **\*.dotm **\*.exe **\*.js **\*.jse **\*.jsx **\*.pot **\*.potm **\*.potx **\*.ppam **\*.pps **\*.ppsm **\*.ppsx **\*.ppt **\*.pptm **\*.pptx **\*.ps1 **\*.ps1xml **\*.psc1 **\*.psd1 **\*.psm1 **\*.py **\*.pyc **\*.pyo **\*.scr **\*.sys **\*.tmp **\*.vb **\*.vbe **\*.vbs **\*.vbscript **\*.wcm **\*.wpm **\*.ws **\*.wsf **\*.wsh **\*.xlam **\*.xlm **\*.xls **\*.xlsb **\*.xlsb **\*.xlsm **\*.xlsx **\*.xlt **\*.xltm **\*.xltx
Recommended for high-value targets or when experiencing an active ransomware attack as due to its restrictive nature the rule may generate a high number of blocks and/or alerts.
It is also recommended to leverage the “test rule” functionality prior to rolling this rule out into production, observing the number of hits, and carefully considering the impact on daily operations.
During the testing stage, prior to rollout, administrators may dismiss alerts with prevalence, after investigating the events and only when they’ve been deemed safe to dismiss.
This rule will add a default “deny-all” posture that prevents applications except for those that are specifically approved from performing ransomware-like behavior.
This aggressive ransomware policy will require tuning to handle false positives generated by applications whose legitimate activity mimics ransomware operations, see steps below.
**
NOTE: The advantage of the default deny policy is protection from ransomware behaviors that originate from compromised applications with a higher reputation (such as TRUSTED_WHITE_LIST) without enumerating all possible applications.
Additional mitigation and prevention recommendations
Please perform extensive testing prior to implementing any changes in your environment
For more information on best security practices for preventing ransomware, consider reviewing CISA's complete set of recommendations:
https://www.cisa.gov/resources-tools/resources/stopransomware-guide
Additional notes