How to test Ransomware functionality?
In order to test ransomware functionality, a deletion action can be initiated against one or more canary files. In order to trigger ransomware detection, the binary performing the deletion action should be either:
• Unknown applications (and set to terminate by policy upon ransomware-like behavior) or
• Known but explicitly called to terminate by policy upon ransomware-like activity
For example, when testing, and in order to trigger a ransomware warning by deleting a canary file from windows explorer, its binary (**\explorer.exe) would have to be added to a "Blocking and Isolation" rule:
Application at path → **\explorer.exe → Performs ransomware-like behavior → Terminate process
The similar rule would have to be present and applied to the sensor if testing via any other binary that can attempt to delete a canary file.