What are best practices for defense against CryptoLocker type threats in an Active Directory environment?
Are there Group Policies that could help?
NTFS permissions?
Anti-virus software?
What are best practices for defense against CryptoLocker type threats in an Active Directory environment?
Are there Group Policies that could help?
NTFS permissions?
Anti-virus software?
The biggest one is backups - well tested, covering everything important, and not directly accessible from client machines, with older backups kept for awhile in case nobody noticed the problem right away.
The next is user training - teach people how to tell if an email is suspicious, and what to do when they encounter one. And the consequences of clicking random attachments in emails.
Also user permissions. People should only have access to the file shares they need to do their job. The virus can't destroy what it can't access.
Antivirus is good, but wont catch a targeted attack.
Unfortunately every company has that one person who will click every link and attachment. Making sure they have as limited access as possible, and you have backups limits the damage and lets you recover without paying a ransom.