"description":"Make sure to have adequate backup processes on place and frequently test a restore of these backups.\n(Schrödinger's backup - it is both existent and non-existent until you've tried a restore"
"description":"Disable macros in Office files downloaded from the Internet. This can be configured to work in two different modes:\nA.) Open downloaded documents in 'Protected View'\nB.) Open downloaded documents and block all macros"
"description":"Set the registry key \"HideFileExt\" to 0 in order to show all file extensions, even of known file types. This helps avoiding cloaking tricks that use double extensions. (e.g. \"not_a_virus.pdf.exe\")"
"description":"Enforce administrative users to confirm an action that requires elevated rights",
"Possible Issues":"administrator resentment"
},
{
"meta":{
"Complexity":"Medium",
"Effectiveness":"Medium",
"Impact":"Medium",
"Type":"Best Practice"
},
"value":"Remove Admin Privileges",
"description":"Remove and restrict administrative rights whenever possible. Malware can only modify files that users have write access to.",
"Possible Issues":"igher administrative costs"
},
{
"meta":{
"Complexity":"Medium",
"Effectiveness":"Low",
"Impact":"Low",
"Type":"Best Practice"
},
"value":"Restrict Workstation Communication",
"description":"Activate the Windows Firewall to restrict workstation to workstation communication"
},
{
"meta":{
"Complexity":"Medium",
"Effectiveness":"High",
"Type":"Advanced Malware Protection"
},
"value":"Sandboxing Email Input",
"description":"Using sandbox that opens email attachments and removes attachments based on behavior analysis"
},
{
"meta":{
"Complexity":"Medium",
"Effectiveness":"Medium",
"Type":"3rd Party Tools"
},
"value":"Execution Prevention",
"description":"Software that allows to control the execution of processes - sometimes integrated in Antivirus software\nFree: AntiHook, ProcessGuard, System Safety Monitor"
"description":"Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.",