RDS-Knight On-line User Guide


Ransomware Protection

Since RDS-Knight 3.0 version, the Ransomware Protection enables you to efficiently DETECT, BLOCK and PREVENT ransomware attacks. RDS-Knight reacts as soon as it detects ransomware on your session.

You can enable it by clicking on the "Enable Ransomware Protection" on the Ransomware Protection tab:

Ransomware Protection 1

Ransomware Protection 2

It quickly scans your disk(s) and displays the file(s) or program(s) responsible, in addition to providing a list of the infected items.
RDS-Knight automatically stops the attack and quarantines the program(s) along with the file(s) encrypted before its intervention.

Ransomware Protection 3

Only the administrator can whitelist them, by entering the path of the desired program on the bottom line and by clicking on "Add":

Ransomware Protection 4

Ransomware Protection Report

RDS-Knight prevents catastrophic events for businesses by removing ransomware at an early stage.
The administrator has access to information regarding the source of the attack and running processes, and therefore learns how to anticipate these threats.

Ransomware Protection 5

Note: Ransomware Protection observes how programs interact with system and personal files. To ensure a greater level of protection, Ransomware Protection creates bait files in key folders where ransomware often begins its attack. Therefore, a few hidden files may appear in the users' desktop and documents folders, as well as in other locations. When it detects a malicious behaviour, it stops the ransomware immediately (or ask if the logged user is an administrator).
Ransomware Protection uses pure behavioural detection techniques and does not rely on malware signatures, allowing it to catch ransomware which does not exist yet.

Add an SMTP configuration - Email Alerts

You can configure your SMTP settings in order for RDS-Knight to send you email alerts to highlight important security events by clicking on the button below the Ransomware activation one:

Ransomware Protection 6

Ransomware Protection 7

Enter your SMTP Hostname, Port and check the Use SSL box and change change the port from 25 to 465 if you wish to use SSL.
Enter the SMTP Username and Password, as well as the sender and receiver addresses.
Email Settings can be validated by sending a test when saving SMTP settings.