How-to Use
1. Installs FSRM using Power Shell or Server Manager2. Run Power Shell Script as Administrator to update rawlist ransomware
new-FsrmFileGroup -name "Anti-Ransomware File Groups" -IncludePattern @((Invoke-WebRequest -Uri "https://fsrm.experiant.ca/api/v1/get" -UseBasicParsing).content | convertfrom-json | % {$_.filters})
3. Navigate to Server Manager => Tool => File Resource Manager will see Anti-Ransomware File Groups in File Group
4. File Screen Templates select file group to block : Anti-ransomware file group above
Screening type : Active screeningFile Screen path: D:\
Screening type : Active screnning
Select file group to block: Anti-ransomware File Group
*** UPDATE RAWLIST RANSOMWARE
Rerun Script below and remmember change -name file group to avoid conflicts old file group
new-FsrmFileGroup -name "Anti-Ransomware File Groups 2 " -IncludePattern @((Invoke-WebRequest -Uri
"https://fsrm.experiant.ca/api/v1/get" -UseBasicParsing).content | convertfrom-json | % {$_.filters})
Video:
DONE
Reference:
https://github.com/nexxai/CryptoBlocker
Check script for windows server 2016: FSRM_NoCrypto_2016.ps1
https://github.com/davidande/FSRM-ANTICRYPTO
You will find what You need
0 comments:
Post a Comment