メインコンテンツへスキップ

CONTAP-438357: ARW攻撃を受けていないボリュームで新たに確認されたファイル拡張子

Views:
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
CORE
Last Updated:

問題

  • いくつかのファイル拡張子は、ワークロード動作の出力の「新しく確認されたファイル拡張子」の下に報告されます。

::> security anti-ransomware volume workload-behavior show -vserver SVM1 -volume vol_01
                     Vserver: SVM1
                      Volume: vol_01
             File Extensions Observed: pdf, rtf, txt, tmp, jpg,
                          wfs, xlsx, JPG, lms, wav,
                          pptx, xls, xml
        Number of File Extensions Observed: 23
 Historical Statistics
        High Entropy Data Write Percentage: 98
  High Entropy Data Write Peak Rate (KB/Minute): 340936
        File Create Peak Rate (per Minute): 128
        File Delete Peak Rate (per Minute): 294
        File Rename Peak Rate (per Minute): 10
 Surge Observed
                  Surge Timeline: -
        High Entropy Data Write Percentage: -
  High Entropy Data Write Peak Rate (KB/Minute): -
        File Create Peak Rate (per Minute): -
        File Delete Peak Rate (per Minute): -
        File Rename Peak Rate (per Minute): -
          Newly Observed File Extensions: abc, xyz, pqr
     Number of Newly Observed File Extensions: 310, 72, 238

 
  • ただし、そのボリュームに対する攻撃は報告されていません。

USNAZCNO::> security anti-ransomware volume show -vserver SVM1 -volume vol_01
    Vserver Name: SVM1
    Volume Name: vol_01
       State: enabled
Dry Run Start Time: -
Attack Probability: none
  Attack Timeline: -
 Number of Attacks: -

 
  • これらの拡張機能は、誤検知としてマークされた後でもクリアされません。

::> security anti-ransomware volume attack clear-suspect -vserver SVM1 -volume vol_01 -false-positive true -extensions abc, xyz, pqr

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.