Hail folks, 3 days ago I was victim of Ransonware atack (TG33), it has been encrypted all files on my fileserver (WinS 2016) and my (FreeNas 11.3), lucky I usualy make external image every 15days, so I’ve been lost 2 weeks of work, but I’m not out of business. So, I’m looking for strategy or solution to protect my BKP from future ransonware atk (I’m not use RDP or some like that, I have eset antivirus on all machines, IDK how I get it… but… I get it.), I just want to isolate, or dismount and mount my Freenas automatic every night to do my backup, without use SMB share, because it was a hole on my system to encrypt files on BKP server. All suggestion and help will be appreciate. Thanks in advance. Luiz.
Make sure your TrueNAS/FreeNAS does not share an admin/root password with any other devices and use snapshots https://youtu.be/XimxSb00F9w
Awesome video, thx! But I still with question in my mind. I use Cobian sftw to sync files between my Win 2016 and FreeNas (SMB Sharing), the user on Cobian need to have (grant) access to all files on my fileserver to copy it to BKP server, as I handle with video files it use to be large volume everyday, If I have snapshot of the files on FreeNas and got another ransonware atk, it can restore files even my corefiles on FreeNas are encrypted?! I’m stuck on here. Thx again
As I stated in the video, the snapshots would not be encrypted.
I just made a new 2020 version of the video to cover this with TrueNAS Core https://youtu.be/8AjuEG_Ug4g
Dude, u r freaking awesome! THX a lot… My admiration and respect bro. Kind brazilian regards. Luiz