"You don't just restore a server"
-
@BBigford said in "You don't just restore a server":
@coliver said in "You don't just restore a server":
Is person the boss? Or a coworker?
Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.
https://media.licdn.com/mpr/mpr/shrinknp_200_200/p/7/005/06e/190/10c6129.jpg
-
@Grey said in "You don't just restore a server":
@BBigford said in "You don't just restore a server":
@coliver said in "You don't just restore a server":
Is person the boss? Or a coworker?
Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.
https://media.licdn.com/mpr/mpr/shrinknp_200_200/p/7/005/06e/190/10c6129.jpg
Oh god not the son of Dracula.
-
@BBigford said in "You don't just restore a server":
You get hit, you restore. Server crashes, you restore. That's why we have backups...
More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.
-
@BBigford said in "You don't just restore a server":
@coliver said in "You don't just restore a server":
Is person the boss? Or a coworker?
Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.
Maybe he washes off and reuses his toilet paper too?
-
Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping
-
@dbeato said in "You don't just restore a server":
Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping
Yes, the cause of infection is important. What if the infector is a client or admin PC somewhere in the company... you restore the server, and it just gets encrypted again. The source must be found first. Then bare-metal backup the infected server (to look at later)... and restore it from a clean backup.
-
I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.
-
@BBigford said in "You don't just restore a server":
@coliver said in "You don't just restore a server":
Is person the boss? Or a coworker?
Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.
And will stay that way. I would guess.
-
@DustinB3403 said in "You don't just restore a server":
@BBigford said in "You don't just restore a server":
You get hit, you restore. Server crashes, you restore. That's why we have backups...
More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.
Right. Actively creating risk and downtown so that they can "play tech" as if they were at Best Buy.
-
@Mike-Davis said in "You don't just restore a server":
I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.
If you want to do that, in 95% of cases, take a fresh backup, isolate it and do that offline in a forensics lab after you deal with getting production back. Just leaving it alive could result in more data leaving the environment.