PROXIMANOVA-LIGHT.OTF PROXIMANOVA-LIGHTIT.OTF PROXIMANOVA-EXTRABLD.OTF PROXIMANOVA-BOLD.OTFPROXIMANOVA-BLACK.OTF
Get this font in here!
This Article Applies to:
- Essential/Premium/Ultimate Business Security
- Small Office Protection
Ransomware Shield secures your personal photos, documents, and other files from being modified, deleted, or encrypted by ransomware attacks. This feature scans for and automatically secures folders which may contain personal data and allows you to specify which folders you want to protect from untrusted applications. Additionally, you can specify which applications are allowed to modify the files in your folders and which are not.
If you are looking for information on Ransomware Shield management within Business Hub, see Ransomware Shield.
You can access the Ransomware Shield settings by clicking on Menu > Settings, then navigating to Protection > Ransomware Shield:
Mode: Choose whether the Ransomware Shield mode is Smart (allows trusted and approved applications by default but needs your permission for allowing any untrusted ones) or Strict (requires your permission for all unapproved apps).
File types: Use the checkboxes to select specific file types to be secured in your protected folders, and include additional file types if needed by adding their extensions via the text box at the bottom.
Specifying Protected Folders
By default, Ransomware Shield scans for and secures folders where your personal data might be stored. To manually add another folder to the list, go to Protection > Ransomware Shield straight from the home screen:
Once in, click on Protect New Folder, select the desired folder, and add it to the Protected Folders list.
If you ever wish to exclude a folder from the list, simply tick the checkbox next to it, select Stop Protecting and confirm your choice:
Specifying Trusted Apps
You can also select which apps can interact with your files by selecting the Block or Allow App option located next to the Protect New Folder button. Alternatively, you can go to Menu > Settings and navigate to General > Blocked & Allowed Apps. In both cases, you will arrive to the below screen:
To block or allow an app, click on the respective button and either locate the app among the listed ones or click on Select App Manually to browse to the application .exe file. Finally, select Add and confirm your choice.
If you want to exclude an app from either of the lists, click on the three dots next to it and select Remove. However, if you only want to specify which features can allow or block the selected app, choose the Change option:
Other than Ransomware Shield, the features you can select through this option are: Webcam Shield, Sensitive Data Shield, and Password Protection.
Other Articles In This Section:
Exchange and Sharepoint Server Protection