ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    "You don't just restore a server"

    Scheduled Pinned Locked Moved IT Discussion
    14 Posts 8 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • coliverC
      coliver
      last edited by

      Is person the boss? Or a coworker?

      bbigfordB 1 Reply Last reply Reply Quote 0
      • bbigfordB
        bbigford @coliver
        last edited by

        @coliver said in "You don't just restore a server":

        Is person the boss? Or a coworker?

        Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

        coliverC GreyG ObsolesceO scottalanmillerS 4 Replies Last reply Reply Quote 0
        • coliverC
          coliver @bbigford
          last edited by

          @BBigford said in "You don't just restore a server":

          @coliver said in "You don't just restore a server":

          Is person the boss? Or a coworker?

          Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

          Then I would explain that restoring from backup is the least costly and most effective means of ensuring that the server is clean when you are done. Sanitizing and decryption leave you with a dirty server that you can't trust.

          There is a significant difference between being secure and being lazy.

          1 Reply Last reply Reply Quote 4
          • GreyG
            Grey @bbigford
            last edited by

            @BBigford said in "You don't just restore a server":

            @coliver said in "You don't just restore a server":

            Is person the boss? Or a coworker?

            Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

            10c6129.jpg

            coliverC 1 Reply Last reply Reply Quote 1
            • coliverC
              coliver @Grey
              last edited by

              @Grey said in "You don't just restore a server":

              @BBigford said in "You don't just restore a server":

              @coliver said in "You don't just restore a server":

              Is person the boss? Or a coworker?

              Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

              10c6129.jpg

              Oh god not the son of Dracula.

              1 Reply Last reply Reply Quote 1
              • DustinB3403D
                DustinB3403 @bbigford
                last edited by

                @BBigford said in "You don't just restore a server":

                You get hit, you restore. Server crashes, you restore. That's why we have backups...

                More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.

                scottalanmillerS 1 Reply Last reply Reply Quote 3
                • ObsolesceO
                  Obsolesce @bbigford
                  last edited by

                  @BBigford said in "You don't just restore a server":

                  @coliver said in "You don't just restore a server":

                  Is person the boss? Or a coworker?

                  Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

                  Maybe he washes off and reuses his toilet paper too?

                  1 Reply Last reply Reply Quote 5
                  • dbeatoD
                    dbeato
                    last edited by

                    Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping 🙂

                    ObsolesceO 1 Reply Last reply Reply Quote 1
                    • ObsolesceO
                      Obsolesce @dbeato
                      last edited by

                      @dbeato said in "You don't just restore a server":

                      Backups are the only reliable option to do this, if you have snapshots it is even better. You can backup all the bad (encrypted) files and then worry about what Ransomware infection is. Usually I do gather though all the information necessary related to the attack before restoring or wiping 🙂

                      Yes, the cause of infection is important. What if the infector is a client or admin PC somewhere in the company... you restore the server, and it just gets encrypted again. The source must be found first. Then bare-metal backup the infected server (to look at later)... and restore it from a clean backup.

                      1 Reply Last reply Reply Quote 2
                      • Mike DavisM
                        Mike Davis
                        last edited by

                        I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.

                        scottalanmillerS 1 Reply Last reply Reply Quote 2
                        • scottalanmillerS
                          scottalanmiller @bbigford
                          last edited by

                          @BBigford said in "You don't just restore a server":

                          @coliver said in "You don't just restore a server":

                          Is person the boss? Or a coworker?

                          Without airing dirty laundry... I'll just say they are in a technical, non-managerial role.

                          And will stay that way. I would guess.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @DustinB3403
                            last edited by

                            @DustinB3403 said in "You don't just restore a server":

                            @BBigford said in "You don't just restore a server":

                            You get hit, you restore. Server crashes, you restore. That's why we have backups...

                            More importantly waiting to restore can actually cause harm. Whoever is wanting to dig thru the server for logs and clean it up must be paid for overtime.

                            Right. Actively creating risk and downtown so that they can "play tech" as if they were at Best Buy.

                            1 Reply Last reply Reply Quote 3
                            • scottalanmillerS
                              scottalanmiller @Mike Davis
                              last edited by

                              @Mike-Davis said in "You don't just restore a server":

                              I would poke around it long enough to figure out if the server had been logged in to, or if a user's computer encrypted all the files. You don't want it coming right back. Like others said, figure out how it got infected and then restore back before the infection.

                              If you want to do that, in 95% of cases, take a fresh backup, isolate it and do that offline in a forensics lab after you deal with getting production back. Just leaving it alive could result in more data leaving the environment.

                              1 Reply Last reply Reply Quote 3
                              • 1 / 1
                              • First post
                                Last post