{"id":40572,"date":"2021-07-06T13:24:49","date_gmt":"2021-07-06T13:24:49","guid":{"rendered":"https:\/\/www.commvault.com\/?p=40572"},"modified":"2024-03-13T15:43:01","modified_gmt":"2024-03-13T19:43:01","slug":"six-steps-to-ransomware-recovery-in-a-commvault-environment","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","title":{"rendered":"6 Steps to Ransomware Recovery in a Commvault Environment"},"content":{"rendered":"\n

Ransomware attacks are becoming more frequent and sophisticated as time goes on, so it is important to know the actions to recovery. \u201c70% of ransomware attacks<\/a> involved the threat to leak exfiltrated data\u201d.1<\/sup><\/p>\n\n\n\n

It is the worst-case scenario constantly re-defined. It costs companies hundreds of thousands of dollars to pay the ransom, typically. \u201cThe average ransomware payment is $154,108\u201d.1<\/sup><\/p>\n\n\n\n

The recovery process is important because organizations want to focus on getting back to business. It is hard to understand the process unless you or your organization have experienced it. These steps will help you understand what ransomware recovery entails and how to approach it.<\/p>\n\n\n\n

    \n
  1. Contact Customer support<\/li>\n\n\n\n
  2. Update and deploy antivirus and ransomware protection software<\/li>\n\n\n\n
  3. Recover the Commvault CommServe<\/li>\n\n\n\n
  4. Recover Commvault MediaAgents<\/li>\n\n\n\n
  5. Create a Client recovery priority list<\/li>\n\n\n\n
  6. Initiate recoveries<\/li>\n<\/ol>\n\n\n\n

    The first step to ransomware recovery is contacting Commvault Customer Support. This will help determine the level of impact that the attack had and jointly establish a plan.<\/p>\n\n\n\n

    Step two is to update and deploy antivirus and ransomware software. This step is to prevent the re-spread of ransomware viruses.<\/p>\n\n\n\n

    Recovering the Commvault CommServe and disabling backup schedules is step three in the process. The company will also need to disable all backup plans and scheduled backups temporarily to keep further damage from happening.  <\/p>\n\n\n\n

    Step four is for recovering Commvault MediaAgents and access to libraries. It is crucial to make sure that the MediaAgents are accessible and functional.<\/p>\n\n\n\n

    The fifth step is the client recovery priority list. This is where your organization will generate a list of critical systems and applications and determine what is most important for getting back to business.<\/p>\n\n\n\n

    The final and sixth step is to initiate the recoveries. The organization must pay attention to the point-in-time to ensure it is pre-infection. This way, you are not recovering from a point-in-time that includes the ransomware files.    <\/p>\n\n\n\n

    It is important to emphasize starting your preparation today because every little bit will help. Within Commvault Command CenterTM,<\/sup> there are valuable tools and dashboards to understand your data and your data protection and recovery capabilities. A great resource is the Commvault Recovery Readiness Report to evaluate your RPO and RTO service levels.<\/p>\n\n\n\n

    These six steps will help you better prepare and recover from cyber-attacks that have become more sophisticated with time. <\/p>\n\n\n\n

    <\/div>\n\n\n\n

    Sources<\/strong><\/p>\n\n\n\n

    1 Coveware Quarterly Ransomware Report, Feb 1, 2021<\/p>\n","protected":false},"excerpt":{"rendered":"

    These six steps will help you better prepare and recover from cyber-attacks that have become more sophisticated with time.<\/p>\n","protected":false},"author":85,"featured_media":64400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[678],"tags":[],"cmv_author":[1003],"class_list":{"0":"post-40572","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ransomware","8":"cmv_author-phil-wandrei","9":"entry"},"yoast_head":"\n6 Steps To Ransomware Recovery In A Commvault Environment<\/title>\n<meta name=\"description\" content=\"Learn the six steps to ransomware recovery in a Commvault environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Steps to Ransomware Recovery in a Commvault Environment\" \/>\n<meta property=\"og:description\" content=\"Learn the six steps to ransomware recovery in a Commvault environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T13:24:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T19:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"957\" \/>\n\t<meta property=\"og:image:height\" content=\"548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dpauciullo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dpauciullo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Steps To Ransomware Recovery In A Commvault Environment","description":"Learn the six steps to ransomware recovery in a Commvault environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","og_locale":"en_US","og_type":"article","og_title":"6 Steps to Ransomware Recovery in a Commvault Environment","og_description":"Learn the six steps to ransomware recovery in a Commvault environment.","og_url":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2021-07-06T13:24:49+00:00","article_modified_time":"2024-03-13T19:43:01+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"6 Steps to Ransomware Recovery in a Commvault Environment","datePublished":"2021-07-06T13:24:49+00:00","dateModified":"2024-03-13T19:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"},"wordCount":396,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","url":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","name":"6 Steps To Ransomware Recovery In A Commvault Environment","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","datePublished":"2021-07-06T13:24:49+00:00","dateModified":"2024-03-13T19:43:01+00:00","description":"Learn the six steps to ransomware recovery in a Commvault environment.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"6 Steps to Ransomware Recovery in a Commvault Environment"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=40572"}],"version-history":[{"count":10,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572\/revisions"}],"predecessor-version":[{"id":515343,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572\/revisions\/515343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/64400"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=40572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=40572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=40572"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=40572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}