Initiate recoveries<\/li>\n<\/ol>\n\n\n\nThe first step to ransomware recovery is contacting Commvault Customer Support. This will help determine the level of impact that the attack had and jointly establish a plan.<\/p>\n\n\n\n
Step two is to update and deploy antivirus and ransomware software. This step is to prevent the re-spread of ransomware viruses.<\/p>\n\n\n\n
Recovering the Commvault CommServe and disabling backup schedules is step three in the process. The company will also need to disable all backup plans and scheduled backups temporarily to keep further damage from happening. <\/p>\n\n\n\n
Step four is for recovering Commvault MediaAgents and access to libraries. It is crucial to make sure that the MediaAgents are accessible and functional.<\/p>\n\n\n\n
The fifth step is the client recovery priority list. This is where your organization will generate a list of critical systems and applications and determine what is most important for getting back to business.<\/p>\n\n\n\n
The final and sixth step is to initiate the recoveries. The organization must pay attention to the point-in-time to ensure it is pre-infection. This way, you are not recovering from a point-in-time that includes the ransomware files. <\/p>\n\n\n\n
It is important to emphasize starting your preparation today because every little bit will help. Within Commvault Command CenterTM,<\/sup> there are valuable tools and dashboards to understand your data and your data protection and recovery capabilities. A great resource is the Commvault Recovery Readiness Report to evaluate your RPO and RTO service levels.<\/p>\n\n\n\nThese six steps will help you better prepare and recover from cyber-attacks that have become more sophisticated with time. <\/p>\n\n\n\n
<\/div>\n\n\n\n
Sources<\/strong><\/p>\n\n\n\n1 Coveware Quarterly Ransomware Report, Feb 1, 2021<\/p>\n","protected":false},"excerpt":{"rendered":"
These six steps will help you better prepare and recover from cyber-attacks that have become more sophisticated with time.<\/p>\n","protected":false},"author":85,"featured_media":64400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[678],"tags":[],"cmv_author":[1003],"class_list":{"0":"post-40572","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ransomware","8":"cmv_author-phil-wandrei","9":"entry"},"yoast_head":"\n
6 Steps To Ransomware Recovery In A Commvault Environment<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"6 Steps To Ransomware Recovery In A Commvault Environment","description":"Learn the six steps to ransomware recovery in a Commvault environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","og_locale":"en_US","og_type":"article","og_title":"6 Steps to Ransomware Recovery in a Commvault Environment","og_description":"Learn the six steps to ransomware recovery in a Commvault environment.","og_url":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2021-07-06T13:24:49+00:00","article_modified_time":"2024-03-13T19:43:01+00:00","og_image":[{"width":957,"height":548,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"6 Steps to Ransomware Recovery in a Commvault Environment","datePublished":"2021-07-06T13:24:49+00:00","dateModified":"2024-03-13T19:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"},"wordCount":396,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","url":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment","name":"6 Steps To Ransomware Recovery In A Commvault Environment","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","datePublished":"2021-07-06T13:24:49+00:00","dateModified":"2024-03-13T19:43:01+00:00","description":"Learn the six steps to ransomware recovery in a Commvault environment.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","width":957,"height":548},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/six-steps-to-ransomware-recovery-in-a-commvault-environment#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"6 Steps to Ransomware Recovery in a Commvault Environment"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2022\/10\/six-steps-to-ransomware-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=40572"}],"version-history":[{"count":10,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572\/revisions"}],"predecessor-version":[{"id":515343,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/40572\/revisions\/515343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/64400"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=40572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=40572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=40572"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=40572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}