PROXIMANOVA-LIGHT.OTF PROXIMANOVA-LIGHTIT.OTF PROXIMANOVA-EXTRABLD.OTF PROXIMANOVA-BOLD.OTFPROXIMANOVA-BLACK.OTF
Get this font in here!
This Article Applies to:
- Avast Business Hub
Ransomware Shield secures your personal photos, documents, and other files from being modified, deleted, or encrypted by ransomware attacks. This feature scans for and automatically secures folders which may contain personal data and allows you to specify which folders you want to protect from untrusted applications. Additionally, you can specify which applications are allowed to modify the files in your folders and which are not.
If you are looking for information on Ransomware Shield management within a local client, see Ransomware Shield.
To access and configure Ransomware Shield settings:
- Open the Policies page
- Click the desired policy to open its Detail drawer
- Click the Settings tab, then Antivirus
- Expand the Ransomware Shield section
Specifying Protected Folders
By default, Ransomware Shield detects and secures the folders in which your personal data might be stored. You can always edit or exclude a listed folder by clicking the pencil/trash bin icon in the Actions column:
You can also manually add a folder to the list by clicking + Add protected folder and defining the operating system and the path to the folder:
Furthermore, you can choose whether to protect an entire folder or only certain file types within it:
Specifying Trusted Apps
Ransomware Shield also includes the possibility of defining which applications should be considered trusted:
Common trusted apps (those coming from trusted vendors and app stores and verified by Avast) are included by default. You can change this via the available toggle.
You can also manually add an app to the list by clicking + Add trusted app and defining the operating system and the path to the application:
Network paths cannot be protected by Ransomware Shield. However, it is possible to define an application from a network path as trusted to allow it to access protected folders.
Other Articles In This Section:
Exchange and Sharepoint Server Protection
Configuring Antivirus Exclusions