It really seems like an effort to solve the wrong problem.

Why not just ensure that end-users don't have direct access to the device
which is handling backups, or to the back-end storage location of the
backups?

It's not like malware cannot lurk and wait for access...

Regards,

 *ASB*
 *http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>*

 *Providing Expert Technology Consulting Services for the SMB market…*

* GPG: *860D 40A1 4DA5 3AE1 B052 8F9F 07A1 F9D6 A549 8842



On Sun, Aug 13, 2017 at 5:30 PM, J- P <[email protected]> wrote:

> While its possible , it is less likely as most infections are due to users
> clicking on or opening something , which will not occur off hours.
>
> And in reality the window would be shorter since  it uses CBT,  so on
> average the backups are about 10 minutes for most servers, with the
> exception of Exchange it usually takes about 45 min.
>
>
> I could theoretically install a new server (off domain) and run the backup
> software on that server which would solve the problem- lets see if I can
> sell them that idea.
>
>
> thanks
>
>
>
>
>
>
> ------------------------------
> *From:* [email protected] <[email protected]>
> on behalf of Brian Desmond <[email protected]>
> *Sent:* Sunday, August 13, 2017 12:06 PM
>
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: scheduling iSCSI connections
>
>
> So what happens if your ransomware scenario occurs while the backup is
> running? That invalidates all your backups at that point as well.
>
>
>
> Perhaps I’m thinking of something else but all the backup toolsets I’ve
> worked with all push the data over the network to a central system that
> interacts with the backend storage/media.
>
>
>
> Thanks,
>
> Brian
>
>
>
>
>
> *From:* [email protected] [mailto:listsadmin@lists.
> myitforum.com] *On Behalf Of *J- P
> *Sent:* Saturday, August 12, 2017 10:39 PM
> *To:* [email protected]
> *Subject:* [NTSysADM] Re: scheduling iSCSI connections
>
>
>
> not sure I follow, the backup runs to a "local disk  iscsi target" then
> replicates offsite- - but I'm  assuming (God forbid) ransomware hits the
> host then it would also encrypt  the  "local iscsi disk" -
>
>
>
> tia
>
>
>
>
> ------------------------------
>
> *From:* [email protected] <[email protected]>
> on behalf of Brian Desmond <[email protected]>
> *Sent:* Saturday, August 12, 2017 5:51 PM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: scheduling iSCSI connections
>
>
>
> Wouldn’t your backup tool be responsible for doing this? This seems very
> likely to fail in some way, shape, or form at some point.
>
>
>
> Thanks,
> Brian
>
>
>
>
>
> Thanks,
>
> Brian Desmond
>
>
>
> w – 312.625.1438 <(312)%20625-1438> | c – 312.731.3132 <(312)%20731-3132>
>
>
>
> *From:* [email protected] [mailto:listsadmin@lists.
> myitforum.com <[email protected]>] *On Behalf Of *J- P
> *Sent:* Friday, August 11, 2017 12:59 PM
> *To:* NT <[email protected]>
> *Subject:* [NTSysADM] scheduling iSCSI connections
>
>
>
> Is it possible to schedule iSCSI connections  (connect at 11pm, disconnect
> 6 am)
>
>
>
> We currently backup our hyper-v guests to our NAS which is presented to
> the host via iSCSI,
>
>
>
> The goal is  to achieve the equivalent  of ejecting a tape after backup is
> complete, in case of a ransomware infection.
>
>
>
> We do also have it offsite, however, I'd much rather restore 6tb locally
> than over the wire.
>
>
>
> Any thoughts feedback are greatly appreciated
>
>
>
>
>
>
>

Reply via email to