Structure: - Services/ (22 docs) - Device mgmt, VoIP, MDM, etc. - Products/ (10 docs) - dataBack, Huntress, BitWarden, etc. - Security/ (6 docs) - Cyber insurance, PAM, awareness - Backup/ (4 docs) - Recovery, disaster planning - Policies/ (7 docs) - BYOD, user mgmt, credentials - Legal/ (5 docs) - MSA, agreements, warranties - Getting Started/ (8 docs) - Welcome, contact, tickets
21 lines
758 B
Markdown
21 lines
758 B
Markdown
# Ransomware Canary
|
|
|
|
## What is a Ransomware Canary?
|
|
|
|
If you're a computer user who's found a strange-looking file on your system guiding you to this page, you're in the right place! The file you found, which led you here, is called a ransomware canary.
|
|
|
|
## Purpose
|
|
|
|
A ransomware canary is a security feature deployed by Huntress EDR that:
|
|
|
|
- Acts as an early warning system for ransomware attacks
|
|
- Monitors for unauthorized file encryption
|
|
- Alerts security teams to potential threats before widespread damage occurs
|
|
|
|
## What to Do
|
|
|
|
If you found this file on your computer, **do not delete it**. It's a protective measure put in place by your IT administrator.
|
|
|
|
## Related Documentation
|
|
|
|
- [Huntress EDR](Huntress_EDR.md) - Endpoint detection and response
|