![]() ![]() Ransomware encrypts files and demands a ransom for the encryption key. Active ProtectionĪctive Protection protects a system from ransomware and cryptocurrency mining malware. Some features might require additional licensing, depending on the applied licensing model. Check the table of Cyber Protect features supported by operating system for reference about the features applicable to your workloads: Supported Cyber Protect features by operating system. This section includes descriptions of the available settings for all supported operating systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |