The items evolve to store themselves in other locations.I do not have the link, search GPO to limit crypto.The link you posted has the answers also in the section: How To Protect Yourself Against Ransomware Attacks User education alone though, should help you with the most (assuming you are doing your job with updating software etc). The only thing that goes beyond protecting the client's computers is network behavioral analysis. Now comes the catch: the "system" analyzes the traffic and cuts the connection after it judges the actions as "totally atypical" for Mr. - Use a stateful firewall that scans web browsing for suspicious activity. You should still put up the best defense you can and user education is definitely part of it as well. Although a cryto-virus could lose company data, other malware could allow a much more public effect, such as stealing company data or exposing confidential information.Some cryptolockers are caused by 0-day driveby (in that case, I blame you for not updating the systems properly), but MOST are still from ZIP attachment through the email (user education was enough to stop this, why open an attachment with an executable from an unknown person, and after you see it's an executable file, you still DOUBLECLICK IT????? Let me explain: You would have to setup a (non-specified) "system" that learns how user "X" normally behaves (like "X opens 5-10 documents each day in directories A, B and C". Bleeping computer has a GPO reference to minimize the impact of a crypto virus by denying user exec rights in %applocal%\*denying certain other paths rights to exec.
Please acknowledge that these measures are blacklisting and though some viruses will be prevented, malware authors may adapt to known measures to circumvent them. You would have applocker create rules to whitelist anything that is already installed, meaning, you declare the status quo to be safe to use.
Like this one: You have the NAS there for users to use (store files etc). ;-) So better use what I recommended in your 2nd thread: application whitelisting.
Therefore, the only way to safeguard the files, is to safeguard the users from getting infected in the first place. The NAS DOESN'T KNOW if the user is storing a file, or the malware is encrypting it (maybe in a few years). The ransomware tries to open each and any network based files X has access to. Really the same answer I gave for your other question, but reposting here for those that didn't see it: There are much simpler approaches to help prevent data loss from any type of attack. - Allow write access to network files by exception, not as default. - Make sure workstations have up to date antivirus. So as was said, anything zero-day might still get through.
Applications will usually be whitelisted for administrators.
So they will run (also malware), when you start them with an administrative account and elevate at the same time (that means, give your consent to the UAC prompt).