Installing RansomStop for Windows

Installing RansomStop for Windows

Overview

Before installation, you will receive a custom URL, a username, and a password. This guide walks you through logging in to the RansomStop dashboard and installing the Windows analyzer.

Login to the Dashboard

1. Navigate to Your Custom URL

You can navigate to the custom URL provided to begin the login and installation process.

Introduction

2. Enter Your Email

Please enter the username that was provided. This will be in the form of an email.

Select Email Field

3. Enter Your Password

Enter the password that was provided.

Select Password Field

4. Click Sign In

Click the sign-in button to continue.

Click Submit Button

5. Enter Your Authenticator Code

If this is your first time logging in, you may be prompted to change your password and will be presented with a QR code to set up your MFA. Once your password has been reset and your MFA authenticator has been validated, enter your authenticator code here.

Select Authentication Code Field

6. Click Sign In

Click the sign in button.

Click Sign In Button

Download the Installer

7. Open Settings Menu

When logging into your dashboard for the first time, most screens will be blank because there is no data to display yet. To continue the installation, click the Settings tab.

Open Settings Menu

8. Access Installation Settings

Here, you will choose the installation option.

Access Installation Settings

9. Copy Your Serial Number

On the installation page, you will have a serial number. Please copy that code as you will need it in one of the following steps.

Copy Serial Number

10. Download Windows Installer

The RansomStop installer is used for physical and virtual devices. In this particular instance, we are installing it on Windows. Choose the Windows installer.

Download Windows Installer

Install RansomStop

11. Extract the Installation Package

After you choose the Windows installer option, you will find the installation package in your download folder. Extract the installation package.

Extract the installation package

12. Choose Extract All

Choose Extract All at this point.

Extract all

13. Run the Installer

After the extraction is complete, you will see the installer. The installer is located at the path chosen during the extraction process; the default is in the same folder where the installation package was downloaded.

Click the installation package

14. Begin the Installation Wizard

When the installation begins you will see the welcome screen. Choose Next to start the installation wizard.

Choose next to begin the installation

15. Enter Serial Key

In this step, you will enter the serial key or code that was copied from the previous step.

Enter serial key

16. Accept the EULA

Read the EULA. Check that you have read and agree to the EULA and click Accept and Continue.

EULA

17. Choose Installation Type

For standard installations, you can just pick the Default Installation and click Next.

Default installation

18. Review and Install

Review your installation settings and validate that the checkbox is selected to register as a system service. This requires administrator privileges. Click Install to continue.

Review

19. Installation Progress

At this point, the installation will begin. At each step during the process, progress will be shown by a progress bar. The system settings configuration can take several minutes depending on the system size.

Installing

20. Installation Complete

When the installation is complete, you will see the Installation Complete screen. Click Finish to close the installation wizard.

Installation complete

Verify Installation

21. Check Program Files

To validate the installation, you will see an RSAnalyzer directory in your C:\Program Files directory.

Validation

22. Check Running Processes

New processes will also be created. You can search for RSExporter and RSQuery in Task Manager to validate the installation.

Processes

At this point, RansomStop should be fully installed and ready to detect ransomware.

    • Related Articles

    • Installing RansomStop for Google Drive

      Overview RansomStop can monitor Google Drive and automatically suspend compromised user account which exhibit ransomware activity, i.e. malicious encryption events. To do this RansomStop has to be installed in your Google Cloud Platform (GCP) ...
    • Configure a Windows Active Directory Site

      Overview Steps Configure A Windows Active Directory Site Deploy A Windows Active Directory Site Overview A site is a logical definition of a cloud account or an on-prem location. A site needs to be configured and deployed before you can deploy an ...
    • Getting Started with the RansomStop Dashboard

      Overview Welcome to the RansomStop Dashboard walkthrough. This guide covers the main features and navigation of the dashboard. Dashboard 1. Alerts The dashboard is the default log on screen. It gives you a quick overview of alerts and file activity. ...
    • Integrating Active Directory

      Overview For RansomStop to be able to suspend users in Active Directory, there is an integration that needs to be configured to allow RansomStop permissions to make those changes in real-time. In a nutshell, an AD service account is created with the ...
    • Configure an Analyzer

      Configure an Analyzer Overview Prerequisites Windows Steps Configure Analyzer Deploy Analyzer Enable and Configure File Audit AWS Steps Configure Analyzer Deploy Analyzer Overview An analyzer is the component that monitors a storage location, ...