We were hit with .rapid cryptovirus last week via an RDP brute force attack. We lost 2 workstations, our filestore and the backup of the file store on another NAS due to some silly choices with the SMB permissions. Fortunately the backup attached to our server wasn't touched because it wasn't assigned a drive letter.
My workstations backup was encrypted as well because it was just setup to backup to another fixed in the system using Windows Backup, so it had a drive letter and was accessible via that
I have since now resolved this so should it happen again, I'm confident we will be able to restore the filestore.
However I've been looking at options for my workstations and have found something called rollbackrx which is free and the drive doesn't have to be mounted in Windows which means it should be safe from cryptovirus's, obviously I need an actual backup in addition to snapshots, so I've again seen that Light Virtualization might be the way to go in the form of Shadow Defender.
Has anyone had experience of either of the above and any system overheads they may cause?
My workstations backup was encrypted as well because it was just setup to backup to another fixed in the system using Windows Backup, so it had a drive letter and was accessible via that

I have since now resolved this so should it happen again, I'm confident we will be able to restore the filestore.
However I've been looking at options for my workstations and have found something called rollbackrx which is free and the drive doesn't have to be mounted in Windows which means it should be safe from cryptovirus's, obviously I need an actual backup in addition to snapshots, so I've again seen that Light Virtualization might be the way to go in the form of Shadow Defender.
Has anyone had experience of either of the above and any system overheads they may cause?