Known Suspicious Files and Extensions
To detect suspicious files and extensions commonly used by malware, the Veeam Data Analyzer Service compares the guest indexing data of a restore point with the SuspiciousFiles.xml file. If files have extensions or names that match any in the SuspiciousFiles.xml file, a malware detection event is created.
The SuspiciousFiles.xml file is maintained and updated regularly to manage evolving threats. These updates are informed by Veeam Cyber Threat Intelligence as well as internal security research and validation processes. The Veeam Data Analyzer Service checks for available SuspiciousFiles.xml file updates once a day.
Note |
Do not edit the SuspiciousFiles.xml file directly. You can customize the list of suspicious files and extensions in the following ways: |
Adding Custom Suspicious Files and Extensions
To add custom files and extensions that should be marked as suspicious, perform the following steps:
- From the main menu, select Malware Detection > File Detection and click Suspicious files to monitor.
- Click Add next to the Suspicious files field.
- Specify a file extension or a file name with or without extension. You can also use * and ? wildcard characters. For example:
bot.txt bot b?t *.avi |
Note |
Malware detection scan is case-insensitive. You do not need to add extensions or file names with different cases, for example, bot and Bot. |
- Click OK.
Excluding Suspicious Files and Extensions
To exclude a file name or file extension listed in the SuspiciousFiles.xml file and ignore it during the scan, do the following:
- From the main menu, select Malware Detection > File Detection and click Suspicious files to monitor.
- Click Add > Extension next to the Trusted objects field.
- Specify a file name or file extension as it is listed in the SuspiciousFiles.xml file (the FileMask tag). For example:
*.cryptoboss |
- Click OK.
Note |
You can also add files and extensions to the trusted list from the Event Details window. For more information, see Viewing Malware Detection Events. |
To ignore a specific file or a folder during the scan, do the following:
- From the main menu, select Malware Detection > File Detection and click Suspicious files to monitor.
- Click Add > Path next to the Trusted objects field.
- Specify a path to the file or folder. For example:
C:\Users\user1\New Folder\ C:\Users\user1\file.txt /home/user1/Folder/ /home/user1/file.md |
- Click OK.
Note |
Consider the following:
|
Exporting and Importing Custom Lists
You can export and import the list of custom files and extensions to and from a file in the XML format.
To export the list, do the following:
- From the main menu, select Malware Detection > File Detection and click Suspicious files to monitor.
- Click Export these filters.
- Click Browse and select the folder to save the list.
- Specify the name of the file and click Save.
- Click OK.
To import the list, do the following:
- From the main menu, select Malware Detection > File Detection and click Suspicious files to monitor.
- Click Import existing list.
Important |
The import operation will override files and extensions you specified earlier. It is recommended to export your current list before you import a new one. |
- Click Browse and select the folder where the file is located.
- Select the file and click Open.
- Click OK.
A valid XML Schema for the list must contain the following elements:
Element | Description |
|---|---|
RansomwareExclusions | Root element. |
Includes | Child element of the RansomwareExclusions element. Contains custom files and extensions that must be marked as suspicious. Can be empty. |
Excludes | Child element of the RansomwareExclusions element. Contains files and extensions listed in the SuspiciousFiles.xml file that must be ignored during the guest indexing data scan. Can be empty. |
Item (Includes/Excludes) | Child element of the Includes or Excludes element. Each Item contains a file extension or a file name with or without extension that must be marked as suspicious or ignored. Consider the following:
Note that files and extensions you want to exclude must be listed in the SuspiciousFiles.xml file. |
IgnoredPaths | Child element of the RansomwareExclusions element. Contains specific files and folders that must be ignored during the guest indexing data scan. Can be empty. |
Item (IgnoredPaths) | Child element of the IgnoredPaths element. Each Item contains a path to the specific file or folder that must be ignored. The element also has a specific Type attribute. Possible values:
Consider the following:
|
Example:
<RansomwareExclusions> <Includes> <Item>bot.txt</Item> <Item>*.avi</Item> <Item>bot1&2.txt</Item> </Includes> <Excludes> <Item>*.cryptoboss</Item> </Excludes> <IgnoredPaths> <Item Type="Absolute">C:\Users\user1\New Folder\</Item> <Item Type="Absolute">C:\Users\user1\file.txt</Item> <Item Type="Absolute">/home/user1/Folder/</Item> <Item Type="Absolute">/home/user1/file.md</Item> </IgnoredPaths> </RansomwareExclusions> |