Elastio features continuous anti-malware protection that is scanning your recovery points for security threats. It provides two approaches to check recovery points for vulnerabilities. The first one is by using the Elastio CLI Integrity Scan (
iscan) command. The second one is to enable integrity scan from a data protection policy. To learn more, visit iscan page. The results of all integrity checks performed can be accessed through the Reports page.
The Tenant Reports Page allows you to view detailed reports on each ransomware and malware check performed and save them in various formats. This page can be accessed by logging into your Elastio Tenant and following to the Reports tab in the left side menu.
Figure 1: Reports Page layout
To run a report, click on the Run Report button.
Figure 2: Run Report button
On the newly opened page you will see a table which provides a list of recovery points. The table displays the date when the Integrity Scan was run against the recovery point, the Account ID and the Regions where Cloud Connector has been deployed.
Figure 3: The Recovery Points table
You can filter the reports by applying one of the filters from the drop-down list.
Figure 4: Reports-Filter
Applying multiple filters to the reports will show multiple results accordingly.
Figure 5: Reports-Filters
Clicking on the recovery point will display the information related to the recovery point and the protected asset.
Figure 6: Recovery Point-Assets
Clicking on the asset will display the Integrity Malware and Ransomware Scan Results.
Figure 7: Scan Results
Alternatively, you can access the ransomware and malware check results for every recovery point checked on the per asset basis. To do so, navigate to the Assets page.
Figure 8: Assets Page layout
Clicking on the asset will display the list of the recovery points with their respective integrity scan status to the left. The green icon means that no malware or ransomware was identified, and if the icon is red - a vulnerability was found.
Figure 9: Assets Scan results