Ransomware Protection in Windows 10

  • SpinRite v6.1 Release #3
    The 3rd release of SpinRite v6.1 is published and may be obtained by all SpinRite v6.0 owners at the SpinRite v6.1 Pre-Release page. (SpinRite will shortly be officially updated to v6.1 so this page will be renamed.) The primary new feature, and the reason for this release, was the discovery of memory problems in some systems that were affecting SpinRite's operation. So SpinRite now incorporates a built-in test of the system's memory. For the full story, please see this page in the "Pre-Release Announcements & Feedback" forum.
  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)


New member
Oct 3, 2020
With a lot of the Security Now podcast discussing ransomware, I thought I'd ask about the ransomware protection systems that Windows 10 has built-in. Bleeping Computer has a good write-up on how to enable it: https://www.bleepingcomputer.com/news/microsoft/how-to-enable-ransomware-protection-in-windows-10/

It requires that you use Windows Defender, which I've heard Steve and Leo say works well for Windows (and is free!). As the article says:

Windows 10's includes a Ransomware Protection feature that is comprised of two components: Controlled Folder Access and Ransomware Data Recovery

Do note that:
Unfortunately, if you have a third-party antivirus software installed and Windows Defender's real-time protection is disabled, the Ransomware Protection features screen and the Controlled Folder Access feature won't be accessible.

This isn't 100% (and nothing is in security), but seems like a good idea to have enabled if you're running Windows these days, particularly in a enterprise environment. Hope this helps!
Enterprise users can optionally use app whitelisting.

I've never used these, because I don't have the necessary licenses, but it seems to me like it would be a great way to stop most malware cold... at the expense of also stopping a lot of valid software pretty cold too (at least initially while you get your working set figured out.)
Both controlled folder access and exe white-listing are ultra high maintenance. Without at least a year of intensive observation, logging and planning, the disruption to operations in our enterprise environment would be untenable. White-listing on servers would be much more manageable and since they're higher value targets anyway, are well worth the necessary time to plan, monitor and implement.
Automated white listing by Signed Publisher and/or certificate authority would help immensely. Host processes and command interpreters may be an issue however.
  • Like
Reactions: danlock