To use ransomware recovery with integrated security and vulnerability analysis, you first must enable the services.
Enable integrated security and vulnerability analysis in your recovery plans to recover from a ransomware attack (or to test one). When you run a recovery plan for ransomware recovery, integrated vulnerability and behavioral analysis and malware signature scanning begins.
Performing this task requires that your user has the Organization owner role. If you are an MSP partner using the CPN (Cloud Provider Network) console, you must activate Ransomware Recovery Services in each tenant organization by a user with Provider Admin permissions.
Allowing Activation of NSX-T Advanced Firewall
VMware NSX-T Advanced Firewall is required to enable network isolation levels. NSX-T Advanced Firewall is an on-demand, chargeable feature that activates a full range of network isolation levels when performing validation on the recovery SDDC.
You can authorize VMware Cloud DR to automatically activate the advanced firewall only for the duration of ransomware recovery or testing, and you can pay for the service on-demand, or you can subscribe to NSX-T Advanced Firewall or explicitly enable it in the VMC Console. When you enable NSX-T Advanced and run a ransomware recovery plan, VMs in validation are started in the Quarantined+Analysis network isolation level.
For more information, see NSX Advanced Firewall for VMware Cloud on AWS.
Activating ransomware recovery services requires the following user roles: Organization Owner, Global Console Admin, and Orchestrator Admin.
Procedure
What to do next
Once you have activated ransomware recovery services, you can create a protection group and a recovery plan. Then you can recover VMs if you experience a ransomware attack.