security
Readme
๐ก๏ธ Security & Malware Removal
Part of the IT-Manual Standard procedures for removing infections, hardening systems, and preventing data loss.
๐ Overview
This directory contains the โBattle Plansโ for dealing with compromised systems. It covers the full lifecycle of a security ticket: identifying the infection, removing the malicious code, cleaning up the aftermath, and setting up defenses to prevent recurrence (including ransomware protection).
๐ Contents
๐งน Remediation (Cleaning)
Steps to remove active threats and โjunkโ from the system.
- Check for Malware and Adware The Core SOP: Tools and techniques for identifying and removing viruses, trojans, spyware, and browser hijackers.
- Clean up Temp & Junk Data
Procedures for clearing temp directories (
%temp%, browser caches). Note: Perform this before scanning to significantly reduce scan times. - Eliminate Start-up Programs How to identify malicious persistence mechanisms (programs that auto-start) and remove unnecessary bloatware that slows down the system.
๐งฑ Hardening (Prevention)
Steps to secure the system after the threat is removed.
- Security Tuneup Detailed A comprehensive checklist for hardening the OS: User Account Control (UAC) settings, Windows Updates, Firewall verification, and browser security settings.
- Online Backup Services & Ransomware Protection Strategies for immutable backups (cloud storage) and configuring software to detect and block encryption behaviors typical of ransomware.
โก Virus Removal Workflow
The standard order of operations for a dirty machine.
- Preparation: Run Clean up Temp Data.
- Why? Scanning thousands of temp files wastes time.
- Sanitization: Run Check for Malware.
- Why? Kill the active virus processes.
- Persistence: Run Eliminate Start-up Programs.
- Why? Ensure the virus doesnโt come back on reboot.
- Hardening: Run Security Tuneup.
- Why? Close the hole they got in through.
- Future-Proofing: Setup Backup Services.
- Why? Because no antivirus is perfect; backups are the only 100% cure for Ransomware.
Maintained by Pacific Northwest Computers