TEMASOFT Ranstop Support
We are dedicated to keeping our customers happy
We are dedicated to keeping our customers happy
Expand the following items to view the answers to some of the most common questions about TEMASOFT Ranstop.
What is TEMASOFT Ranstop?
TEMASOFT Ranstop is an anti-ransomware solution for companies, delivered as on-premise software. It uses behavior analysis to block present and future ransomware and restore files that have been damaged or accidentally lost.
What types of machines can be protected by TEMASOFT Ranstop?
TEMASOFT Ranstop can protect the following operating systems:
Please note that TEMASOFT Ranstop cannot protect “Home” editions of Windows workstation operating systems. Also Windows server operating systems are not supported yet.
If my machine is already infected, can TEMASOFT Ranstop recover the encrypted files ?
Unfortunately, if Ranstop is installed on a system which is already infected, it cannot recover the files which have already been encrypted.
How does TEMASOFT Ranstop work ?
TEMASOFT Ranstop uses the analysis of file access patterns to identify ransomware including zero day and custom variants. It is able to detect and block both ransomware and screen locking malware, and offers MBR protection to guard against ransomware attacking the operating system (like Petya). Once ransomware is detected, it is blocked, notifications are sent and the damage files are automatically restored (if any). The safe backup functionality can also be used to restore files damaged by successful ransomware attacks, or accidentally lost.
How to install/uninstall TEMASOFT Ranstop?
To install TEMASOFT Ranstop, run the installer (ranstopinstaller.exe) and follow the steps of the installation wizard. The installation process is straightforward and it usually takes under a minute.
TEMASOFT Ranstop can be uninstalled from Add/Remove Programs or by running ranstopinstaller.exe again after the application is installed.
IMPORTANT: Ranstop uses tampering protection features that prevent external applications from interfering with its files. Therefore it is highly recommended to avoid using custom uninstall applications to remove Ranstop from computers.
Why do I need to reboot after installing TEMASOFT Ranstop?
TEMASOF Ranstop uses a Kernel-mode driver to get relevant information about the file activity of processes and users. Until the reboot, significant important information on running processes cannot be accessed and used, weakening the protection that TEMASOFT Ranstop can provide. Once the system has been rebooted after installing TEMASOFT Ranstop, the system is effectively protected from ransomware.
What happens when ransomware is detected?
TEMASOFT Ranstop detects ransomware after it starts compromising files based on the file activity it performs, and specific patterns. In the process, a number of files may be compromised until ransomware is detected and stopped. These files are protected in a safe area, and are automatically restored. Once ransomware is detected, TEMASOFT Ranstop will display information on the dashboard and the list of alerts. It is also possible to send email notifications or take actions such as shutdown a machine, or disable its network interfaces.
What kind of ransomware is detected by TEMASOFT Ranstop?
TEMASOFT Ranstop can detect the following types of ransomware:
How can files be recovered?
Files can be recovered as follows:
To view the files and file versions available for recovery, please navigate to the “Recovery” tab of the main TEMASOFT Ranstop console.
How does TEMASOFT Ranstop interact with other software?
TEMASOFT Ranstop uses a Kernel-mode driver to operate and works with the file system at a low level. Although during our tests we have not observed any kind of undesired interactions between TEMASOFT Ranstop and anti-virus and backup software, conflicts accessing files may occur in the future. In case they do, please contact TEMASOFT Support. We recommend the use of TEMASOFT Ranstop in conjunction with anti-virus solutions to maximize the protection against ransomware.
TEMASOFT Ranstop also provides support to whitelist applications. We recommend that any anti-virus solution running on the same machine, is whitelisted in TEMASOFT Ranstop. Also, TEMASOFT Ranstop should be whitelisted in any anti-virus solution to avoid conflicts.
The whitelisting functionality can be used to prevent false positives. Simply whitelist the process performing file activity perceived as dangerous by TEMASOF Ranstop, and no further incidents will be recorded for that particular process.
For more information, click here to check the compatibility with different popular products.
Expand the following items to view the system requirements for each of the TEMASOFT Ranstop components.
TEMASOFT Ranstop must be installed only on clean machines (i.e. not already infected by malware), which meet the following requirements:
Windows workstation operating systems:
Windows 7 and newer, x86 and x64, excluding the “Home” editions.
Minimum 2 processors, 2 GB RAM and 10 GB HDD available.
Note: Windows Server operating systems are not supported in the current version.
Ranstop is compatible with many software products. However, because Ranstop is a new application, some security tools do not trust Ranstop yet and might tag Ranstop modules as malware. If this happens, we recommend adding those modules to the trusted list of those security solutions to make sure Ranstop runs correctly. Below you can find a compatibility report with various products. This list will be updated regularly.
IMPORTANT: even if the tests made on our environments indicate good compatibility with different applications, because of the diversity of hardware and software configurations (and their versions), the compatibility with those applications might not hold on other systems. Therefore, it is critical to check the compatibility with your reference configurations before deploying Ranstop on multiple systems in your network.
|Security products||Product version||Compatibility with Ranstop||Remarks|
|AVAST Free||17.4.2294||Compatible. See remarks||Before installing Ranstop, the installer (ranstopinstaller.exe) must be added to the white list of AVAST.|
|360 Total Security||22.214.171.1246||Compatible||Suspicious task is detected during Ranstop installation. The user should not block the scheduled task.|
Some files used by Ranstop are detected as unknown or suspicious during Virus scan.
|EMSISOFT Anti-Malware||2017.2||Partial compatible. On some environments, there were reports of machine freezing for several minutes.||Behavior alerts from EMSISOFT Anti-Malware are displayed during Ranstop installation/uninstallation.|
The user should allow FileMonitor Agent invisible installation.
|Kaspersky Endpoint Security||10.2.5.3||Compatible|
|AVG Internet Security||17.02.3008||Compatible||AVG shredding is detected as malware activity by Ranstop, but this can be solved by adding the process to Application Whitelist in Ranstop.|
Adding an AVG Safe while Ranstop protection is enabled will not work as expected, because of the MBR protection feature offered by Ranstop. However, an AVG Safe can be successfully created before installing Ranstop or while Ranstop protection is disabled and can be used after that together with Ranstop.
|Avira Connect Free Antivirus||126.96.36.199||Compatible|
|McAfee Security Scan Plus||3.11.500.3||Compatible|
|SecureAPlus||4.5.2||Compatible||During Ranstop installation process, SecureAPlus will detected Ranstop as untrusted and will stop the installation. This can be solved by clicking the Trust&Unclock button.|
|VoodooShield||3.53||Compatible||During Ranstop installation process the user must manually allow msi’s and exe files that need to run in order to complete the installation.|
These can be later seen in the VoodooShield whitelist.
|F-Secure Internet Security||2017||Compatible|
|Webroot Secure Anywhere||188.8.131.52||Compatible|
|Norton Security||184.108.40.206||Compatible||C:Program Files (x86)TemasoftFileMonitor AgentSessionMon.exe is blocked and must be added|
in Program Exclusions from Norton Security.
|Trend Micro Internet Security||220.127.116.118||Compatible|
|Symantec Endpoint Protection Cloud||18.104.22.168||Compatible||Warning on unauthorized access blocked for C:Program Files (x86)TemasoftFileMonitor AgentSessionMon.exe can be ignored.|
|Zemana AntiMalware||22.214.171.124||Compatible||C:Program Files (x86)TemasoftFileMonitor AgentSessionMon.exe is reported as malware by Zemana. It must be added to the white list.|
|Sandboxie||5.6||Compatible||Ranstop must be installed and run on the host machine only|
|Backup products||Product version||Compatibility with Ranstop||Remarks|
|StorageCraft ShadowProtect SPX||6.5.2||Compatible|
|Acronis True Image 2017||20.0.8029||Compatible||C:\Program Files (x86)\Common Files\Acronis\TrueImageHome\|
TrueImageHomeService.exe must be added in Ranstop -> Settings -> Application whitelist.
|StorageCraft ShadowProtect||5.2.7||Not Compatible|
|Genie Timeline Free Edition 2016||7||Compatible|
|NTI Backup Now 6||126.96.36.199||Compatible|
|AOMEI Backupper Standard||4.0.2||Compatible|
|Encryption products||Product version||Compatibility with Ranstop||Remarks|
|Cypherix LE||11.7||Partially compatible||Ranstop cannot backup files from the volume created by Cypherix PE.|
|GoAnywhere OpenPGP Studio||1.0.1||Compatible|
|Steganos Safe 18||18||Compatible||C:\Program Files (x86)\Steganos Safe 18\ShredderLow.exe should be white listed in Ranstop|
|Other products||Product version||Compatibility with Ranstop||Remarks|
|File shredding products||Partially Compatible||File shredders must be added to the white list in Ranstop|
Expand the following items to view the release notes for the recent builds
New features and improvements
– Initial backup: added confirmation dialog with statistics before starting to backup important files after Ranstop is installed on a machine
– Backup settings: added the possibility to specify the percentage or absolute size to be left free on disks
– Backup settings: added the possibility to specify the maximum size of a file subject to backup
– Backup settings: added the possibility to automatically erase older versions of the files stored in the repository
– Recovery section: added information about free space and backup space on each drive
– Recovery section: by right-clicking on a file in the repository, one can see details about the versions created for that file
– Improved notification balloons
– Improved real-time backup process
– Improved resource consumption
Important bug fixes
– Fixed performance loss issues reported on some machines
– Fixed problem related to filling up too much disk space when backing up certain files
– Fixed problem refreshing the list of files in the recovery section
Compatibility with older builds
– The backup settings in this build are not compatible with the settings from the previous builds. When upgrading, and keeping the existing files, users must check the backup settings section and adjust the values if necessary
Fill in the form below to report an issue. We will investigate the problem and send you an answer by email as soon as possible.