Problem/Justification
Ransomware remains one of the biggest security threats facing organisations with significant time and money being spent on detection and response. While TrueNAS is excellent when it comes to recovery through snapshots and replication there is currently nothing built in that helps identify suspicious file activity before the damage has already occurred.
In most ransomware incidents the issue is only discovered after a large number of files have already been encrypted, deleted, or modified. At that point recovery relies entirely on snapshots and backups. While this generally works it often results in downtime and a disruptive recovery process for users and services.
Given that TrueNAS already has good visibility of datasets and snapshots it feels like there is an opportunity to use this information more proactively rather than only after an incident has taken place.
Impact
Large-scale file activity such as mass encryption, deletions, or renames can go unnoticed until users start reporting missing or unreadable data. Ransomware can modify very large numbers of files in a short period of time often before anyone has a chance to intervene. Although recovery is usually possible it can still be time-consuming and disruptive to normal business operations.
There is also an increasing expectation that storage platforms contribute to overall security, not just data protection and recovery. Without some form of early detection TrueNAS remains largely reactive when dealing with ransomware-style incidents.
User Story
I would love to see TrueNAS detect abnormal or suspicious file system activity such as rapid bulk file changes, deletions, or file extension changes so that potential ransomware or malicious behaviour can be identified early and the amount of damage limited.
Proposed Capability
TrueNAS could harness tools like ZFS diff or similar snapshot comparison techniques to identify sudden spikes in file changes, high-volume deletions or overwrites, and unusual file extension changes such as .docx files becoming .locked or .encrypted. This could be combined with configurable thresholds on a per-dataset basis, for example triggering when a certain percentage of files change within a defined time window.
Alerts could be generated using existing TrueNAS mechanisms such as email. Optionally automated response actions could be supported including temporarily disabling or restricting client access over SMB or NFS and/or forcing a dataset into a read-only state. Administrators would also benefit from visibility into which client or user triggered the activity.
Value to TrueNAS
This capability would improve TrueNASā overall security posture without attempting to replace endpoint protection. It would add an additional layer of defence by reducing time to detection, make TrueNAS more attractive to security conscious organisations and align well with the current focus on ransomware resilience and incident response.
