Rewind Recovery
Rewind Recovery reverses file system changes made by ransomware and other destructive malware. When Defend detects a ransomware attack, it calculates the optimal recovery point, identifies affected directories, and triggers an automated rollback through the Backups integration.
How Rewind Works
- Detection — Defend's ransomware detector identifies mass file operations (bulk renames to encrypted extensions, shadow copy deletion, or encryption patterns)
- Analysis — The system queries ADX for the first anomalous file event and calculates a rewind target 5 minutes before that event
- Scope identification — Top 20 affected directories are identified via KQL analysis of file modification patterns
- Backup validation — Defend checks with the Backups API that a restore point exists at or before the target timestamp
- Device isolation — The affected device is isolated to prevent further encryption
- Rewind execution — Backups restores files in the affected directories to the pre-attack state
- Verification — Defend monitors the restored files and scans for re-infection
- Network restore — Once verified clean, network access is restored
Recovery Status Flow
analyzing → awaiting_approval → isolating → rewinding → verifying → restoring_network → completed
If any step fails, the operation moves to failed status with details on what went wrong.
Running a Rewind
Automatic (Recommended)
When auto-response is configured for critical ransomware detections, the rewind process triggers automatically. The system isolates the device, calculates the rewind point, and begins recovery without manual intervention.
Manual
- Open the ransomware detection in the investigation workspace
- Click Initiate Rewind
- Review the proposed rewind target timestamp and affected directories
- Approve the rewind (dual-control approval may be required)
- Monitor progress in Recovery → Operations
What Can Be Recovered
- Files modified or deleted by the malware process after the rewind target timestamp
- Files in directories covered by the Backups agent
- Files that existed in a backup snapshot at or before the rewind point
Limitations
| Limitation | Details |
|---|---|
| Backup required | Rewind depends on the Backups product — devices without Backups cannot use rewind |
| Snapshot availability | Recovery point must exist at or before the target timestamp |
| Non-backed-up paths | Directories excluded from Backups cannot be recovered |
| Encryption timing | If encryption ran for hours before detection, data loss between last backup and attack start is possible |
| VSS dependency | On Windows, some recovery paths use Volume Shadow Copy — VSS must be enabled |
Dry-Run Testing
Test your rewind readiness without performing an actual restore:
- Navigate to Recovery → Test
- Select a device
- Click Run Dry Test
- Defend validates Backups API connectivity, checks snapshot availability, and confirms the recovery pipeline is operational
Post-Rewind Steps
After a successful rewind:
- Re-scan — Defend automatically scans recovered files for residual malware
- Monitor — The device remains under elevated monitoring for 24 hours
- Investigate — Review the detection to identify the initial access vector and patch the vulnerability
- Report — A recovery report is generated with files recovered, estimated data loss, and recovery time
Recovery Metrics
Each rewind operation records:
- Files recovered — Count of files restored to pre-attack state
- Estimated data loss — Bytes of data between last backup and attack start
- Recovery time — Seconds from rewind initiation to completion
- Scope — Directories included in the recovery
These metrics are available in the recovery report and included in compliance reports.
Next Steps
- Response Actions — Other response options beyond rewind
- Compliance Reports — Recovery metrics in compliance context
- Troubleshooting — Common rewind issues