Active Directory, Microsoft 365, and Exchange management and reporting
Hybrid AD, cloud, and file auditing; security; and compliance
Identity security with adaptive MFA, SSPR, and SSO
Reporting, auditing, and monitoring for hybrid Exchange and Skype
Active Directory, Microsoft 365, and Exchange backup and recovery
Hybrid AD, cloud, and file auditing; security; and compliance
SharePoint reporting and auditing
Microsoft 365 security
Cloud security monitoring and analytics
File auditing, data leak prevention, and data risk assessment
File security and storage analysis
Automated patching across multiple OSs and over 850+ third-party apps
Simplified third-party patch deployment via ConfigMgr and Intune
Seamless mobile device management from onboarding to retirement
Remote troubleshooting with integrated chat, voice, and video
Automated OS image creation and seamless role-based deployment
Prioritization-focused enterprise vulnerability management
App control and endpoint privilege management software
Data theft prevention with strict peripheral device control
Browser security with isolation, lockdown, and activity tracking
Sensitive data protection and compliance for endpoint devices
Real-time ransomware mitigation and file recovery for business continuity
Full-stack observability with AIOps and digital experience monitoring
AI-powered, all-in-one SaaS platform for observability and digital experience monitoring
Digital experience, application performance, and infrastructure monitoring
All-in-one vendor risk assessment tool to ensure domain security
Network, server, and storage performance monitoring
Bandwidth monitoring and traffic analysis
Network change and configuration management
Firewall rule, configuration, and log management
IP address and switch port management
Centralized IT alert management
Status pages for real-time status and incident communication
A cloud-native identity platform for workforce IAM
Full-stack service management for enterprises
IT asset management with an integrated CMDB
Unified endpoint management and security
Comprehensive mobile device management
Enterprise remote access
Automated multi-OS patch management
Full-stack monitoring for IT admins, DevOps, and SREs
Status pages for real-time status and incident communication
Cloud cost management for modern software teams
SaaS management platform to maximize ROI
Centralized IT alert management
Secure your IT infrastructure and prove compliance from the cloud
AI-powered unified analytics platform to correlate all IT data
An all-in-one DNS management service to keep your business online
Low-code application development platform
Remote support software
Collaborative project management
Agile project management
All-in-one collaboration tool for unified communication
Secure email hosting solution for businesses
All-in-one video conferencing solution for remote business meetings
All-in-one AR remote assistance software solution for remote collaboration.
Unified network monitoring and endpoint management for MSPs
Unified Active Directory management and reporting solution for MSPs
Unified SIEM solution for MSSPs
Log management and advanced threat intelligence for MSSPs
Complete privileged access security for enterprises
Privileged password management
Full-stack service management for MSPs
This section gives you information about the hardware requirements for distribution servers, MSSQL database, Ransomware Protection Plus servers and agents.
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.0 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 5 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.0 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 5 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.4 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.4 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 10 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.4 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.4 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 10 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.9 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.9 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 20 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Core i3 (2 core/4 thread) 2.9 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.9 Ghz 3 MB cache) |
RAM size | 4 GB | |
Hard disk space | 20 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Core i5 (4 core/8 thread) 2.3 GHz Virtual Machine: 8 virtual processors (2.3 Ghz) |
RAM size | 8 GB | |
Hard disk space | 30 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Core i5 (4 core/8 thread) 2.3 GHz Virtual Machine: 8 virtual processors (2.3 Ghz) |
RAM size | 8 GB | |
Hard disk space | 30 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Core i7 (6 core/12 thread) 3.2 GHz Virtual Machine: 12 virtual processors (3.2 Ghz) |
RAM size | 8 GB | |
Hard disk space | 40 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Core i7 (6 core/12 thread) 3.2 GHz 12 MB cache Virtual Machine: 12 virtual processors (3.2 GHz 12 MB cache) |
RAM size | 8 GB | |
Hard disk space | 200 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Xeon (8 core/16 thread) 2.6 GHz Virtual Machine: 16 virtual processors (2.6 Ghz) |
RAM size | 16 GB | |
Hard disk space | 60 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Xeon (8 core/16 thread) 2.6 GHz 20 MB cache Virtual Machine: 16 virtual processors (2.6 GHz 20 MB cache) |
RAM size | 16 GB | |
Hard disk space | 250 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Xeon (12 core/24 thread) 2.7 GHz Virtual Machine: 24 virtual processors (2.7 Ghz) |
RAM size | 32 GB | |
Hard disk space | 100 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Xeon (12 core/24 thread) 2.7 GHz 30 MB cache Virtual Machine: 24 virtual processors (2.7 GHz 30 MB cache) |
RAM size | 32 GB | |
Hard disk space | 500 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Xeon (14 core/28 thread) 2.7 GHz Virtual Machine: 28 virtual processors (2.7 Ghz) |
RAM size | 32 GB | |
Hard disk space | 120 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Xeon (14 core/28 thread) 2.7 GHz 30 MB cache Virtual Machine: 28 virtual processors (2.7 GHz 30 MB cache) |
RAM size | 64 GB | |
Hard disk space | 500 GB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Xeon (16 core/32 thread) 3.0 GHz Virtual Machine: 32 virtual processors (3.0 Ghz) |
RAM size | 32 GB | |
Hard disk space | 500 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 3 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Xeon (16 core/32 thread) 3.0 GHz 30 MB cache Virtual Machine: 32 virtual processors (3.0 GHz 30 MB cache) |
RAM size | 64 GB | |
Hard disk space | 1 TB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
Server | Parameter | Requirement |
---|---|---|
Ransomware Protection Plus Server | Processor information | Physical Machine: Intel Xeon (16 core/32 thread) 3.0 GHz Virtual Machine: 32 virtual processors (3.0 Ghz) |
RAM size | 32 GB | |
Hard disk space | 500 GB* | |
Ransomware Protection Plus Agents | Processor | Intel Pentium |
Processor Speed | 1.0 GHz | |
RAM size | 512 MB | |
Hard disk space | 30 GB** | |
Network requirement | Network card speed | Minimum 1 GBPS Network Interface Card (NIC) |
Bandwidth | Minimum 1 MBPS (T1 connection) | |
SQL Server | Processor information | Physical Machine: Intel Xeon (20 core/40 thread) 3.6 GHz 50 MB cache Virtual Machine:40 virtual processors 3.6 GHz 50 MB cache |
RAM size | 64 GB | |
Hard disk space | 1 TB* | |
Edition | Standard/Enterprise |
* May increase dynamically according to the frequency of scanning
** May increase dynamically depending on the operations performed on the client computer
For managing more than 35000 computers, contact Ransomware Protection Plus Support at ransomwareprotectionplus-support@manageengine.com. We will customize the Ransomware Protection Plus server setup based on your network.
The hardware requirements for distribution servers include the following:
No. of Computers Managed Using the Distribution Server | Processor Information | RAM Size | Hard Disk Space |
1 to 500 | Physical Machine: Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.0 Ghz 3 MB cache) |
4 GB | 6 GB* |
501 to 1000 | Physical Machine: Intel Core i3 (2 core/4 thread) 2.9 Ghz 3 MB cache Virtual Machine: 4 virtual processors (2.9 Ghz 3 MB cache) |
4 GB | 12 GB* |
1001 to 3000 | Physical Machine: Intel Core i5 (4 core/8 thread) 2.3 GHz Virtual Machine: 8 virtual processors (2.3 Ghz) |
8 GB | 16 GB* |
3001 to 5000 | Physical Machine: Intel Core i5 (6 core/12 thread) 3.2 GHz Virtual Machine: 12 virtual processors (3.2 Ghz) |
8 GB | 20 GB* |
* May increase depending on the number of software applications and patches that are deployed
Note : It is highly recommended to install Distribution Server for every 1000 computers.
Note: In the installed physical/virtual machine, kindly ensure that the mentioned hardware requirements is available exclusively for the Ransomware Protection Plus server instance.
This section gives you information about the software requirements for Ransomware Protection Plus Server, Agent and Distribution Server.
For Ransomware Protection Plus Server & Distribution Servers
You can install Ransomware Protection Plus Server & Distribution Servers on any of these Windows operating system versions:
- Windows 7 (supported for Distribution Server only)
- Windows 8 (supported for Distribution Server only)
- Windows 8.1 (supported for Distribution Server only)
- Windows 10
- Windows 11
- Windows Server 2008 R2* (supported for Distribution Server only)
- Windows Server 2012* (supported for Distribution Server only)
- Windows Server 2012 R2* (supported for Distribution Server only)
- Windows Server 2016*
- Windows Server 2019*
- Windows Server 2022*
* - recommended for managing 5000 or more endpoints.
For Ransomware Protection Plus Agents
You can use Ransomware Protection Plus to manage the computers running on the below mentioned operating system.
- Windows 8
- Windows 8.1
- Windows 10
- Windows 11
`
You are required to install any of the following browsers on your computer to access the Ransomware Protection Plus console:
Note: The screen resolution should be 1280 x 1024 pixels or higher.
Ransomware Protection Plus supports the following databases:
Note: Ransomware Protection Plus supports the aforementioned SQL Server versions in AWS as well.
Ransomware Protection Plus uses the following web servers: