Ransomware Protection with X Cloud: How To Restore Files If Malware Encrypts Them

Ransomware Protection with X Cloud: How To Restore Files If Malware Encrypts Them

Introduction

With X Cloud, you can securely back up your valuable data to the cloud, ensuring protection against malware, ransomware, and accidental data loss.

X Cloud's incremental backup technology and multi-version file storage allow you to restore files to previous, uninfected states, making it an essential tool for recovering from malware attacks.

This guide walks you through the step-by-step process of restoring clean versions of your files from your X Cloud backup.


How to Restore Unaffected Versions of Files

Before you begin the restoration process using the X Cloud Restore desktop application, ensure that:

✅ Your computer’s power settings prevent sleep or shutdown interruptions.
✅ You remain logged into your user profile throughout the restoration process.

Note: Restoration from ❄ Cold Storage may take 3-12 hours to initiate.


Step-by-Step Restoration Process

Step 1: Open the X Cloud Desktop Application

  • Click the Restore button to launch the X Cloud Restore application.
  • If the desktop app is not installed, refer to the installation guide.

Step 2: Access Your Backup Files

  • In the X Cloud Restore window, click the Files button.

Step 3: Select the Backup Source

  • Use the Computer Name drop-down menu to choose the device you want to restore from.

Step 4: Choose Your Data

  • From the left panel, select the files or folders you want to restore.
  • Click the Add icon to move selected files to the right panel.
  • Files stored in ❄ Cold Storage will appear in a dedicated Cold Storage folder.
  • Enable Show/Restore Deleted Files if you need to recover deleted items.
  • Click Next to continue.

Step 5: Select a Restore Location

  • Under Restore Location, choose Restore to an alternative location and browse to select a destination folder.

Step 6: Choose a Restore Date

  • Under Restore Date Range, enable Restore files within a specified date range.
  • Select Use Backup Date → Uncheck From (not required) → Check To and set the date before the malware attack.

Step 7: Start the Restore Process

  • Click the Next icon to begin restoration.

🔹 Important: Avoid turning off your computer, logging out, or activating sleep mode during the restoration.
🔹 Once files are ready, the download will begin automatically. You can minimize or close the X Cloud Restore window without interrupting the process.

🚀 With X Cloud, your data stays secure, accessible, and easily recoverable whenever you need it.


    • Related Articles

    • X Cloud – User Management & Account Setup

      Introduction After setting up an X Cloud account and selecting a plan, administrators can add multiple users to the account, allowing seamless data backups under a centralized system. ? Data Privacy: Standard users can only access their own ...
    • Add a Server to a X Cloud Account

      Introduction With X Cloud, you can securely back up data from Windows Servers, ensuring protection, accessibility, and seamless data recovery. To begin, the server must be added to an X Cloud account and meet the required system prerequisites. How to ...
    • System Requirements for X CLOUD: Desktop, Website, and Mobile Platforms

      Introduction To ensure optimal performance and seamless compatibility across various platforms, it’s essential to meet the specified system requirements for X Cloud. Below, you’ll find the detailed system requirements for running X Cloud on Windows, ...
    • Restore Files with X Cloud (From Hot and Cold Storage)

      Introduction Your valuable data, securely backed up on the X Cloud, is always available for quick and easy restoration—anytime, anywhere! Restoring files is a critical part of data management, ensuring your information remains protected and ...
    • Remote Restore with X Cloud

      Introduction With X Cloud, administrators can remotely initiate a data restoration request from any machine using the X Cloud Web Console. This feature enhances efficiency and flexibility, allowing data recovery without physical access to the user’s ...