I have a small network of Windows 7 PCs. I want to use a Windows NAS file server as a repository to safeguard the backup files from each Windows PC against a ransomware attack. In order for this strategy to work I need to be able to dynamically connect the NAS file server to the network, copy the .TIB backup file, then disconnect the NAS file server from the network.
This is how I envision the process working:
An individual Windows PC creates an Acronis True Image backup .TIB file on the local hard drive using the Acronis True Image backup Scheduler.
The NAS file server runs a Windows Scheduled Task that copies the .TIB file from the Windows PC to the NAS file server. The Scheduled Task runs a command file that first ENABLES the network adapter on the NAS file server (so that the NAS file server can connect to the Windows PC), then the NAS file server copies the .TIB backup file.
Once the copy job is finished, the controlling command file DISABLES the NAS file server network adapter to isolate the NAS file server from the network.
In this scenario all users would be Standard Users, even system administrators, to avoid providing a ransonmware-infected PC with the rights of a logged-in Administrator user.
My question is this: Assuming all of the above, especially the fact that no user on the network will be an Administrator user, will this strategy protect the NAS file server from becoming a victim of a ransomware attack over the network?