How to Spot Early Signs of Ransomware Before Encryption (Without a SOC Team)

![[HERO] How to Spot Early Signs of Ransomware Before Encryption (Without a SOC Team)](https://cdn.marblism.com/O7qghniu24K.webp)
By the time files start encrypting, you've already lost.
The real question isn't whether you can stop ransomware once it starts executing: it's whether you can see it coming early enough to do something about it.
Most small IT teams run Windows Defender (or similar endpoint protection) and hope for the best. Defender blocks known threats. It's good at that. But it doesn't give you the visibility to spot pre-ransomware behaviour: the suspicious patterns that emerge hours or days before encryption begins.
This isn't negligence. It's the default.
The gap between "blocking malware" and "seeing what's happening on your endpoints" is where ransomware thrives. And you don't need a Security Operations Centre to close it: you just need to know what to look for.
What ransomware looks like before encryption
Ransomware doesn't appear out of nowhere. There's a reconnaissance phase. A lateral movement phase. Operators test access, disable protections, and map out your network.
All of this creates signals.
Here's what you should be watching for:
1. Suspicious RDP activity
Remote Desktop Protocol is one of the most common entry points for ransomware. Attackers either brute-force credentials or buy compromised logins on the dark web.

Watch for:
Failed login attempts from unfamiliar IP addresses
Successful logins outside normal hours (especially on servers)
RDP connections from geographic locations where your organisation doesn't operate
Multiple failed attempts followed by a successful login (credential stuffing)
If you're seeing unexpected RDP activity on a server at 2 AM, that's not your team working late.
2. Unusual execution paths
Ransomware often runs from unusual locations: temporary directories, user download folders, or hidden system paths. It doesn't launch from C:\Program Files like legitimate software.
Look for processes executing from:
%TEMP%or%APPDATA%foldersUser Downloads or Desktop folders
Newly created directories in system root
Suspicious script interpreters (PowerShell, WScript) running with unusual arguments
Modern ransomware also uses living-off-the-land techniques: abusing legitimate Windows tools like PsExec, WMI, or Cobalt Strike to avoid detection. These tools aren't malicious on their own, but when they appear on endpoints that never used them before, it's worth investigating.
3. Resource spikes (CPU and network)
Encryption is computationally expensive. So is exfiltrating data before locking it.
Before ransomware encrypts files, you'll often see:
Sudden CPU or disk usage spikes from unfamiliar processes
High network traffic when no one is actively working
Unusual outbound connections to unfamiliar IP addresses or domains
Memory usage creeping up without a clear cause
If a server that normally sits at 15% CPU suddenly jumps to 80% overnight, and the process responsible isn't familiar, investigate immediately.

4. Changes to security tooling
Attackers know Defender and antivirus tools will flag them eventually. So they often try to disable or tamper with protections before deploying ransomware.
Watch for:
Windows Defender suddenly turning off (or signature updates failing)
Security software being uninstalled or stopped
Event logs being cleared regularly or unexpectedly
Firewall rules being modified without authorisation
If your antivirus stops updating, that's not a licence renewal issue: it's a red flag.
5. Unexpected admin tools appearing
Ransomware operators often install Remote Monitoring and Management (RMM) tools to maintain persistent access. These tools are legitimate: MSPs use them daily: but when they appear on endpoints without your approval, it's a problem.
Be suspicious of:
AnyDesk, TeamViewer, or ScreenConnect installed without IT approval
PsExec or other SysInternals tools on endpoints that never needed them
Network scanning utilities (Nmap, Advanced IP Scanner)
Credential dumping tools (Mimikatz, LaZagne)
If you didn't install it, and your team didn't request it, find out why it's there.
The visibility gap
Here's the challenge: most endpoint protection tools don't surface this information in a way that's useful to a solo IT generalist.
Defender blocks malware. It doesn't alert you when RDP fails five times then succeeds. It doesn't flag processes running from unusual paths unless they match a known signature. It doesn't tell you a server's CPU spiked at 3 AM.
This leaves you flying blind between "malware blocked" and "ransomware encrypting files."
What FortiSense does differently
Rather than asking "Is this file malicious?", FortiSense asks: "Is this behaviour suspicious?"
It monitors execution paths, resource usage, network connections, and login activity across your endpoints: then surfaces explainable alerts when something doesn't look right.

For example:
A process launches from
%TEMP%on a server that normally runs nothing but scheduled tasks → AlertRDP login at 2 AM from an IP address you've never seen before → Alert
CPU usage spikes to 90% on a workstation that's usually idle overnight → Alert
Windows Defender signature updates fail for three consecutive days → Alert
The alerts aren't cryptic threat scores. They're plain-English explanations of what happened, why it's suspicious, and what you should check next.
This is visibility without requiring a SOC team to interpret it.
Practical steps you can take today
Even without FortiSense, you can start building baseline awareness:
Enable basic logging:
Turn on RDP logging in Event Viewer (Event ID 4624, 4625)
Enable PowerShell script block logging
Monitor Windows Defender's Protection History regularly
Establish what "normal" looks like:
Document which servers should have RDP enabled
Note typical CPU and network usage during off-hours
List authorised admin tools and remote access software
Set up simple alerts:
Use Task Scheduler or PowerShell scripts to email you when RDP fails repeatedly
Monitor for processes launching from
%TEMP%or Downloads foldersCheck weekly whether Defender signatures are updating
Review endpoint activity weekly:
Scan login history for unfamiliar IPs
Check installed software for unexpected tools
Look for processes you don't recognise
This won't give you real-time detection, but it's better than discovering ransomware only when files stop opening.
Closing thoughts
You don't need a massive security budget or a 24/7 SOC to spot ransomware before it encrypts your files.
You need visibility into the patterns that precede encryption: and the ability to investigate them before it's too late.
Defender has a place. It blocks known threats. But it doesn't tell you when something suspicious is happening that doesn't match a signature yet.
FortiSense fills that gap. It monitors endpoint behaviour, surfaces early warning signals, and explains what you're seeing in plain English: so you can act before ransomware gets to the encryption phase.
If you're curious, you can try FortiSense free for 14 days. No SOC required. No commitment. Just visibility.
Join Founders Access for beta features and direct support during development.
Learn more →