Skip to Content

Device Isolation

Isolate compromised devices from the network while maintaining management connectivity through Microsoft Defender for Endpoint.

Warning: Device isolation blocks all network traffic except Defender for Endpoint management channel. Users will lose access to all network resources.

Isolation Types

TypeDescription
Full isolationBlock all network connections except management
Selective isolationBlock specific protocols while allowing others

Workflow

  1. Identify compromised device from security alert
  2. Select device and choose Isolate action
  3. Confirm isolation with reason and notes
  4. Device is isolated within minutes
  5. Investigate using Defender for Endpoint tools
  6. Release isolation when threat is remediated

Isolated Device Capabilities

  • Defender for Endpoint communication maintained
  • Live response sessions available
  • Evidence collection possible
  • Automated investigation continues

API Reference

  • POST /api/security/devices/:id/isolate — Isolate device
  • POST /api/security/devices/:id/release — Release isolation
  • GET /api/security/devices/:id/isolation-status — Get status
Last updated on