You can create a network isolation rule in the Threat response section or while viewing the information about an NDR event.
A network devices can be isolated by blocking its IP address. If the IP assigned to a device changes, the isolation is no longer in effect.
Page top