Creating network isolation rules

You can create a network isolation rule in the Threat response section or while viewing the information about an NDR event.

A network devices can be isolated by blocking its IP address. If the IP assigned to a device changes, the isolation is no longer in effect.

Page top