7.6 Device Isolation and Response Actions
Device Isolation and Response Actions
By the end of this subsection, you will know every response action available on a device, when to use each, and the correct sequence for containment during an active incident.
Response actions available
| Action | What it does | Severity | Reversible? | When to use |
|---|---|---|---|---|
| Run antivirus scan | Full or quick scan on the device | Low | N/A | Initial triage — confirm or dismiss the alert |
| Collect investigation package | Gathers running processes, network connections, scheduled tasks, autorun entries into a downloadable zip | Low | N/A | Before isolation — captures live state |
| Restrict app execution | Only Microsoft-signed executables can run | Medium | Yes | Active malware — prevents execution of attacker tools |
| Initiate automated investigation | Triggers AIR to investigate the device | Low | N/A | When you want Defender to scope the incident automatically |
| Isolate device | Cuts all network access except the Defender management channel | High | Yes | Confirmed compromise — prevents lateral movement and C2 |
| Contain device | Blocks communication from other devices to this one | High | Yes | When you suspect the device is being used as a pivot point |
| Live response | Opens remote command shell | Medium | N/A | Evidence collection, forensic analysis, targeted remediation |
The containment sequence
When you confirm a device is compromised, the response actions follow a specific order. Each step has a reason for its position.
Step 1: Collect investigation package — before any other action. Isolation changes the device state (active connections are dropped). The investigation package captures the live state: running processes, open network connections, scheduled tasks, and autorun entries. Once you isolate, some of this data is no longer available.
Step 2: Isolate the device — cuts network access immediately. The attacker loses C2 communication and cannot move laterally. The Defender management channel remains active, so you can still run live response commands and collect files.
Step 3: Restrict app execution (if active malware is running) — limits execution to Microsoft-signed binaries. Attacker tools, scripts, and dropped payloads cannot run even if they are still on the device.
Step 4: Run antivirus scan — identifies and quarantines known malicious files on the isolated device.
Step 5: Live response — connect to the isolated device for detailed forensic analysis. Collect memory dumps, specific log files, registry exports.
This is the most common mistake in endpoint response. An analyst sees a confirmed compromise, immediately isolates the device, then tries to collect the investigation package. But isolation drops all active network connections — the package no longer shows where the malware was connecting to. Collect first, then isolate. The 30 seconds it takes to initiate the collection does not meaningfully increase risk.
Isolation behavior
An isolated device cannot communicate with any other device on the network. It cannot reach the internet, internal servers, file shares, or other workstations. The ONLY communication channel that remains open is the connection to the Defender for Endpoint cloud service.
This means:
- The attacker’s C2 connection is severed — they lose control of the device
- Lateral movement from this device is blocked — the attacker cannot pivot
- Data exfiltration from this device stops — no outbound connections
- You can still run live response commands, collect files, and manage the device through Defender
- The user on the device sees “network disconnected” — they cannot work until isolation is released
| |
| TimeGenerated | DeviceName | ActionType | InitiatingProcessAccountName |
|---|---|---|---|
| 14:32 | DESKTOP-NGE042 | DeviceIsolated | soc-analyst@northgateeng.com |
Response decision: which action first?
Check your understanding
1. Why collect the investigation package BEFORE isolating the device?
2. An isolated device — can you still run live response commands on it?