October 14, 2021

Defender For Endpoints – Isolating devices.

Need some context on a situation around “Isolating devices” on a network within Defender 365. What are business’s procedures when it comes to isolating Servers i.e. Production servers like ADFS. And also including what type of scope is applied from the client on if the organisation is allowed to isolate said server for the investigation of the malicious activity.

In terms of POV is from a SOC environment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.