Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 381

Endpoint Isolation

What is Endpoint Isolation?

Endpoint IsolationAn EDR response action that severs a compromised host's network connectivity except to the security tooling, so attackers cannot move laterally while responders investigate.


Endpoint isolation — also called network containment, host quarantine, or host isolation — is a one-click response action exposed by modern EDR platforms (CrowdStrike Real Time Response, Microsoft Defender for Endpoint 'Isolate device', SentinelOne Network Isolation, Carbon Black Cb Live Response, Cortex XDR) that forces the kernel agent to drop or block all network traffic from the endpoint except to the management plane. This stops command-and-control beacons, ransomware encryption of file shares, and lateral movement immediately, giving the SOC time to investigate, collect forensic artefacts and remediate. Best practice ties isolation to playbooks in SOAR tools (Tines, XSOAR, Splunk SOAR), requires dual approval for production servers, and tests release procedures regularly so isolated machines can be safely returned to the network.

Examples

  1. 01

    CrowdStrike Real Time Response isolating an executive laptop within seconds of a Cobalt Strike beacon detection.

  2. 02

    Microsoft Defender for Endpoint 'Isolate device' action triggered automatically by a SOAR playbook on confirmed ransomware behavior.

Frequently asked questions

What is Endpoint Isolation?

An EDR response action that severs a compromised host's network connectivity except to the security tooling, so attackers cannot move laterally while responders investigate. It belongs to the Defense & Operations category of cybersecurity.

What does Endpoint Isolation mean?

An EDR response action that severs a compromised host's network connectivity except to the security tooling, so attackers cannot move laterally while responders investigate.

How does Endpoint Isolation work?

Endpoint isolation — also called network containment, host quarantine, or host isolation — is a one-click response action exposed by modern EDR platforms (CrowdStrike Real Time Response, Microsoft Defender for Endpoint 'Isolate device', SentinelOne Network Isolation, Carbon Black Cb Live Response, Cortex XDR) that forces the kernel agent to drop or block all network traffic from the endpoint except to the management plane. This stops command-and-control beacons, ransomware encryption of file shares, and lateral movement immediately, giving the SOC time to investigate, collect forensic artefacts and remediate. Best practice ties isolation to playbooks in SOAR tools (Tines, XSOAR, Splunk SOAR), requires dual approval for production servers, and tests release procedures regularly so isolated machines can be safely returned to the network.

How do you defend against Endpoint Isolation?

Defences for Endpoint Isolation typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Endpoint Isolation?

Common alternative names include: Network containment, Host isolation, Host quarantine.

Related terms