Isolating computers from the network

When an attack occurs or is suspected in your pool, the affected computers can be isolated from the network. By isolating computers, incoming and outgoing connections can be shut down immediately, preventing any attack from spreading to the rest of the network, or exfiltrating data to the attacker's servers.

While computers are being isolated, communication between agents and agent handlers is maintained, so that you can perform analysis and remediation operations if necessary. When the intervention is complete, you can undo the isolation of the computers and restore connections.

From the SES Evolution administration console you can:

  • Isolate computers,

  • Monitor isolated computers,

  • Run Yara or IoC scan tasks and remediation tasks on isolated workstations,

  • Undo isolation of the computers.

Requests to isolate and undo isolation are logged in System and Agent logs.