Skip to content

Asset Isolation

Asset Isolation enables you to completely isolate an asset from all network communication except its connection to the XDR Forensics Console. This allows your investigation to proceed with full XDR Forensics capabilities while preventing threat actors from accessing the asset or external parties from interfering with the investigation.

When you suspect an asset has been compromised, you face a dilemma:

  • Leave it connected → Risk the threat actor maintaining access, exfiltrating data, or destroying evidence
  • Disconnect it completely → Lose the ability to perform remote forensic collection

Asset Isolation solves this by cutting off the threat actor while preserving your investigative access. The asset remains fully manageable through XDR Forensics, enabling you to collect evidence, run queries, and interact with the system—all while the asset is protected from external interference.

When you isolate an asset:

  1. All existing network connections are terminated — Any active connections to other systems are immediately dropped
  2. New network connections are blocked — The asset cannot establish connections to any external system
  3. XDR Forensics Console communication is preserved — The Responder maintains its connection to the Console
  4. Full XDR Forensics capabilities remain available — Acquisition, Hunt/Triage, interACT, and Time-lining all continue to function

This feature uses a Kernel Mode Driver for performing the isolation. It operates independently of Windows Firewall, ensuring reliable isolation regardless of firewall configuration or state.

During isolation, all XDR Forensics capabilities continue to function:

ActionStatusPurpose
Acquisition✅ AvailableCollect forensic evidence
Hunt/Triage✅ AvailableSearch for indicators of compromise
interACT✅ AvailableLive interaction with the asset
Time-lining✅ AvailableBuild activity timelines
Scheduled Tasks✅ AvailableAutomated task execution continues
External Network Access❌ BlockedThreat actor access denied

When you identify a potentially compromised asset, immediately isolate it to prevent:

  • Threat actors from maintaining command and control access
  • Data exfiltration to external servers
  • Lateral movement to other assets on the network
  • Remote destruction of evidence

Isolation allows you to investigate a live system without interference. The threat actor cannot detect your investigation activities or take countermeasures while the asset is isolated.

By isolating the asset, you ensure that evidence remains intact during collection. No external process can modify, encrypt, or delete files while you’re acquiring them.

  1. Navigate to the asset in the XDR Forensics Console
  2. Open the More Actions menu
  3. Select Isolate Asset

The asset will immediately be isolated from all network communication except the XDR Forensics Console.

  1. Navigate to the isolated asset’s Asset Details page
  2. Select Un-isolate Asset

Network connectivity will be restored and the asset can resume normal operations.

Both features control asset behaviour, but serve different purposes:

FeatureAsset IsolationMaintenance Mode
Primary PurposeNetwork containmentPrevent task creation
Network Access❌ Blocked (except Console)✅ Normal
Task Creation✅ Allowed❌ Blocked
Acquisition✅ Available❌ Blocked
Hunt/Triage✅ Available❌ Blocked
interACT✅ Available✅ Available