New Microsoft Defender Feature Helps To Isolate Hacked, Vulnerable Devices

Share post:

A new Microsoft Defender for Endpoint (MDE) feature will help organizations prevent attackers and malware from using compromised or vulnerable systems to move through networks.

Once compromised vulnerable Windows devices are contained by the new feature, the enterprise endpoint security platform will instruct Windows systems on the network to block all communication to and from the device.

However, the new feature is limited since it only works with onboarded devices running Windows 10 and later or Windows Server 2019 and later.

“Only devices running on Windows 10 and above will perform the Contain action meaning that only devices running Windows 10 and above that are enrolled in Microsoft Defender for Endpoint will block ‘contained’ devices at this time,” Microsoft explains.

To contain a potentially compromised device, administrators are advised to go to the Device Inventory page of the Microsoft 365 Defender portal and select the device to contain. Next, they can select ‘Contain device’ from the actions menu in the device flyout. Lastly, they can type a comment on the contain device group and select ‘Confirm.’

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Hertz Data Breach Exposes Customer Information via Supply Chain Hack

Hertz has disclosed a data breach resulting from a cyberattack on its vendor, Cleo Communications, which compromised sensitive...

Google’s New Security Feature – Automatic Reboot

Google is introducing a new security feature in its latest Android update that will automatically reboot phones and...

Cybersecurity Firm Prodaft Buys Hacker Forum Accounts to Monitor Cybercriminal Activity

Swiss cybersecurity company Prodaft has initiated a program to purchase verified and aged accounts on hacking forums, aiming...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways