Skip to content

Commit 384d2b5

Browse files
committed
Misc updates
1 parent 3f0500c commit 384d2b5

File tree

1 file changed

+28
-26
lines changed

1 file changed

+28
-26
lines changed

defender-endpoint/isolation-exclusions.md

Lines changed: 28 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 03/04/2025
17+
ms.date: 06/22/2025
1818
---
1919

2020
# Isolation exclusions (preview)
@@ -29,11 +29,11 @@ ms.date: 03/04/2025
2929

3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131
32-
Isolation exclusion refers to the ability to exclude specific processes, IP addresses, or services from network isolation when applying selective isolation action to devices.
32+
Isolation exclusion refers to the ability to exclude specific processes, IP addresses, or services from network isolation by applying the selective isolation response action to devices.
3333

34-
Network isolation in Microsoft Defender for Endpoint (MDE) restricts a compromised device's communication to prevent threat spread, but certain critical services, like management tools or security solutions, might need to remain operational.
34+
Network isolation in Microsoft Defender for Endpoint (MDE) restricts a compromised device's communication to prevent threat spread. However, certain critical services, such as management tools or security solutions, might need to remain operational.
3535

36-
Isolation exclusions allow designated processes or endpoints to bypass this restriction, ensuring essential functions (for example, remote remediation or monitoring) continue while limiting broader network exposure.
36+
Isolation exclusions allow designated processes or endpoints to bypass the restrictions of network isolation, ensuring essential functions (for example, remote remediation or monitoring) continue while limiting broader network exposure.
3737

3838
> [!WARNING]
3939
> **Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when strictly necessary**.
@@ -46,27 +46,26 @@ There are two modes of isolation: **full isolation** and **selective isolation**
4646

4747
* **Full isolation**: In full isolation mode, the device is completely isolated from the network, and no exceptions are allowed. All traffic is blocked, except for essential communications with the Defender agent. Exclusions aren't applied in full isolation mode.
4848

49-
Full isolation mode is the most secure option, suitable for scenarios where a high level of containment is necessary.
49+
Full isolation mode is the most secure option, suitable for scenarios where a high level of containment is necessary. For more information about full isolation mode, see [Isolate devices from the network](/defender-endpoint/respond-machine-alerts#isolate-devices-from-the-network).
5050

51-
* **Selective isolation**: Selective isolation mode allows administrators to apply exclusions to ensure that critical tools and network communications can still function, even while maintaining the device's isolated state.
51+
* **Selective isolation**: Selective isolation mode allows administrators to apply exclusions to ensure that critical tools and network communications can still function, while maintaining the device's isolated state.
5252

5353
## How to define and apply isolation exclusions
5454

5555
### Prerequisites
5656

5757
* Isolation exclusion is available on Windows (minimum client version 10.8470) and macOS (minimum client version 101.240902).
58-
* Enabling isolation exclusion requires Security Admin permissions or above.
59-
* Isolation exclusion must be enabled. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
58+
* Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin permissions or above. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
6059

6160
:::image type="content" source="./media/isolation-exclusions/enable-exclusions.png" alt-text="Screenshot showing how to enable isolation exclusions." lightbox="./media/isolation-exclusions/enable-exclusions.png":::
6261

6362
> [!NOTE]
64-
> Once the feature is enabled, the default exclusions for classic Teams and Outlook will no longer apply, and the exclusions list will start empty across all platforms.
63+
> Once the Isolation Exclusions feature has been enabled, the previously embedded exclusions for Microsoft Teams, Outlook, and Skype will no longer apply, and the exclusions list will start empty across all platforms. If Microsoft Teams, Outlook, and Skype still require access during isolation, you must manually define new exclusion rules for them.
64+
>
65+
> Note that Skype has been deprecated and is no longer included in any default exclusions.
6566
6667
### Step 1: Define global exclusions in settings
6768

68-
[[NEED AN INTRO STATEMENT ABOUT WHAT WE'RE GOING TO BE DOING]]
69-
7069
1. Navigate to **Settings** > **Endpoints** > **Isolation Exclusion Rules**.
7170

7271
1. Select the relevant OS tab (Windows or macOS).
@@ -75,34 +74,37 @@ There are two modes of isolation: **full isolation** and **selective isolation**
7574

7675
:::image type="content" source="./media/isolation-exclusions/add-new-exclusion-rule.png" alt-text="Screenshot showing how to add a new isolation exclusion rule." lightbox="./media/isolation-exclusions/add-new-exclusion-rule.png":::
7776

78-
1. On the **Add new exclusion rule** page, fill in the parameters. Red asterisks denote mandatory parameters.
77+
1. In the **Add new exclusion rule** dialog, fill in the parameters. Red asterisks denote mandatory parameters.
7978

80-
:::image type="content" source="./media/isolation-exclusions/exclusion-rule-definition.png" alt-text="Screenshot showing the fields required for defining an isolation exclusion rule." lightbox="./media/isolation-exclusions/exclusion-rule-definition.png":::
79+
Isolation exclusion rule parameters and their valid values are described in the following table.
8180

82-
| Parameter | Description |
81+
| Parameter | Description and valid values |
8382
|:-----|:-----|
8483
| **Rule name** | Provide a name for the rule. |
8584
| **Rule description** | Describe the purpose of the rule. |
86-
|**Process path** (Windows only) | The file path of an executable is simply its location on the endpoint. You can define one executable to be used in each rule.<br><br>Example: `C:\Windows\System\Notepad.exe or %WINDIR%\Notepad.exe.`<br><br>**Note**: Exclusion won't apply to any child processes created by the specified process. |
87-
| **Service name** (Windows only) | Windows service short names can be used in cases you want to exclude a service (not an application) that is sending or receiving traffic. Service short names can be retrieved by running the *Get-Service* command from PowerShell. You can define one service to be used in each rule.<br><br>Example: termservice |
88-
| **Package family name** | The Package Family Name (PFN) is a unique identifier assigned to Windows app packages. The PFN format follows this structure: `<Name>_<PublisherId>`<br><br>Package family names can be retrieved by running the *Get-AppxPackage* command from PowerShell. For example, to get the new Microsoft Teams PFN, run `Get-AppxPackage MSTeams`, and look for the value of the **PackageFamilyName** property.<br><br>Supported on:<br>- Windows 11 (24H2)<br>- Windows Server 2025<br>- Windows 11 (22H2) Windows 11, version 23H2 KB5050092<br>- Windows Server, Version 23H2<br>- Windows 10 22H2 - KB 5050081 |
89-
| **Direction** | The connection direction (Inbound/Outbound). Examples:<br><br>**Outbound connection**: If the device initiates a connection, for instance, an HTTPS connection to a remote backend server, define only an outbound rule. Example: The device sends a request to 1.1.1.1 (outbound), then no inbound rule is needed, as the response from the server is automatically accepted as part of the connection.<br><br>**Inbound connection**: If the device is listening to incoming connections, define an **inbound rule**.|
90-
| **Remote IP** | The IP(s) not subject to network isolation as per the rule.<br><br>Supported IP formats:<br>- IPv4/IPv6, with optional CIDR notation<br>- A list of IPs<br><br>Valid input examples:<br>- Single IP address: `1.1.1.1`<br>- IPV6 address: `2001:db8:85a3::8a2e:370:7334`<br>- IP address with CIDR notation (IPv4 or IPv6): `1.1.1.1/24`<br>&nbsp;&nbsp;This example defines a range of IP addresses. In this case, it includes all IPs from 1.1.1.0 to 1.1.1.255. The /24 represents the subnet mask, which specifies that the first 24 bits of the address are fixed, and the remaining 8 bits define the address range.|
85+
|**Process path** (Windows only) | The file path of an executable is simply its location on the endpoint. You can define one executable to be used in each rule.<br><br>Example: `C:\Windows\System\Notepad.exe`<br>`%WINDIR%\Notepad.exe.`<br><br>**Note**: Exclusion won't apply to any child processes created by the specified process. |
86+
| **Service name** (Windows only) | Windows service short names can be used in cases you want to exclude a service (not an application) that is sending or receiving traffic. Service short names can be retrieved by running the *Get-Service* command from PowerShell. You can define one service to be used in each rule.<br><br>Example: termservice |
87+
| **Package family name** | The Package Family Name (PFN) is a unique identifier assigned to Windows app packages. The PFN format follows this structure: `<Name>_<PublisherId>`<br><br>Package family names can be retrieved by running the *Get-AppxPackage* command from PowerShell. For example, to get the new Microsoft Teams PFN, run `Get-AppxPackage MSTeams`, and look for the value of the **PackageFamilyName** property.<br><br>Supported on:<br>- Windows 11 (24H2)<br>- Windows Server 2025<br>- Windows 11 (22H2) Windows 11, version 23H2 KB5050092<br>- Windows Server, Version 23H2<br>- Windows 10 22H2 - KB 5050081 |
88+
| **Direction** | The connection direction (Inbound/Outbound). Examples:<br><br>**Outbound connection**: If the device initiates a connection, for instance, an HTTPS connection to a remote backend server, define only an outbound rule. Example: The device sends a request to 1.1.1.1 (outbound). In this case, no inbound rule is needed, as the response from the server is automatically accepted as part of the connection.<br><br>**Inbound connection**: If the device is listening to incoming connections, define an **inbound rule**.|
89+
| **Remote IP** | The IP (or IPs) with which communication is allowed while the device is isolated from the network.<br><br>Supported IP formats:<br>- IPv4/IPv6, with optional CIDR notation<br>- A comma-separated list of valid IPs<br><br>Valid input examples:<br>- Single IP address: `1.1.1.1`<br>- IPV6 address: `2001:db8:85a3::8a2e:370:7334`<br>- IP address with CIDR notation (IPv4 or IPv6): `1.1.1.1/24`<br>&nbsp;&nbsp;This example defines a range of IP addresses. In this case, it includes all IPs from 1.1.1.0 to 1.1.1.255. The /24 represents the subnet mask, which specifies that the first 24 bits of the address are fixed, and the remaining 8 bits define the address range.|
90+
91+
:::image type="content" source="./media/isolation-exclusions/exclusion-rule-definition.png" alt-text="Screenshot showing the fields required for defining an isolation exclusion rule." lightbox="./media/isolation-exclusions/exclusion-rule-definition.png":::
9192

92-
1. Save and apply changes.
93+
1. Save and apply changes.
9394

9495
**These global rules apply whenever selective isolation is enabled for a device.**
9596

9697
### Step 2: Apply selective isolation to a specific device
9798

9899
1. Navigate to the device page in the portal.
99100
1. Select **Isolate device** and choose **Selective isolation**.
100-
1. Check **Use isolation exclusions** to apply defined exclusion rules.
101-
1. Select **Confirm**.
101+
1. Check **Use isolation exclusions to allow specific communication while the device is isolated** and enter a comment.
102+
103+
:::image type="content" source="./media/isolation-exclusions/apply-exclusion-rule.png" alt-text="Screenshot showing how to apply an exclusion rule to a device." lightbox="./media/isolation-exclusions/apply-exclusion-rule.png":::
102104

103-
:::image type="content" source="./media/isolation-exclusions/apply-exclusion-rule.png" alt-text="Screenshot showing how to apply an exclusion rule to a device." lightbox="./media/isolation-exclusions/apply-exclusion-rule.png":::
105+
1. Select **Confirm**.
104106

105-
Exclusions that were applied to a specific device can be later reviewed in the Action Center history.
107+
Exclusions that were applied to a specific device can be reviewed in the Action Center history.
106108

107109
:::image type="content" source="./media/isolation-exclusions/review-exclusions.png" alt-text="Screenshot showing exclusions in the Action Center history." lightbox="./media/isolation-exclusions/review-exclusions.png":::
108110

@@ -142,12 +144,12 @@ To trigger isolation with exclusions via API, set the IsolationType parameter to
142144

143145
## Considerations and limitations
144146

145-
When a device is isolated, any new Isolation Exclusion Rules added from the portal won't apply to the currently isolated device. Instead, newly added exclusions will only take effect for future isolation requests.
147+
When a device is isolated, any new isolation exclusion rules added from the portal won't apply to the currently isolated device. Instead, newly added exclusions will only take effect for future isolation requests.
146148

147149
If an exclusion needs to be applied to a device that is already isolated, the following steps must be taken:
148150

149151
1. Unisolate the device.
150-
1. Ensure the exclusion rule is in place.
152+
1. Ensure that the relevant, correctly defined exclusion rule is in place.
151153
1. Reisolate the device for the updated exclusion rule to take effect.
152154

153155
This behavior ensures that isolation rules remain consistent throughout the duration of an active isolation session.

0 commit comments

Comments
 (0)