Skip to content

Commit 52de01e

Browse files
committed
Update as per PM
1 parent c26e6e5 commit 52de01e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/respond-machine-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216216
- `iptables`
217217
- `ip6tables`
218218
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219-
- Selective isolation is available for devices running on operating systems that support that feature. For more information, see [Isolation exclusions](./isolation-exclusions.md).
219+
- Selective isolation is available for devices running on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
220220
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
221221
- The feature supports VPN connection.
222222
- You must have at least the `Active remediation actions` role assigned. For more information, see [Create and manage roles](user-roles.md).

0 commit comments

Comments
 (0)