Skip to content

Commit 854daa3

Browse files
Merge pull request #4292 from MicrosoftDocs/main
[AutoPublish] main to live - 06/22 01:33 PDT | 06/22 14:03 IST
2 parents bb34406 + 165d520 commit 854daa3

10 files changed

+170
-2
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1046,6 +1046,8 @@
10461046
href: respond-machine-alerts.md#restrict-app-execution
10471047
- name: Isolate devices from the network
10481048
href: respond-machine-alerts.md#isolate-devices-from-the-network
1049+
- name: Isolation exclusions
1050+
href: isolation-exclusions.md
10491051
- name: Contain devices from the network
10501052
href: respond-machine-alerts.md#contain-devices-from-the-network
10511053
- name: Contain user from the network
Lines changed: 165 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
---
2+
title: Isolation exclusions in Microsoft Defender for Endpoint
3+
description: Learn about to exclude specific processes, IP addresses, or services from network isolation when applying selective isolation action to devices.
4+
ms.service: defender-endpoint
5+
ms.author: painbar
6+
author: paulinbar
7+
ms.localizationpriority: medium
8+
manager: orspod
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- tier2
13+
- mde-edr
14+
ms.topic: how-to
15+
ms.subservice: edr
16+
search.appverid: met150
17+
ms.date: 06/22/2025
18+
---
19+
20+
# Isolation exclusions (preview)
21+
22+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
23+
24+
**Applies to:**
25+
26+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27+
28+
[!include[Prerelease information](../includes/prerelease.md)]
29+
30+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
31+
32+
Isolation exclusion refers to the ability to exclude specific processes, IP addresses, or services from network isolation by applying the selective isolation response action to devices.
33+
34+
Network isolation in Microsoft Defender for Endpoint (MDE) restricts a compromised device's communication to prevent threat spread. However, certain critical services, such as management tools or security solutions, might need to remain operational.
35+
36+
Isolation exclusions allow designated processes or endpoints to bypass the restrictions of network isolation, ensuring essential functions (for example, remote remediation or monitoring) continue while limiting broader network exposure.
37+
38+
> [!WARNING]
39+
> **Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when strictly necessary**.
40+
41+
Regularly review and update exclusions to align with security policies.
42+
43+
## Isolation modes
44+
45+
There are two modes of isolation: **full isolation** and **selective isolation**.
46+
47+
* **Full isolation**: In full isolation mode, the device is completely isolated from the network, and no exceptions are allowed. All traffic is blocked, except for essential communications with the Defender agent. Exclusions aren't applied in full isolation mode.
48+
49+
Full isolation mode is the most secure option, suitable for scenarios where a high level of containment is necessary. For more information about full isolation mode, see [Isolate devices from the network](/defender-endpoint/respond-machine-alerts#isolate-devices-from-the-network).
50+
51+
* **Selective isolation**: Selective isolation mode allows administrators to apply exclusions to ensure that critical tools and network communications can still function, while maintaining the device's isolated state.
52+
53+
## How to use isolation exclusion
54+
55+
There are two steps to using isolation exclusion: defining isolation exclusion rules, and applying isolation exclusion on a device. These steps are described in the following sections. To use isolation exclusion, the feature must be enabled, as described in the prerequisites.
56+
57+
### Prerequisites
58+
59+
* Isolation exclusion is available on Windows (minimum client version 10.8470) and macOS (minimum client version 101.240902).
60+
* Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin permissions or above. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
61+
62+
:::image type="content" source="./media/isolation-exclusions/enable-exclusions.png" alt-text="Screenshot showing how to enable isolation exclusions." lightbox="./media/isolation-exclusions/enable-exclusions.png":::
63+
64+
> [!NOTE]
65+
> Once the Isolation Exclusions feature has been enabled, the previously embedded exclusions for Microsoft Teams, Outlook, and Skype will no longer apply, and the exclusions list will start empty across all platforms. If Microsoft Teams, Outlook, and Skype still require access during isolation, you must manually define new exclusion rules for them.
66+
>
67+
> Note that Skype has been deprecated and is no longer included in any default exclusions.
68+
69+
### Step 1: Define global exclusions in the settings
70+
71+
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Isolation Exclusion Rules**.
72+
73+
1. Select the relevant OS tab (Windows rules or Mac rules).
74+
75+
1. Select **+ Add exclusion rule**
76+
77+
:::image type="content" source="./media/isolation-exclusions/add-new-exclusion-rule.png" alt-text="Screenshot showing how to add a new isolation exclusion rule." lightbox="./media/isolation-exclusions/add-new-exclusion-rule.png":::
78+
79+
1. The **Add new exclusion rule** dialog appears:
80+
81+
:::image type="content" source="./media/isolation-exclusions/exclusion-rule-definition.png" alt-text="Screenshot showing the fields required for defining an isolation exclusion rule.":::
82+
83+
Fill in the isolation exclusion parameters. Red asterisks denote mandatory parameters. The parameters and their valid values are described in the following table.
84+
85+
| Parameter | Description and valid values |
86+
|:-----|:-----|
87+
| **Rule name** | Provide a name for the rule. |
88+
| **Rule description** | Describe the purpose of the rule. |
89+
|**Process path** (Windows only) | The file path of an executable is simply its location on the endpoint. You can define one executable to be used in each rule.<br><br>Examples:<br>`C:\Windows\System\Notepad.exe`<br>`%WINDIR%\Notepad.exe.`<br><br>**Note**: Exclusion won't apply to any child processes created by the specified process. |
90+
| **Service name** (Windows only) | Windows service short names can be used in cases you want to exclude a service (not an application) that is sending or receiving traffic. Service short names can be retrieved by running the *Get-Service* command from PowerShell. You can define one service to be used in each rule.<br><br>Example: termservice |
91+
| **Package family name** | The Package Family Name (PFN) is a unique identifier assigned to Windows app packages. The PFN format follows this structure: `<Name>_<PublisherId>`<br><br>Package family names can be retrieved by running the *Get-AppxPackage* command from PowerShell. For example, to get the new Microsoft Teams PFN, run `Get-AppxPackage MSTeams`, and look for the value of the **PackageFamilyName** property.<br><br>Supported on:<br>- Windows 11 (24H2)<br>- Windows Server 2025<br>- Windows 11 (22H2) Windows 11, version 23H2 KB5050092<br>- Windows Server, Version 23H2<br>- Windows 10 22H2 - KB 5050081 |
92+
| **Direction** | The connection direction (Inbound/Outbound). Examples:<br><br>**Outbound connection**: If the device initiates a connection, for instance, an HTTPS connection to a remote backend server, define only an outbound rule. Example: The device sends a request to 1.1.1.1 (outbound). In this case, no inbound rule is needed, as the response from the server is automatically accepted as part of the connection.<br><br>**Inbound connection**: If the device is listening to incoming connections, define an **inbound rule**.|
93+
| **Remote IP** | The IP (or IPs) with which communication is allowed while the device is isolated from the network.<br><br>Supported IP formats:<br>- IPv4/IPv6, with optional CIDR notation<br>- A comma-separated list of valid IPs<br><br>Valid input examples:<br>- Single IP address: `1.1.1.1`<br>- IPV6 address: `2001:db8:85a3::8a2e:370:7334`<br>- IP address with CIDR notation (IPv4 or IPv6): `1.1.1.1/24`<br>&nbsp;&nbsp;This example defines a range of IP addresses. In this case, it includes all IPs from 1.1.1.0 to 1.1.1.255. The /24 represents the subnet mask, which specifies that the first 24 bits of the address are fixed, and the remaining 8 bits define the address range.|
94+
95+
1. Save and apply changes.
96+
97+
**These global rules apply whenever selective isolation is enabled for a device.**
98+
99+
### Step 2: Apply selective isolation to a specific device
100+
101+
1. Navigate to the device page in the portal.
102+
1. Select **Isolate device** and choose **Selective isolation**.
103+
1. Check **Use isolation exclusions to allow specific communication while the device is isolated** and enter a comment.
104+
105+
:::image type="content" source="./media/isolation-exclusions/apply-exclusion-rule.png" alt-text="Screenshot showing how to apply an exclusion rule to a device.":::
106+
107+
1. Select **Confirm**.
108+
109+
Exclusions that were applied to a specific device can be reviewed in the Action Center history.
110+
111+
:::image type="content" source="./media/isolation-exclusions/review-exclusions.png" alt-text="Screenshot showing exclusions in the Action Center history." lightbox="./media/isolation-exclusions/review-exclusions.png":::
112+
113+
### API Configuration
114+
115+
To trigger isolation with exclusions via API, set the IsolationType parameter to "Selective". See [Isolate machine API](/defender-endpoint/api/isolate-machine) for detail.
116+
117+
## Exclusion Logic
118+
119+
* All rules that match will be applied.
120+
* Within a single rule, conditions use AND logic (all must match).
121+
* Undefined conditions in a rule are treated as "any" (that is, unrestricted for that parameter).
122+
123+
For example, if the following rules are defined:
124+
125+
```
126+
Rule 1:
127+
128+
Process path = c:\example.exe
129+
Remote IP = 1.1.1.1
130+
Direction = Outbound
131+
132+
Rule 2:
133+
134+
Process path = c:\example_2.exe
135+
Direction = Outbound
136+
137+
Rule 3:
138+
139+
Remote IP = 18.18.18.18
140+
Direction = Inbound
141+
142+
```
143+
* *example.exe* will only be able to initiate network connections to remote IP 1.1.1.1.
144+
* *example_2.exe* can initiate network connections to every IP address.
145+
* The device can receive inbound connection from IP address 18.18.18.18.
146+
147+
## Considerations and limitations
148+
149+
When a device is isolated, any new isolation exclusion rules added from the portal won't apply to the currently isolated device. Instead, newly added exclusions will only take effect for future isolation requests.
150+
151+
If an exclusion needs to be applied to a device that is already isolated, the following steps must be taken:
152+
153+
1. Unisolate the device.
154+
1. Ensure that the relevant, correctly defined exclusion rule is in place.
155+
1. Reisolate the device for the updated exclusion rule to take effect.
156+
157+
This behavior ensures that isolation rules remain consistent throughout the duration of an active isolation session.
158+
159+
## Related content
160+
161+
- [Take response actions on a device](respond-machine-alerts.md)
162+
- [Investigate files](investigate-files.md)
163+
- [Manual response actions in Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md#manual-response-actions)
164+
165+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/managing-exclusions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,3 +169,4 @@ See [Configure and validate exclusions for Microsoft Defender for Endpoint on ma
169169

170170
- [Add exclusions to network protection](/defender-endpoint/troubleshoot-np#add-exclusions)
171171
- [Important points about exclusions](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus#important-points-about-exclusions)
172+
- [Isolation exclusions](/defender-endpoint/isolation-exclusions)
98.9 KB
Loading
57.1 KB
Loading
207 KB
Loading
99.6 KB
Loading
121 KB
Loading

defender-endpoint/onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ This table provides an example of the deployment rings you might use:
7373
|Deployment ring|Description|
7474
|---|---|
7575
|Evaluate|Ring 1: Identify 50 devices to onboard to the service for testing.|
76-
|Pilot|Ring 2: Identify and onboard the next 50-100 endpoints in a production environment. Microsoft Defender for Endpoint supports various endpoints that you can onboard to the service, for more information, see [Select deployment method](deployment-strategy.md#step-2-select-your-deployment-method).|
76+
|Pilot|Ring 2: Identify and onboard the next 50-100 endpoints in a production environment. Microsoft Defender for Endpoint supports various endpoints that you can onboard to the service. For more information, see [Select deployment method](deployment-strategy.md#step-2-select-your-deployment-method).|
7777
|Full deployment|Ring 3: Roll out service to the rest of environment in larger increments. For more information, see [Get started with your Microsoft Defender for Endpoint deployment](mde-planning-guide.md).
7878

7979
### Exit criteria

defender-endpoint/respond-machine-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216216
- `iptables`
217217
- `ip6tables`
218218
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219-
- Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11.
219+
- Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
220220
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
221221
- The feature supports VPN connection.
222222
- You must have at least the `Active remediation actions` role assigned. For more information, see [Create and manage roles](user-roles.md).

0 commit comments

Comments
 (0)