Admin Isolated Devices

You can manage any devices you have isolated.

On the Settings > Admin Isolated Devices page you can see which devices you've isolated and remove them from isolation.

Note This list doesn't include devices that have isolated themselves automatically because their health is red, see Device Isolation in Threat Protection Policy.

You can isolate affected devices while you investigate a threat case, see Threat Cases. You can also search for other affected devices and isolate those from your threat search results, see Threat Searches.

You can allow isolated devices to communicate with other devices in limited circumstances, see Global Exclusions.

After you have cleaned up and blocked any suspicious applications you can remove the affected devices from isolation.

To do this:

  1. Select the device and click Remove from Isolation.