New Microsoft Defender Feature Helps To Isolate Hacked, Vulnerable Devices

June 10, 2022

A new Microsoft Defender for Endpoint (MDE) feature will help organizations prevent attackers and malware from using compromised or vulnerable systems to move through networks.

Once compromised vulnerable Windows devices are contained by the new feature, the enterprise endpoint security platform will instruct Windows systems on the network to block all communication to and from the device.

However, the new feature is limited since it only works with onboarded devices running Windows 10 and later or Windows Server 2019 and later.

“Only devices running on Windows 10 and above will perform the Contain action meaning that only devices running Windows 10 and above that are enrolled in Microsoft Defender for Endpoint will block ‘contained’ devices at this time,” Microsoft explains.

To contain a potentially compromised device, administrators are advised to go to the Device Inventory page of the Microsoft 365 Defender portal and select the device to contain. Next, they can select ‘Contain device’ from the actions menu in the device flyout. Lastly, they can type a comment on the contain device group and select ‘Confirm.’

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 20, 2026 A U.S. court has ordered shadow library Anna’s Archive to pay $322 million in damages after finding more...

April 17, 2026 Microsoft’s Recall feature for Copilot+ PCs is again under scrutiny after a researcher demonstrated a way to more...

April 17, 2026 OpenAI is telling staff to prioritise expanding its partnership with Amazon Web Services, signalling a strategic shift more...

April 17, 2026 Uber says its spending on AI coding tools has already exceeded internal forecasts as adoption accelerates across more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn