Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to:
Important
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Want to experience Defender for Endpoint? Sign up for a free trial.
Isolation exclusion refers to the ability to exclude specific processes, IP addresses, or services from network isolation by applying the selective isolation response action to devices.
Network isolation in Microsoft Defender for Endpoint (MDE) restricts a compromised device's communication to prevent threat spread. However, certain critical services, such as management tools or security solutions, might need to remain operational.
Isolation exclusions allow designated processes or endpoints to bypass the restrictions of network isolation, ensuring essential functions (for example, remote remediation or monitoring) continue while limiting broader network exposure.
Warning
Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when strictly necessary.
Regularly review and update exclusions to align with security policies.
Isolation modes
There are two modes of isolation: full isolation and selective isolation.
Full isolation: In full isolation mode, the device is completely isolated from the network, and no exceptions are allowed. All traffic is blocked, except for essential communications with the Defender agent. Exclusions aren't applied in full isolation mode.
Full isolation mode is the most secure option, suitable for scenarios where a high level of containment is necessary. For more information about full isolation mode, see Isolate devices from the network.
Selective isolation: Selective isolation mode allows administrators to apply exclusions to ensure that critical tools and network communications can still function, while maintaining the device's isolated state.
How to use isolation exclusion
There are two steps to using isolation exclusion: defining isolation exclusion rules, and applying isolation exclusion on a device. These steps are described in the following sections. To use isolation exclusion, the feature must be enabled, as described in the prerequisites.
Prerequisites
Isolation exclusion is available on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS.
Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin or Manage Security settings permissions or above. To enable isolation exclusion, sign in to the Microsoft Defender portal and go to Settings > Endpoints > Advanced features and enable Isolation Exclusion Rules feature.
Note
Once the Isolation Exclusions feature has been enabled, the previously embedded exclusions for Microsoft Teams, Outlook, and Skype will no longer apply, and the exclusions list will start empty across all platforms. If Microsoft Teams, Outlook, and Skype still require access during isolation, you must manually define new exclusion rules for them.
Note that Skype has been deprecated and is no longer included in any default exclusions.
Step 1: Define global exclusions in the settings
In the Microsoft Defender portal, navigate to Settings > Endpoints > Isolation Exclusion Rules.
Select the relevant OS tab (Windows rules or Mac rules).
Select + Add exclusion rule
The Add new exclusion rule dialog appears:
Fill in the isolation exclusion parameters. Red asterisks denote mandatory parameters. The parameters and their valid values are described in the following table.
Parameter Description and valid values Rule name Provide a name for the rule. Rule description Describe the purpose of the rule. Process path (Windows only) The file path of an executable is simply its location on the endpoint. You can define one executable to be used in each rule.
Examples:C:\Windows\System\Notepad.exe
%WINDIR%\Notepad.exe.
Notes:
- The executable must exist when isolation is applied, otherwise the exclusion rule will be ignored.
- Exclusion won't apply to any child processes created by the specified process.Service name (Windows only) Windows service short names can be used in cases you want to exclude a service (not an application) that is sending or receiving traffic. Service short names can be retrieved by running the Get-Service command from PowerShell. You can define one service to be used in each rule.
Example: termservicePackage family name (Windows only) The Package Family Name (PFN) is a unique identifier assigned to Windows app packages. The PFN format follows this structure: <Name>_<PublisherId>
Package family names can be retrieved by running the Get-AppxPackage command from PowerShell. For example, to get the new Microsoft Teams PFN, runGet-AppxPackage MSTeams
, and look for the value of the PackageFamilyName property.
Supported on:
- Windows 11 (24H2)
- Windows Server 2025
- Windows 11 (22H2) Windows 11, version 23H2 KB5050092
- Windows Server, Version 23H2
- Windows 10 22H2 - KB 5050081Direction The connection direction (Inbound/Outbound). Examples:
Outbound connection: If the device initiates a connection, for instance, an HTTPS connection to a remote backend server, define only an outbound rule. Example: The device sends a request to 1.1.1.1 (outbound). In this case, no inbound rule is needed, as the response from the server is automatically accepted as part of the connection.
Inbound connection: If the device is listening to incoming connections, define an inbound rule.Remote IP The IP (or IPs) with which communication is allowed while the device is isolated from the network.
Supported IP formats:
- IPv4/IPv6, with optional CIDR notation
- A comma-separated list of valid IPs
Up to 20 IP addresses can be defined per rule.
Valid input examples:
- Single IP address:1.1.1.1
- IPV6 address:2001:db8:85a3::8a2e:370:7334
- IP address with CIDR notation (IPv4 or IPv6):1.1.1.1/24
This example defines a range of IP addresses. In this case, it includes all IPs from 1.1.1.0 to 1.1.1.255. The /24 represents the subnet mask, which specifies that the first 24 bits of the address are fixed, and the remaining 8 bits define the address range.Save and apply changes.
These global rules apply whenever selective isolation is enabled for a device.
Step 2: Apply selective isolation to a specific device
Navigate to the device page in the portal.
Select Isolate device and choose Selective isolation.
Check Use isolation exclusions to allow specific communication while the device is isolated and enter a comment.
Select Confirm.
Exclusions that were applied to a specific device can be reviewed in the Action Center history.
Apply selective isolation via API
Alternatively, you can apply selective isolation via API. To do so, set the IsolationType parameter to Selective. For more information, see Isolate machine API.
Exclusion Logic
- All rules that match will be applied.
- Within a single rule, conditions use AND logic (all must match).
- Undefined conditions in a rule are treated as "any" (that is, unrestricted for that parameter).
For example, if the following rules are defined:
Rule 1:
Process path = c:\example.exe
Remote IP = 1.1.1.1
Direction = Outbound
Rule 2:
Process path = c:\example_2.exe
Direction = Outbound
Rule 3:
Remote IP = 18.18.18.18
Direction = Inbound
- example.exe will only be able to initiate network connections to remote IP 1.1.1.1.
- example_2.exe can initiate network connections to every IP address.
- The device can receive inbound connection from IP address 18.18.18.18.
Considerations and limitations
Changes to exclusion rules only impact new isolation requests. Devices that were already isolated remain with the exclusions that were defined when they were applied. To apply updated exclusion rules to isolated devices, release those devices from isolation and then reisolate them.
This behavior ensures that isolation rules remain consistent throughout the duration of an active isolation session.
Related content
- Take response actions on a device
- Investigate files
- Manual response actions in Microsoft Defender for Endpoint Plan 1
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.