Network quarantine is the mechanism employed by ZeroLock™ to isolate the infected Linux endpoints from the company network until the malware has been analyzed and remediated.
At times, it becomes necessary to isolate a computer from the company’s network to protect the integrity of the network. A situation where this becomes necessary is when an endpoint suffers a malware attack.
There are two (2) ways ZeroLock™ places an endpoint into network quarantine: Manually or Automatically.
- On the ZeroLock™ Management Console (ZMC) go to Endpoints and select the endpoint to be quarantined.
- Next, from the Actions drop-down, select Quarantine Endpoint.
- On the Quarantine Endpoints screen you have the option to set the amount of time in seconds that the endpoint will be quarantined, or you may leave the timeout field blank, so that the endpoint will stay quarantined until manually released.
AutomaticallyAuto Quarantine is based on ransomware, crypto-jacking, or tampering alerts being triggered.
- The setting is enabled on the Configuration Profile assigned to an endpoint.
- On selecting Edit the full configuration profile settings are visible. Activate Auto-Quarantine by selecting the box for each section.
- On selecting Update a confirmation pop-up appears. Clicking Confirm sets the new configuration.
- You can tell an endpoint is under network quarantine by the purple dot on the Endpoints page.
- Even though an endpoint is quarantined, you can still see, connect, and work with the endpoint from the SHELL window on the endpoint detail page.
- Releasing an endpoint from quarantine is as simple as selecting the endpoint, returning to the Actions drop-down screen, and selecting Unquarantine Endpoint.