Skip to main content

Response Actions

Defend provides 10 response action types to contain, remediate, and recover from threats. Actions can be triggered manually from an investigation, automatically via response rules, or in bulk across multiple devices.

Action Types

ActionWhat It DoesDestructive
Kill ProcessTerminates a running process by PIDNo
Isolate DeviceBlocks all network access except the RMM management channel (port 443)Yes
Unisolate DeviceRestores full network access after isolationNo
Quarantine FileMoves a file to a secure quarantine directory where it cannot executeYes
Block IPAdds a Windows Firewall rule to block outbound traffic to a specific IPNo
Unblock IPRemoves a previously added firewall block ruleNo
Reset User SessionForces logout of the active user sessionYes
Force Password ResetFlags the user in People and sends a password reset notificationYes
Collect ForensicsGathers memory dump, Windows Event Logs, and Prefetch filesNo
Run ScriptExecutes a custom remediation script via the RMM integrationDepends

Dual-Control Approval

Destructive actions require dual-control approval by default:

  1. An analyst submits the response action with a justification
  2. A different analyst reviews and approves the action
  3. The same person who submitted cannot approve their own action
  4. Once approved, the action is queued for execution

Non-destructive actions (kill process, block/unblock IP) are auto-queued unless your organization has configured them to require approval.

You can customize which actions require approval in Settings → Response Automation → Approval Requirements.

Action Lifecycle

Every response action follows this status flow:

pending_approval → queued → executing → completed / failed / cancelled
  • Pending approval — Waiting for a second analyst to approve (destructive actions)
  • Queued — Approved and waiting for the agent to pick up the command
  • Executing — Agent is carrying out the action
  • Completed — Action succeeded, verification passed
  • Failed — Action could not be completed (agent offline, permission error)
  • Cancelled — Analyst cancelled the action before execution

Post-Action Verification

60 seconds after an action completes, Defend runs automatic verification:

  • Kill process — Confirms the process is no longer running
  • Isolate device — Confirms network access is blocked (except management channel)
  • Quarantine file — Confirms the file has been moved and is not executable
  • Block IP — Confirms the firewall rule is active

Verification results are logged with the action record.

Auto-Response

Configure automatic response actions for critical and high-severity detections:

SettingDescription
Auto-isolate on criticalAutomatically isolate devices when a critical-severity detection fires
Auto-kill on highAutomatically terminate the malicious process on high-severity detections
Active hoursTime window during which auto-response is active (e.g., after hours only)
Require approval forOverride specific action types to always require approval
ℹ️Auto-response bypasses dual-control approval. Enable it only after you've tuned your detection rules to minimize false positives — an auto-isolate on a false positive will disconnect a user's workstation from the network.

Bulk Response

When an attack affects multiple devices (e.g., worm propagation, lateral movement):

  1. Select multiple devices from the detection dashboard or lateral movement graph
  2. Choose a response action
  3. The action is applied to all selected devices simultaneously
  4. Each device's action is tracked independently in the audit trail

Audit Trail

Every response action is logged with:

  • Who submitted it and when
  • Who approved it (if applicable)
  • Execution start and completion timestamps
  • Verification result
  • The detection or alert that triggered the action

The audit trail is accessible from Response Actions → History and is included in compliance reports.

Next Steps