Response action descriptions
Arctic Wolf® Active Response includes these response actions.
- Contain a host/Remove from containment
-
Containing a host isolates a device from a network. Depending on the integration, this may include preventing the device from communicating externally or with other devices on the network. Lifting containment, once safe, reintegrates the device into the network.
- Quarantine a file/Remove from quarantine
-
Quarantining a file adds a quarantine extension moves it to a protected quarantine folder. Removing the file from quarantine restores the format and original location.
- Disable/Enable a user
-
Disabling a user account prevents a user from being able to sign in. Depending on the integration, it may close active sessions. Enabling a user restores authentication abilities.
- Close user connections
-
This action signs the user out and revokes all active sessions.
- Add/Remove a user from a security group
-
These actions grant or revoke access to a particular security group. Security groups often control access to resources, systems, and applications within an organization.
Generally, removing a user from a group restricts access to organizational assets. Microsoft Entra ID supports conditional access groups, and if configured, adding a user to that group restricts access to cloud-based organizational assets.
- Force a password reset
-
This action forces a password reset, which invalidates potentially compromised credentials and prompts a user to create a new password.
- Delete a malicious email
-
Depending on the integration, this action:
- Abnormal Security — Remediates all emails based on a threat ID. If multiple emails are associated with a single threat ID, all instances are moved to the Junk or Deleted Items folder, depending on your organization's remediation policy.
- Microsoft 365 — Sends a request to the email client to move an email to either the Junk or Deleted Items folder for a specific user, based on the response action taken. This action only applies to the email that prompted the eligible incident.
- Mimecast — Deletes an email based on its message ID. If an email is sent to multiple people in the organization using the same message ID, each instance of the email is deleted.
- Add a malicious IP address to a denylist
-
This action places an IP address on a denylist, allowing a firewall to block the IP address from accessing the network.
- Block a malicious URL
-
This action places a URL on a denylist for a secure web gateway, preventing all users in your organization from accessing that web address.