This is a dedicated watch page for a single video.
A computer in your organization shows signs of unusual behavior, including strange network activity and unexpected processes running. To protect your network, which Microsoft 365 Defender feature should you use to cut off this device from the rest of the network?