There is a threat in your environment, and you want to know how best to use SEPM to keep the threat from spreading to other systems.
SymptomsYou have systems in your environment that are suspected or known to be infected. You would like to isolate the clients to prevent the spread of any malware that may be present on those systems.