A SEP client remains quarantined even after the EDR rescinds the quarantine because communications to the EDR are blocked by the "Symantec EDR Quarantine Firewall policy".
All SEPM and SEDR releases
"Symantec EDR Quarantine Firewall policy" does not have rules to permit:
When a client machine is "Quarantined" or "Isolated", the SEPM and EDR should be able to connect to make policy changes or to perform troubleshooting. Thus, it may be necessary to recover the VPN connection by adding "Allow" rules for the VPN traffic so that the client can communicate to the internal network, i.e. namely the SEPM and EDR.
The following options are listed from "best to least" to regain access to a "Quarantined" SEP client:
Option 1 - "Open External Firewall to access EDR"
Option 2 - "Duplicate and modify the SEDR Quarantine Firewall policy - Add rules to allow VPN and SEPM communications."
Step 1 - Duplicate Rule "Symantec EDR Quarantine Firewall policy"
Step 2 - Add a new location "VPN Connected - Isolated"
Step 3 - Add firewall rules to allow VPN and EDR traffic
Step 4 - Assign policy to all groups that the EDR manages
Option 3 - "Stopping SEP client / Connecting to VPN"
Warning: If your system is potentially infected, it is recommended NOT TO USE THESE STEPS because the firewall is not running.
Additional Background:
When a SEP client is quarantined by the EDR, the EDR raises the Host Integrity (HI) flag over Endpoint Communication Channel (ECC); which activates "Symantec EDR Quarantine Firewall policy".
Other recommendations:
Review the following for possible improvements to the network configuration.
Where to place the appliance in your network for best results
Logical network diagram of a typical situation where EDR Isolate/Rejoin would need additional configuration of the Firewall rule within SEPM: