There is a threat in your environment, and you want to know how best to use SEPM to keep the threat from spreading to other systems.
You have systems in your environment that are suspected or known to be infected. You would like to isolate the clients to prevent the spread of any malware that may be present on those systems.
The solution involves three main steps: Creating a new group to isolate the clients, creating a series of policies and assigning those policies to the new group, then assigning clients to the group.
1. Create a group in the SEPM that will be used to isolate the clients