Rapid Quarantine

If you find a suspicious device on your network, you can quarantine it from the rest of your network with a click.  Proper rights are required to quarantine computers.  Notes like ticket numbers as well as username information is saved for each quarantine action so a log trail of what occurred is maintained.  In addition, network interfaces with that connect network infrastructure devices are prevented from being shut down to avoid accidentally creating problems by an incorrect port quarantine.