1. Palo Alto Networks, "Cortex XDR Administrator's Guide": In the section on Response Actions, the guide details the "Isolate Endpoint" feature. It states, "To contain a security incident, you can isolate an endpoint or group of endpoints from your network... When you isolate an endpoint, you halt all network access on the endpoint except for traffic to the Cortex XDR console." This directly supports isolating the endpoint as a primary containment step.
2. Palo Alto Networks, "Cortex XSIAM Analyst Guide": The documentation on "Take Action on Incidents" lists both "Isolate endpoint" and "Block IP address" as available manual response actions for analysts. This confirms that both are intended and appropriate actions within the XSIAM platform for responding to such a threat.
3. NIST Special Publication 800-61 Rev. 2, "Computer Security Incident Handling Guide": Section 3.3.1, "Containment," outlines strategies for limiting the scope and magnitude of an incident. It recommends actions such as "disconnecting the affected system from the network" (Isolate) and "blocking traffic to and from the suspect IP addresses" (Block IP), validating these choices as industry best practices for incident containment.