PCs that are connected without authorization as well as PCs that are used in violation of in-house policies are isolated from the in-house network to ensure security. Users are guided from quarantine to restoration while minimizing the risk of business suspension.