An isolation approach for network users associated with elevated risk is
disclosed for protecting networks. In one approach a method comprises the
computer-implemented steps of determining a user identifier associated
with a network device that has caused a security event in a network;
causing the network device to receive a network address that is selected
from a subset of addresses within a specified pool associated with
suspected malicious network users; and configuring one or more security
restrictions with respect to the selected network address.