Skip to content

Commit 03d0384

Browse files
Merge pull request #3621 from MicrosoftDocs/main
[AutoPublish] main to live - 04/29 15:32 PDT | 04/30 04:02 IST
2 parents 09a6593 + 83537a6 commit 03d0384

17 files changed

+146
-79
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5+
pull-requests: read
56

67
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
78
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.

defender-vulnerability-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@
4242
href: tvm-hardware-and-firmware.md
4343
- name: Authenticated scan for Windows
4444
href: windows-authenticated-scan.md
45+
- name: Understand retention logic
46+
href: retention-logic-mdvm.md
4547
- name: Detect and assess threats
4648
items:
4749
- name: Dashboard insights
112 KB
Loading
File renamed without changes.
920 Bytes
Loading
File renamed without changes.
File renamed without changes.
85.5 KB
Loading
295 KB
Loading
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Understand retention logic in Microsoft Defender Vulnerability Management
3+
description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management.
4+
author: denisebmsft
5+
ms.author: deniseb
6+
manager: deniseb
7+
ms.reviewer: mobani
8+
ms.topic: concept-article
9+
ms.service: defender-vuln-mgmt
10+
ms.localizationpriority: medium
11+
ms.collection:
12+
- tier1
13+
- m365-security
14+
- essentials-overview
15+
search.appverid: met150
16+
audience: ITPro
17+
ms.date: 04/29/2025
18+
---
19+
20+
# Understand retention logic in Microsoft Defender Vulnerability Management
21+
22+
[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations use different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity.
23+
24+
This article describes how retention works for two common scenarios: inactive devices and uninstalled software.
25+
26+
## Inactive devices
27+
28+
In the Microsoft Defender portal, a device can be listed as inactive for any of the following reasons:
29+
30+
- The device stopped sending sensor data at least seven days ago
31+
- The device was offboarded from Defender for Endpoint at least seven days ago
32+
- The device has network connectivity issues, such as impaired communications, blocked URLs, or blocked ports, and sends some (but not all) events
33+
34+
If a device stops reporting to Defender for Endpoint, Defender Vulnerability Management continues to display the latest vulnerability snapshot for 30 days. After that, the device is marked as inactive, and its vulnerabilities are no longer shown in the [Microsoft Defender portal](https://security.microsoft.com). Data for inactive devices is retained for 180 days (see [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)).
35+
36+
To prevent confusion in your vulnerability data, you can exclude a device manually in the device inventory, as shown in the following screenshot:
37+
38+
:::image type="content" source="media/exclude-devices-menu.png" alt-text="Screenshot showing how to exclude devices in the Microsoft Defender portal device inventory.":::
39+
40+
For more information, see [Exclude devices](/defender-endpoint/exclude-devices).
41+
42+
## Uninstalled or inactive software
43+
44+
A device can continue reporting some telemetry but stop sending signals for specific software. If no events are received for the software for 30 consecutive days, Defender Vulnerability Management assumes the software was removed and automatically stops flagging its vulnerabilities.
45+
46+
For more information, see [Software inventory](tvm-software-inventory.md).
47+
48+
## See also
49+
50+
- [Device inventory](/defender-endpoint/machines-view-overview)
51+
- [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md)
52+
- [Vulnerabilities in my organization](tvm-weaknesses.md)
53+
- [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)

0 commit comments

Comments
 (0)