|
| 1 | +--- |
| 2 | +title: Understand retention logic in Microsoft Defender Vulnerability Management |
| 3 | +description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management. |
| 4 | +author: denisebmsft |
| 5 | +ms.author: deniseb |
| 6 | +manager: deniseb |
| 7 | +ms.reviewer: mobani |
| 8 | +ms.topic: concept-article |
| 9 | +ms.service: defender-vuln-mgmt |
| 10 | +ms.localizationpriority: medium |
| 11 | +ms.collection: |
| 12 | +- tier1 |
| 13 | +- m365-security |
| 14 | +- essentials-overview |
| 15 | +search.appverid: met150 |
| 16 | +audience: ITPro |
| 17 | +ms.date: 04/29/2025 |
| 18 | +--- |
| 19 | + |
| 20 | +# Understand retention logic in Microsoft Defender Vulnerability Management |
| 21 | + |
| 22 | +[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations use different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity. |
| 23 | + |
| 24 | +This article describes how retention works for two common scenarios: inactive devices and uninstalled software. |
| 25 | + |
| 26 | +## Inactive devices |
| 27 | + |
| 28 | +In the Microsoft Defender portal, a device can be listed as inactive for any of the following reasons: |
| 29 | + |
| 30 | +- The device stopped sending sensor data at least seven days ago |
| 31 | +- The device was offboarded from Defender for Endpoint at least seven days ago |
| 32 | +- The device has network connectivity issues, such as impaired communications, blocked URLs, or blocked ports, and sends some (but not all) events |
| 33 | + |
| 34 | +If a device stops reporting to Defender for Endpoint, Defender Vulnerability Management continues to display the latest vulnerability snapshot for 30 days. After that, the device is marked as inactive, and its vulnerabilities are no longer shown in the [Microsoft Defender portal](https://security.microsoft.com). Data for inactive devices is retained for 180 days (see [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)). |
| 35 | + |
| 36 | +To prevent confusion in your vulnerability data, you can exclude a device manually in the device inventory, as shown in the following screenshot: |
| 37 | + |
| 38 | +:::image type="content" source="media/exclude-devices-menu.png" alt-text="Screenshot showing how to exclude devices in the Microsoft Defender portal device inventory."::: |
| 39 | + |
| 40 | +For more information, see [Exclude devices](/defender-endpoint/exclude-devices). |
| 41 | + |
| 42 | +## Uninstalled or inactive software |
| 43 | + |
| 44 | +A device can continue reporting some telemetry but stop sending signals for specific software. If no events are received for the software for 30 consecutive days, Defender Vulnerability Management assumes the software was removed and automatically stops flagging its vulnerabilities. |
| 45 | + |
| 46 | +For more information, see [Software inventory](tvm-software-inventory.md). |
| 47 | + |
| 48 | +## See also |
| 49 | + |
| 50 | +- [Device inventory](/defender-endpoint/machines-view-overview) |
| 51 | +- [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md) |
| 52 | +- [Vulnerabilities in my organization](tvm-weaknesses.md) |
| 53 | +- [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy) |
0 commit comments