You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-server-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -339,7 +339,7 @@ For other Windows server versions, you have two options to offboard Windows serv
339
339
- Remove the Defender for Endpoint workspace configuration
340
340
341
341
> [!NOTE]
342
-
> These offboarding instructions for other Windows server versions also apply if you're running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
342
+
> These offboarding instructions for other Windows Server versions also apply if you're running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
Copy file name to clipboardExpand all lines: defender-endpoint/offboard-machines.md
+27-9Lines changed: 27 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: conceptual
14
14
ms.subservice: onboard
15
15
search.appverid: met150
16
-
ms.date: 03/01/2025
16
+
ms.date: 03/14/2025
17
17
---
18
18
19
19
# Offboard devices
@@ -40,26 +40,44 @@ ms.date: 03/01/2025
40
40
- Windows Server 2016
41
41
- Windows Server 2012 R2
42
42
43
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
44
-
45
43
When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to [inactive](/defender-endpoint/fix-unhealthy-sensors#inactive-devices). Devices that weren't active within the past 30 days are not factored into your organization's [exposure score](/defender-vulnerability-management/tvm-exposure-score).
46
44
47
45
Past data, such as alerts, vulnerablities, and the device timeline, for an offboarded device is displayed in the Microsoft Defender portal until the [configured retention period](/defender-endpoint/data-storage-privacy#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) expires. You also see the device profile (without data) in the device inventory for up to 180 days. To view data for active devices only, you can use filters, such as [sensor health state](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views), [device tags](/defender-endpoint/machine-tags), or [device groups](/defender-endpoint/machine-groups).
48
46
49
-
50
-
## Offboard Windows devices
47
+
## Offboard Windows client devices
51
48
52
49
-[Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
53
50
-[Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
54
51
-[Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)
55
52
56
-
## Offboard Servers
53
+
## Offboard servers
54
+
55
+
In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Settings** > **Offboard** and then select an operating system to start the offboarding process.
56
+
57
+
You can also use other methods, such as:
58
+
59
+
-[Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
60
+
-[Offboard devices using Configuration Manager](configure-endpoints-sccm.md#offboard-devices-using-configuration-manager)
61
+
-[Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)
62
+
-[Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
63
+
64
+
## Offboard Mac devices
65
+
66
+
In the following procedure, steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.
67
+
68
+
1. Create a [device tag](/defender-endpoint/machine-tags), and name the tag `decommissioned`. Assign the tag to the Mac devices that you want to offboard from Defender for Endpoint.
69
+
70
+
2. Create a [Device group](/defender-endpoint/machine-groups) and name it something like, `Decommissioned Mac`. Assign this tag to an appropriate user group.
71
+
72
+
3. Remove policies for [Tamper Protection](/defender-endpoint/tamperprotection-macos). See [Set preferences on Mac: Tamper protection](/defender-endpoint/mac-preferences#tamper-protection) or use manual configuration.
73
+
74
+
4. In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Settings** > **Offboard** > **Select Operating System to start the offboarding Process**.
0 commit comments