Skip to content

Commit 29b8980

Browse files
committed
offboard
1 parent a95a5d9 commit 29b8980

File tree

2 files changed

+28
-10
lines changed

2 files changed

+28
-10
lines changed

defender-endpoint/configure-server-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ For other Windows server versions, you have two options to offboard Windows serv
339339
- Remove the Defender for Endpoint workspace configuration
340340

341341
> [!NOTE]
342-
> These offboarding instructions for other Windows server versions also apply if you're running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
342+
> These offboarding instructions for other Windows Server versions also apply if you're running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
343343
344344
## Related articles
345345

defender-endpoint/offboard-machines.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 03/01/2025
16+
ms.date: 03/14/2025
1717
---
1818

1919
# Offboard devices
@@ -40,26 +40,44 @@ ms.date: 03/01/2025
4040
- Windows Server 2016
4141
- Windows Server 2012 R2
4242

43-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
44-
4543
When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to [inactive](/defender-endpoint/fix-unhealthy-sensors#inactive-devices). Devices that weren't active within the past 30 days are not factored into your organization's [exposure score](/defender-vulnerability-management/tvm-exposure-score).
4644

4745
Past data, such as alerts, vulnerablities, and the device timeline, for an offboarded device is displayed in the Microsoft Defender portal until the [configured retention period](/defender-endpoint/data-storage-privacy#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) expires. You also see the device profile (without data) in the device inventory for up to 180 days. To view data for active devices only, you can use filters, such as [sensor health state](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views), [device tags](/defender-endpoint/machine-tags), or [device groups](/defender-endpoint/machine-groups).
4846

49-
50-
## Offboard Windows devices
47+
## Offboard Windows client devices
5148

5249
- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
5350
- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
5451
- [Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)
5552

56-
## Offboard Servers
53+
## Offboard servers
54+
55+
In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Settings** > **Offboard** and then select an operating system to start the offboarding process.
56+
57+
You can also use other methods, such as:
58+
59+
- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
60+
- [Offboard devices using Configuration Manager](configure-endpoints-sccm.md#offboard-devices-using-configuration-manager)
61+
- [Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-devices-using-mobile-device-management-tools)
62+
- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
63+
64+
## Offboard Mac devices
65+
66+
In the following procedure, steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.
67+
68+
1. Create a [device tag](/defender-endpoint/machine-tags), and name the tag `decommissioned`. Assign the tag to the Mac devices that you want to offboard from Defender for Endpoint.
69+
70+
2. Create a [Device group](/defender-endpoint/machine-groups) and name it something like, `Decommissioned Mac`. Assign this tag to an appropriate user group.
71+
72+
3. Remove policies for [Tamper Protection](/defender-endpoint/tamperprotection-macos). See [Set preferences on Mac: Tamper protection](/defender-endpoint/mac-preferences#tamper-protection) or use manual configuration.
73+
74+
4. In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, select **Settings** > **Offboard** > **Select Operating System to start the offboarding Process**.
5775

58-
- [Offboard servers](configure-server-endpoints.md#offboard-windows-servers)
76+
Or, if you're using a non-Microsoft device management solution, disable integration with Defender for Endpoint.
5977

60-
## Offboard non-Windows devices
78+
5. Uninstall the Defender for Endpoint app on Mac devices.
6179

62-
- [Offboard non-Windows devices](configure-endpoints-non-windows.md#offboard-non-windows-devices)
80+
6. Remove Mac devices from the group for system extension policies if an MDM was used to set them.
6381

6482
## Offboard Android or iOS devices
6583

0 commit comments

Comments
 (0)