You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/transient-device-tagging.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Transient device tagging uses an internal algorithm to tag transient devices in
34
34
> Transient tagging doesn't delete any devices from the network. It tags them, and then it filters them out of the device inventory by default.
35
35
36
36
> [!IMPORTANT]
37
-
> Transient device tagging is automatically enforced by Microsoft Defender for Endpoint using an internal algorithm. Administrators cannot configure or disable the tagging itself but can adjust whether transient devices are visible in the inventory by changing the filter settings.
37
+
> Defender for Endpoint automatically enforces transient device tagging using an internal algorithm. While administrators can't configure or disable tagging, they can define whether transient devices are visible in the inventory by changing the filter settings.
0 commit comments