Skip to content

Commit 6a60bba

Browse files
authored
Merge pull request #3606 from MicrosoftDocs/mdvm-motibani
MDVM logic for inactive devices and uninstalled software - Moti Bani
2 parents 6e16934 + f6ed3ca commit 6a60bba

File tree

3 files changed

+55
-0
lines changed

3 files changed

+55
-0
lines changed

defender-vulnerability-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@
4242
href: tvm-hardware-and-firmware.md
4343
- name: Authenticated scan for Windows
4444
href: windows-authenticated-scan.md
45+
- name: Understand retention logic
46+
href: retention-logic-mdvm.md
4547
- name: Detect and assess threats
4648
items:
4749
- name: Dashboard insights
112 KB
Loading
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Understand retention logic in Microsoft Defender Vulnerability Management
3+
description: Get an overview of retention logic for inactive devices or uninstalled software in Microsoft Defender Vulnerability Management.
4+
author: denisebmsft
5+
ms.author: deniseb
6+
manager: deniseb
7+
ms.reviewer: mobani
8+
ms.topic: concept-article
9+
ms.service: defender-vuln-mgmt
10+
ms.localizationpriority: medium
11+
ms.collection:
12+
- tier1
13+
- m365-security
14+
- essentials-overview
15+
search.appverid: met150
16+
audience: ITPro
17+
ms.date: 04/29/2025
18+
---
19+
20+
# Understand retention logic in Microsoft Defender Vulnerability Management
21+
22+
[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations use different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity.
23+
24+
This article describes how retention works for two common scenarios: inactive devices and uninstalled software.
25+
26+
## Inactive devices
27+
28+
In the Microsoft Defender portal, a device can be listed as inactive for any of the following reasons:
29+
30+
- The device stopped sending sensor data at least seven days ago
31+
- The device was offboarded from Defender for Endpoint at least seven days ago
32+
- The device has network connectivity issues, such as impaired communications, blocked URLs, or blocked ports, and sends some (but not all) events
33+
34+
If a device stops reporting to Defender for Endpoint, Defender Vulnerability Management continues to display the latest vulnerability snapshot for 30 days. After that, the device is marked as inactive, and its vulnerabilities are no longer shown in the [Microsoft Defender portal](https://security.microsoft.com). Data for inactive devices is retained for 180 days (see [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)).
35+
36+
To prevent confusion in your vulnerability data, you can exclude a device manually in the device inventory, as shown in the following screenshot:
37+
38+
:::image type="content" source="media/exclude-devices-menu.png" alt-text="Screenshot showing how to exclude devices in the Microsoft Defender portal device inventory.":::
39+
40+
For more information, see [Exclude devices](/defender-endpoint/exclude-devices).
41+
42+
## Uninstalled or inactive software
43+
44+
A device can continue reporting some telemetry but stop sending signals for specific software. If no events are received for the software for 30 consecutive days, Defender Vulnerability Management assumes the software was removed and automatically stops flagging its vulnerabilities.
45+
46+
For more information, see [Software inventory](tvm-software-inventory.md).
47+
48+
## See also
49+
50+
- [Device inventory](/defender-endpoint/machines-view-overview)
51+
- [Microsoft Defender Vulnerability Management dashboard](tvm-dashboard-insights.md)
52+
- [Vulnerabilities in my organization](tvm-weaknesses.md)
53+
- [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)

0 commit comments

Comments
 (0)