You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/transient-device-tagging.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,9 @@ Transient device tagging uses an internal algorithm to tag transient devices in
33
33
> [!IMPORTANT]
34
34
> Transient tagging doesn't delete any devices from the network. It tags them, and then it filters them out of the device inventory by default.
35
35
36
+
> [!IMPORTANT]
37
+
> Transient device tagging is automatically enforced by Microsoft Defender for Endpoint using an internal algorithm. Administrators cannot configure or disable the tagging itself but can adjust whether transient devices are visible in the inventory by changing the filter settings.
38
+
36
39
## How do I work with transient tagging?
37
40
38
41
Transient devices are filtered out of the inventory by default. You can turn off the filter as needed. Note that turning off the filter doesn't affect tagging. The tag remains on inventory assets identified as transient.
0 commit comments