You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/retention-logic-mdvm.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Understand retention logic for inactive devices and uninstalled software in Microsoft Defender Vulnerability Management
2
+
title: Understand retention logic in Microsoft Defender Vulnerability Management
3
3
description: Get an overview of retention logic for inactive devices or uninstalled software in MDVM.
4
4
author: denisebmsft
5
5
ms.author: deniseb
@@ -17,7 +17,7 @@ audience: ITPro
17
17
ms.date: 04/28/2025
18
18
---
19
19
20
-
# Understand retention logic for inactive devices and uninstalled software in Microsoft Defender Vulnerability Management
20
+
# Understand retention logic in Microsoft Defender Vulnerability Management
21
21
22
22
[Defender Vulnerability Management](defender-vulnerability-management.md) continuously prioritizes vulnerabilities across devices and provides security recommendations to mitigate risk in the Microsoft Defender portal. Defender Vulnerability Management recommendations uses different retention periods to determine when to stop flagging vulnerabilities based on event reporting activity. This article describes how retention works for two common scenarios: inactive devices and uninstalled software.
0 commit comments