Skip to content

Commit a1e676a

Browse files
committed
Update retention-logic-inactive-devices-uninstalled-software.md
1 parent a1f0292 commit a1e676a

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

defender-vulnerability-management/retention-logic-inactive-devices-uninstalled-software.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,11 @@ ms.date: 04/28/2025
2626
In Defender Vulnerability Management, a device can be listed as inactive for any of the following reasons:
2727

2828
- The device has stopped sending sensor data for seven days or more
29-
- The device is offboarded from Defender for Endpoint at least seven days ago
29+
- The device was offboarded from Defender for Endpoint at least seven days ago
3030
- The device has network connectivity issues, such as impaired communications, blocked URLs, or blocked ports, and sends some (but not all) events
3131

3232
If a device stops reporting telemetry, Defender Vulnerability Management continues to display the latest vulnerability snapshot for 30 days. After that, the device is marked as inactive and vulnerabilities are no longer shown in the [Microsoft Defender portal](https://security.microsoft.com).
3333

34-
> [!NOTE]
35-
> In the Microsoft Defender portal, in the device inventory, a device is considered inactive after six months of no reporting.
36-
3734
To prevent misleading vulnerability data, you can exclude a device manually in the device inventory.
3835

3936
:::image type="content" source="../defender-endpoint/media/exclude-devices-menu.png" alt-text="Screenshot showing how to exclude devices in the Microsoft Defender portal device inventory.":::

0 commit comments

Comments
 (0)