Handling Inactive Devices in Microsoft Defender for Endpoint (2024)

Handling Inactive Devices in Microsoft Defender for Endpoint

Microsoft 365

Handling Inactive Devices in Microsoft Defender for Endpoint (1)

Post author:Written By Thijs LecomtePost published:August 3, 202214 Comments

In an earlier blog, I hinted at the need to manage inactive devices in Microsoft Defender for Endpoint. Managing inactive devices is a concept for which little documentation is available, and it can be confusing for an administrator just starting with Microsoft Defender for Endpoint. In this article, I want to deep dive into this scenario and provide insights on how organizations can handle inactive devices within Microsoft Defender for Endpoint.

Before starting, it is important to introduce Microsoft Defender’s device inventory, which contains information about our device estate.

Table of Contents

Navigating the Device Inventory

The device inventory is available in the Microsoft Security portal, Figure 1 is a typical overview.

Handling Inactive Devices in Microsoft Defender for Endpoint (2)

When navigating the device inventory, the ‘sensor health state’ is an important column. It provides insights into the current state of the device. There are a couple of different states:

  • Active: Defender has seen the device in the past 7 days.
  • Inactive: Defender has not seen the device in the past 7 days.
  • Impaired communications: Some URLs/ports are blocked on the network, impeding the access Defender has to the device. The device is sending some, but not all, events.
  • No sensor data: The device has stopped sending data.

Besides knowing the different statuses, it is important to know that Defender for Endpoint can display duplicate devices. This is because each onboarding (adding the device onto Microsoft Defender for Endpoint) generates a unique signature, even on the same computer. In effect, Defender generates a new record for a device every time you reimage a device or offboard and re-onboard it.

The Definition of Inactive and Its Impact

A device enters the inactive state when it has not been online/reported to Microsoft Defender for 7 days. This could be due to a few reasons:

  • It is turned off.
  • It was wiped and reimaged.
  • An attacker was able to sever the connection between the device and Defender for Endpoint

When a device is inactive, it remains in the device inventory list based on the data retention configuration for Endpoint. The retention period can range between 30 and 180 days (Figure 2).

Handling Inactive Devices in Microsoft Defender for Endpoint (3)

It is important to note that there is no way to force the removal of devices from Microsoft Defender for Endpoint. Inactive devices remain in the inventory until the configured retention period lapses. As an IT admin, this might sound strange. After all, administrators can remove devices from Azure AD and Intune, but why not from Microsoft Defender? The reason is simple: if an administrator can permanently remove devices, an attacker can too. If an attacker gets a foothold into the environment, they could remove all devices to cover their tracks. No one would be able to verify what the attacker did, as the logs of a device disappear when the device is removed.

Although the logic makes sense, it can be tricky to manage inactive devices, especially if you reimage devices regularly and issue new laptops regularly. This kind of process will increase the number of duplicates significantly.

Offboarding

Offboarding devices is a potential solution. This sounds interesting at first, but it won’t work in our case.

Two different ways exist to offboard devices:

  • Locally, by running an offboarding script on a device (supported for macOS, Linux, and Windows (Server)).
  • Through the offboarding API (supported for Windows 10 and Windows Server 2019).

It is important to understand that offboarding a device does not remove a device from the inventory. Instead, the device switches to an ‘inactive’ state 7 days after offboarding. This means that offboarding is not an efficient way to manage reimaged/repurposed devices.

The main goal of offboarding is to sever the connection between Microsoft Defender and the device. This is useful in several scenarios, including:

  • A device encounters compatibility issues because the scanning process impacts performance and the standard operation of the server or legitimate processes are being blocked
  • You are moving away from Microsoft Defender to a different EDR solution.
  • The device is no longer in scope.

The last scenario is something I regularly encounter with customers: by accident, the customer onboarded personal devices into Microsoft Defender for Endpoint due to a misconfiguration. By using the offboarding API, I could block the device from sending data to Microsoft 365 Defender by moving it out of scope for the company. So offboarding devices do have a use case, but it is not a solution for managing inactive devices.

The Impact of Inactive Devices

Now that we know how a device can enter the inactive state, let’s look at what the impact of this behavior is. There are two main issues that you might run into:

  • You should follow up on which devices turn up ‘inactive’ as an attacker might breach these after they disable connectivity to Microsoft 365 Defender. If all reimaged/old devices remain in the same list, following up on which devices have an expected state and which don’t, can be a labor-intensive task.
  • Microsoft Defender Vulnerability Management considers inactive devices as ‘unpatched’ because the devices haven’t received a certain security patch. This is expected, as a device that is turned off cannot receive an update. But having a lot of inactive devices will influence your vulnerability reporting. A device only disappears from reports and Vulnerability Management after 30 days of inactivity.

A Potential Solution

While no ideal solution exists for managing inactive devices within Microsoft Defender for Endpoint, I recommend using a combination of tags and device groups. Do this by adding the tag ‘Offboarded’ to inactive devices and creating a device group based on the tag value.

Throughout the portal and different reports, you can filter the data based on the group a device is in. By excluding devices tagged as inactive, these devices won’t skew your reports or interfere with other maintenance work.

The first step is to add the tag. This can be done manually (as seen in Figure 3) on the device page or through the API. The most interesting case is where you can automate this process through an API. Some organizations have achieved this by connecting their asset lifecycle workflow with Defender to automatically execute the API call when the state of the device changes.

Handling Inactive Devices in Microsoft Defender for Endpoint (4)

After you tag the inactive devices, you can create a new device group by navigating to Settings > Endpoints > Device Groups. Here, create a device group using the tag to filter devices (Figure 4).

Handling Inactive Devices in Microsoft Defender for Endpoint (5)

Bringing the Solution Together

Handling and managing inactive devices might not be high on your priority list, but it is something you should consider. When you reimagine many computers, your reports can become skewed if you don’t take any action. By ensuring you tag old devices, you can identify them later and differentiate between devices that are retired/reimaged by support staff or machines that should be up and running but are experiencing a connection issue.

Cybersecurity Risk Management for Active Directory

Discover how to prevent and recover from AD attacks through these Cybersecurity Risk Management Solutions.

Learn More

Tags: Microsoft 365, Microsoft Defender for Endpoint

About the Author

Thijs Lecomte

    About the Author

    Thijs is a passionate Modern Workplace Consultant. Born and raised in Belgium, he currently works at The Collective Consulting as a Senior Microsoft 365 Consultant where he focuses on Client Management, Security and Automation. In January 2021, Thijs was recognized with the MVP Award in the ‘Enterprise Mobility’ category.During his free time Thijs is active on the Microsoft Tech Community to spread knowledge and help other people, sharing insights and tips on topics ranging from Microsoft Endpoint Manager to Azure Sentinel and Logic Apps.

    Comments

    1. Handling Inactive Devices in Microsoft Defender for Endpoint (7)

      Malith 17 Feb 2023Reply

      Hi Thijs,

      How is the licensing works for inactive devices. Does MS count licences for inactive devices.?

      Thank you
      Malith

    2. Handling Inactive Devices in Microsoft Defender for Endpoint (8)

      MS user 16 Dec 2022Reply

      If Device sesnsor state is inactive in security portal for some reason, but device is online. will defender protect the device and issue is only with the sensor.

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (9)

        Thijs Lecomte 17 Dec 2022Reply

        The issue is with the communication to the portal. The AV will still protect the machine. If there are network connections, no EDR logs will be uploaded to the cloud and thus you will loose protection.
        Having an active internet connection is of paramount importance.

    3. Handling Inactive Devices in Microsoft Defender for Endpoint (10)

      G G 9 Dec 2022Reply

      Hi,

      Thank you to share you knowledge ! I’m stll perplex with the concept where we cannot remove a computer from the inventory. Why ? Because we also use MDE365 to discover vulnerabilities… And when a computer is reported vulnerable and you want to fix this vulnerability in your environment but it’s impossible to reach a success because some computers still reported vulnerables and it’s not true because they simply no more exist.

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (11)

        Thijs Lecomte 11 Dec 2022Reply

        Hi

        The reason for not allowing removals is to ensure a malicious actor cannot delete devices and make your secops teams blind
        If you want to remove devices from MDVM, exclude them from the device page

    4. Handling Inactive Devices in Microsoft Defender for Endpoint (12)

      Richard 8 Dec 2022Reply

      I’d like to change the retention period, but when I click on the link to take me to https://security.microsoft.com/preferences2/general I am denied. Fair enough, I don’t have privileges. However, I am unable to find this area if I manually navigate in Defender. Any direction, please?

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (13)

        Thijs Lecomte 11 Dec 2022Reply

        It’s in settings => endpoints => retention. Can you find that navigation?

    5. Handling Inactive Devices in Microsoft Defender for Endpoint (14)

      sheldon 26 Oct 2022Reply

      Thanks, This post is really helpful to me

    6. Handling Inactive Devices in Microsoft Defender for Endpoint (15)

      Dean 31 Aug 2022Reply

      Thanks for the post. very helpful. From what I have been seeing within my environment, after a computer was reimaged, the old one still had “onboarded” status while showing “inactive”. I would like to remove/delete/ these old computer accounts. any suggestion?

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (16)

        Thijs Lecomte 1 Sep 2022Reply

        Hi Dean, that’s indeed the issue.
        When you reimage a computer, it will stay ‘onboarded’, but with the status ‘inactive’.
        There is no way to delete/remove them, you can filter them out using the methods I mentioned in this blog.

    7. Handling Inactive Devices in Microsoft Defender for Endpoint (17)

      Paul Bendall 25 Aug 2022Reply

      Nice write-up Thijs; you have affirmed my thinking and research on the case of duplicate devices in DfE.

      To confirm the only reason DfE should generate a new signature (duplicating device names in the portal) is:
      – The device is offboarded and then re-onboarded
      – The device is re-imaged.

      What if the DfE software is uninstalled and re-installed (for example, desktop troubleshooting)? I assume that if the client is merely upgraded, the DfE Device Id should remain the same and is recorded in the registry?

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (18)

        Thijs Lecomte 1 Sep 2022Reply

        Hi Paul

        I had a similar case this week and from my testing, this does not create a new device. But this is only the case when no new image is deployed

    8. Handling Inactive Devices in Microsoft Defender for Endpoint (19)

      Gunter 5 Aug 2022Reply

      Hi there,
      why are you not using the “Exclude” functionallity for device management. Is there a specific reason for that?

      Regards,
      Gunter

      1. Handling Inactive Devices in Microsoft Defender for Endpoint (20)

        Thijs Lecomte 8 Aug 2022Reply

        It’s too limited IMO. Because there is no way to add categories etc. Because an exclude could happen for out of date devices or old devices.
        Device Groups allows for more granularity

    Leave a Reply

    Handling Inactive Devices in Microsoft Defender for Endpoint (2024)

    FAQs

    How do I remove inactive devices from Defender for endpoint? ›

    It is important to note that there is no way to force the removal of devices from Microsoft Defender for Endpoint. Inactive devices remain in the inventory until the configured retention period lapses.

    What is the difference between EDR block mode and passive mode? ›

    EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.

    What is passive mode Microsoft Defender for Endpoint? ›

    Passive mode means Microsoft Defender Antivirus running, but is not the primary antivirus/antimalware product on your device. Passive mode is only available for devices that are onboarded to Microsoft Defender for Endpoint and that meet certain requirements.

    How do I remove a device from my endpoint? ›

    Sign in to the Microsoft Endpoint Manager admin center. Choose Devices > All devices > choose the devices you want to delete > Delete.

    What happens when you delete a device from endpoint manager? ›

    You can remove devices that need not be managed from Endpoint Manager at any time. Once a device is deleted from EM, all configuration profiles and apps installed by EM will also be removed from the device.

    What are two capabilities of Microsoft Defender for Endpoint each correct answer? ›

    Capabilities
    • Eliminate the blind spots in your environment.
    • Discover vulnerabilities and misconfigurations in real time.
    • Quickly go from alert to remediation at scale with automation.
    • Block sophisticated threats and malware.
    • Detect and respond to advanced attacks with deep threat monitoring and analysis.

    What is the difference between Microsoft Defender and Microsoft Defender for Endpoint? ›

    Key Differences to Note

    One key difference between the two is that Office 365 does not include any endpoint security features, whereas Microsoft Defender for Endpoint is specifically designed to help protect your business against endpoint threats.

    How do I override Microsoft Defender? ›

    Turn off Defender antivirus protection in Windows Security
    1. Select Start and type "Windows Security" to search for that app.
    2. Select the Windows Security app from the search results, go to Virus & threat protection, and under Virus & threat protection settings select Manage settings.
    3. Switch Real-time protection to Off.

    Why is EDR not enough? ›

    EDR cannot provide visibility into an endpoint without an EDR agent. Second, EDR requires security staff that is trained in detection and response. This is feasible for most large enterprises, but not for SMBs. Finally, EDR doesn't provide network visibility.

    Do I need antivirus if I have EDR? ›

    You can use EDR solutions to track, monitor, and analyse data on endpoints to enhance the fortification of your environment. Generally, EDR tools do not replace traditional tools like antivirus and firewalls; they work beside them to provide enhanced security capabilities.

    Do I need both EDR and antivirus? ›

    Yes, EDR solutions may include antivirus. In other cases, EDR is sold as a component of an Endpoint Protection Platform (EPP); the EPP solution typically provides antivirus protection and other security measures.

    What does passive mode turned on mean? ›

    Passive Mode disables all active protection, such as Core Shields and Firewall, so you can use more than one antivirus program at a time without interfering with the performance of your PC or the reliability of antivirus detections.

    What is the use of passive mode? ›

    Passive mode allows the client to establish both channels, so the firewall won't block the FTP connection. The problem in this case is that the server may also be behind some firewall. If so, passive mode may not be feasible.

    How do I know if Microsoft Defender for Endpoint is running? ›

    Troubleshoot onboarding issues
    1. Check that there is a Microsoft Defender for Endpoint Service running in the Processes tab in Task Manager. ...
    2. Check Event Viewer > Applications and Services Logs > Operation Manager to see if there are any errors.
    3. In Services, check if the Microsoft Monitoring Agent is running on the server.
    Feb 7, 2023

    What is the difference between retire and delete in endpoint? ›

    The Retire action removes app data, settings, and Intune managed email profiles from the device. The device will still show up in Intune until the device ultimately checks in. If you want to remove stale devices immediately, use the Delete action instead.

    How do you remove connected devices? ›

    Remove computers & devices from your trusted list
    1. On your Android phone or tablet, open your device's Settings app Google. Manage your Google Account.
    2. At the top, tap Security.
    3. Under "Signing in to Google," tap 2-Step Verification. You might need to sign in.
    4. Under "Devices you trust," tap Revoke all.

    How do I completely remove a device from device Manager? ›

    Select the View menu and turn on Show Hidden Devices. Expand the node that represents the type of device that you want to uninstall, right-click the device entry for the device you want to uninstall, and select Uninstall.

    What happens if you remove device from Microsoft account? ›

    removing your account from the device will prevent access to your microsoft services (one drive etc), this is what the reset does. unlinking the device from the account will mean that the device does not affect your microsoft store device limit and keeps your account tidy.

    What happens when device is erased? ›

    Erase device: Permanently deletes all data on your device, but may not delete SD cards. After you erase, Find My Device won't work on the device.

    What does disabling a device in device Manager do? ›

    To disable a device means that the device remains physically connected to the computer, but its driver is unloaded from memory and its resources are freed so that the device cannot be used.

    What is the difference between Microsoft EPP and EDR? ›

    Traditionally, EPP is defined as a first-line defense mechanism, effective at blocking known threats. While EDR is defined as the next layer of security, providing additional tools to detect threats, analyze intrusions, and respond to attacks.

    What is the difference between MDE Plan 1 and 2? ›

    Plan 2 (P2) is available now and it contains advanced features like advanced threat hunting and device discovery. Plan 1 (P1) is currently in preview and it contains the base features like next-generation antimalware and antivirus protection, centralized management, and security reports.

    What is Microsoft Defender for Endpoint Rules? ›

    Defender for Endpoint lets you create suppression rules for specific alerts that are known to be innocuous such as known tools or processes in your organization. Suppression rules can be created from an existing alert. They can be disabled and reenabled if needed.

    What are the disadvantages of Windows Defender? ›

    Cons of Windows Defender
    • Lacks integrated dashboard for all devices using Windows Defender.
    • No accountability if the computer is infected by malware.
    • Limited features for large scale use.
    • Slows down installation of frequently-used applications.
    Sep 22, 2021

    Is Defender for Endpoint an EDR? ›

    Microsoft Defender for Endpoint (previous Microsoft Defender ATP) is the post-breach EDR solution from Microsoft. The product has an agent on the endpoint(s) is connected to the Cloud (always up-to-date). Multiple alerts linked by an entity (e.g. attack technique) are aggregated into an incident.

    What are the benefits of Microsoft Defender for Endpoint? ›

    Microsoft Defender for Endpoint delivers preventative protection, post-breach detection, automated investigation, and response.

    How do I force a Defender update? ›

    To enable and update Microsoft Defender Antivirus on Windows Server, perform the following steps:
    1. Install the latest Servicing Stack Update (SSU).
    2. Install the latest cumulative update (LCU).
    3. Reinstall Microsoft Defender Antivirus or re-enable it. ...
    4. Reboot the system.
    5. Install the latest version of the platform update.
    Dec 15, 2022

    How do I force Windows Defender to activate? ›

    Turn on real-time and cloud-delivered protection
    1. Select the Start menu.
    2. In the search bar, type Windows Security. ...
    3. Select Virus & threat protection.
    4. Under Virus & threat protection settings, select Manage settings.
    5. Flip each switch under Real-time protection and Cloud-delivered protection to turn them on.
    Aug 23, 2021

    Is it a good idea to disable Windows Defender? ›

    It is possible to disable Defender, but you should not do it under ANY circ*mstances, as Defender only blocks Potentially Malicious Activity, so never do this unless you are ABSOLUTELY sure about the source of the program. To do this, open the Start Menu, type in Defender and hit Enter.

    How do I Unenroll a device from MDM? ›

    How do I remove a device from MDM?
    1. Open Settings on the device.
    2. Go to General > Device Management.
    3. Select the MDM profile.
    4. Select 'Remove Management'.
    Dec 7, 2022

    How do I remove an inactive device from my router? ›

    To remove old and inactive devices from your wi-fi router, head into the router software, find device management, and manually kick everything out.

    How do I completely remove a device from Intune? ›

    Remove in device Settings app
    1. Open the Settings app.
    2. Go to Accounts > Access work or school.
    3. Select the connected account that you want to remove > Disconnect.
    4. To confirm device removal, select Yes.
    Aug 4, 2022

    How do I offboard a device from defender for endpoint? ›

    Windows Server
    1. In the navigation pane, choose Settings > Endpoints, and then under Device management, choose Offboarding.
    2. Select an operating system, such as Windows Server 1803, 2019, and 2022, and then in the Deployment method section, choose Local script.
    3. Select Download package.
    Jan 27, 2023

    Does factory reset remove Device Management? ›

    Full wipe: A full wipe will return a device to factory settings. All information will be removed. This includes MDM control, leaving the device completely unmanaged.

    What happens if you remove a device from the system without Unenrolling it from its domain? ›

    If you have removed a device from the network without first unenrolling it, you need to clear its domain credentials before it can be deployed elsewhere. This can be done using Dante Controller. The device must first be isolated from the Dante network, either physically or by using a VLAN.

    How do I bypass MDM restrictions? ›

    Connect your iOS device to your PC with a USB cable. Wait for the software to automatically recognize your device. Go to the Toolbox section to select the Skip MDM Lock option to bypass your iPhone MDM lock. Then press on Skip Now.

    What does inactive device mean? ›

    –>The device is switched off for a long period of time. When the device is switched off, it can no longer communicate with the server and hence the device status becomes inactive.

    How do I disconnect an old device from my account? ›

    Step 3: On the Your device section, tap the Manage devices option. A list of devices connected to your Google account will be displayed on the new page. Step 4: Tap the three-dotted menu icon at the top-right corner of the device you want to remove from your account. Step 5: Select Sign out from the options.

    How do I remove unwanted networks? ›

    1. Click the Start button. in the bottom left corner of the screen.
    2. Type "network and" and select Network and Sharing Center from the search result.
    3. Select Manage wireless networks.
    4. Select the Wi-Fi profile you want to delete then select the Remove button. Note. ...
    5. Select Yes to confirm.

    What is the difference between retire and wipe in Endpoint Manager? ›

    Basically, The Wipe action restores a device to its factory default settings, while the Retire action removes managed app data (where applicable), settings, and email profiles that were assigned by using Intune. If you perform Wipe or Retire action successfully, the device item can be deleted from Intune automatically.

    How do I remove a managed device? ›

    How to optimize Battery usage and Data usage in Android?
    ...
    Steps:
    1. Open "Settings" App.
    2. Scroll down and then tap on "General" section from the left menu.
    3. Scroll down all the way and then tap on "Device Management"
    4. Then tap on "MDM Profile"
    5. Then tap on "Remove Management"
    6. If it ask for a passcode, Please enter your passcode.
    Jan 27, 2023

    What is the difference between Microsoft Defender and Microsoft Defender for endpoint? ›

    Key Differences to Note

    One key difference between the two is that Office 365 does not include any endpoint security features, whereas Microsoft Defender for Endpoint is specifically designed to help protect your business against endpoint threats.

    How do I temporarily disable endpoint security? ›

    Disabling Symantec Endpoint Protection
    1. Navigate to the Start menu.
    2. In the search box type in Run or Win R.
    3. In the Run menu, type in "Smc -stop" and click Ok.
    4. Symantec Endpoint Protection should now be disabled.
    Jan 28, 2018

    Top Articles
    Latest Posts
    Article information

    Author: Laurine Ryan

    Last Updated:

    Views: 5627

    Rating: 4.7 / 5 (77 voted)

    Reviews: 84% of readers found this page helpful

    Author information

    Name: Laurine Ryan

    Birthday: 1994-12-23

    Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

    Phone: +2366831109631

    Job: Sales Producer

    Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

    Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.