Inactive devices - Unified Endpoint Management Community (2024)

Hi Guys. A device is inactive means what does that normally refer to?

Subscribe

14 November 2019

All Replies

  • Inactive devices - Unified Endpoint Management Community (4)

    grace-baker

    Hexnode

    15 November 2019

    grace-baker

    Moderator

    Hey, Thanks for reaching out tous. Happyto help.

    Inactive devices are the ones that are not scanned into theHexnodeMDMapplication for a particular number of days.The number of days here is a configurable option under Admin–>General Settings.
    The device status is Inactive whenHexnodeapp is running on the device and the device is not communicating with theHexnodeserver.
    The device might be inactive because if the device is in any of the following scenarios.
    –>The device is switched off for a long period oftime.Whenthe device is switchedoff,it can no longer communicate with the server and hence the device status becomes inactive.
    –> The device is in Idle mode for a longer period. In the idle mode, the device no longer communicates with the server and hence it enters the Inactive mode.
    –> The user is running the device in Safe Mode. In safe mode, all thethird-partyapps are disabled and henceHexnodeapp will not function and the device will enter the Inactive mode.
    –>Hexnodeapp is uninstalled from the device
    –> There is no internet connectivity. In this case, the device can no longer communicate with the server and hence status changes to inactive.
    Please refer to the help link for further reference on the same.

    Cheers!

    Grace Baker

    Hexnode MDM

    15 November 2019

  • You must be logged in to reply to this topic.

Login for more

//php bbp_get_template_part( 'form', 'user-login' ); ?>

Not what you're looking for?

Try asking the Help CommunityInactive devices - Unified Endpoint Management Community (5)

Inactive devices - Unified Endpoint Management Community (2024)

FAQs

How do I remove inactive devices from defender? ›

Removing devices from your Microsoft Defender dashboard
  1. Go to the Other devices list either by selecting View all from the dashboard, or the Other devices tab on the Device protection page.
  2. On the list, hover over the device you want to remove.
  3. Select the red trash can from the right side of the device item.

What is the difference between defender for endpoint active and inactive? ›

Active: Defender has seen the device in the past 7 days. Inactive: Defender has not seen the device in the past 7 days. Impaired communications: Some URLs/ports are blocked on the network, impeding the access Defender has to the device. The device is sending some, but not all, events.

What is the UEM strategy? ›

Unified Endpoint Management strategies standardize security for the entire corporate fleet while UEM software is used for centralized endpoint management. That is, the ability to manage, secure, and deploy corporate resources and applications on any device from a single console.

What is an endpoint management solution? ›

Endpoint management is the policy-based control of networked PCs and other devices to maintain functionality and safeguard the devices, data, and other assets from cyber threats. PCs based on the Intel vPro® platform have hardware-enabled features that can strengthen manageability and security software solutions.

What does inactive device mean? ›

Inactive Device a Device that is powered-up, connected to the internet, registered and managed by a Portal via the internet but not functional, while sending its status information in regular intervals to the Portal.

How do I remove inactive devices from SCCM? ›

Two Site Maintenance tasks control stale record deletion in SCCM. Within the Configuration Manager console, these can be accessed under Administration/Site Configuration/Sites – Site Maintenance. Within Site Maintenance, you will see two tasks named: Delete Aged Discovery Data and Delete Inactive Client Discovery Data.

How do I know if my Defender for Endpoint is active? ›

Using the Windows Defender Security Center

In the Run window, type “MSDefenderSecurityCenter.exe” and press “Enter.” In the Windows Defender Security Center window, select the “Endpoint Protection” tab. If the Microsoft Defender for Endpoint is running, the “Protection Enabled” status will be displayed.

How do I check if Defender for Endpoint is in passive mode? ›

Type Get-MpComputerStatus . In the list of results, look at the AMRunningMode row. Normal means Microsoft Defender Antivirus is running in active mode. Passive mode means Microsoft Defender Antivirus running, but is not the primary antivirus/antimalware product on your device.

What is the difference between Microsoft Defender and Microsoft Defender for Endpoint? ›

While Microsoft Defender Antivirus is a built-in software program designed to protect a single device, Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, is an enterprise endpoint security platform designed to protect enterprise networks; it prevents, detects, investigates ...

How do I remove inactive devices from Office 365? ›

If you don't use a device but it still appears in your devices list, here's how to remove it:
  1. Go to account.microsoft.com/devices, sign in, and find the device you want to remove.
  2. Select Show details to see info for that device.
  3. Under your device's name, select More actions > Remove.

What happens when you isolate device in Microsoft Defender? ›

When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated.

How do I delete Windows Defender detection history? ›

Then, to remove a Protection history, go to the below directory: C:\ProgramData\Microsoft\Windows Defender\Scans\History\Service > Delete all the files inside it and restart your computer. You can find more steps to disinfect your computer: https://answers.microsoft.com/en-us/windows/for...

How do I isolate a device in defender? ›

Using Microsoft Defender for Business, which is built into Microsoft 365 Business Premium, launch https://security.microsoft.com, navigate down to Assets and click on devices. Check the box to select the machine that you want to isolate. At the top of the page, select the ellipse and choose Contain device.

Top Articles
Latest Posts
Article information

Author: Golda Nolan II

Last Updated:

Views: 6092

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.