Forum Discussion

saulov8's avatar
Jul 01, 2024

Automatically exclude devices from vulnerability management

Hello,

 

I've recently been working on improving the Defender security score and noticed that onboarded devices that haven't checked in recently are affecting Recommended Actions related to the Defender sensor that significantly impact the score (sensor data collection, impaired communications, turn on sensor).

 

According to Microsoft, devices that haven't sent any signals to Defender for Endpoint for more than seven days can be considered inactive.

Fix unhealthy sensors in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn

 

To achieve a more accurate vulnerability management exposure score, the solution is to exclude these inactive devices from vulnerability management.

Exclude devices in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn

 

However, going through these recommendations and manually excluding the exposed devices from vulnerability management isn't feasible, especially with a large number of endpoints/clients to manage.

 

Has anyone encountered a similar scenario?

No RepliesBe the first to reply

Resources