Forum Discussion
James_Gillies
Apr 27, 2021Brass Contributor
MUST be able to delete duplicate/orphaned devices from M365 Security Center
Good morning, I am about 2-3 weeks into evaluating Microsoft Defender for Endpoint, and so far have about 4 Windows 10 devices onboarded and managed through InTune policies. One of the test m...
- Jun 21, 2021AFAIK, TVM data only includes data from computers that have been active in the last 30 days.
Microsoft doesn't provide the ability to remove devices because it's extremely dangerous. If an attacker would get permissions on your cloud instances, he could remove all his tracks. The devices are retained for forensic purposes.
Best options it to tag an offboarded machine and create an 'Inactive' machine group for it
GI472
Aug 24, 2021Brass Contributor
In Device Inventory, all of the data associated with a machine is shown, except for DeviceID, which only shows on a .csv export. Very annoying.
We have a number of inactive devices, all with different DeviceIDs but the same DeviceName. This way I can tell that the devices are different. I can also go off of the Last Seen dates, as the latest date is obviously the current Active device. I find this issue arises after a device has been reimaged and reissued to another user.
I tried tagging an inactive device, but unless I'm missing something, tags and DeviceID don't show in the Security Recommendations Window or the .csv download of Exposed Devices either. So there's no way of knowing whether the alerts are for a duplicate device, or the current Active device.
I started off trying to fix issues with over 20 devices not being able to contact Defender. I then realised there were duplicates of reimaged devices. I then realised that one of those was a genuine issue with connection. Something I very nearly missed.
This isn't a feature, it's a glitch. It needs fixing.
We have a number of inactive devices, all with different DeviceIDs but the same DeviceName. This way I can tell that the devices are different. I can also go off of the Last Seen dates, as the latest date is obviously the current Active device. I find this issue arises after a device has been reimaged and reissued to another user.
I tried tagging an inactive device, but unless I'm missing something, tags and DeviceID don't show in the Security Recommendations Window or the .csv download of Exposed Devices either. So there's no way of knowing whether the alerts are for a duplicate device, or the current Active device.
I started off trying to fix issues with over 20 devices not being able to contact Defender. I then realised there were duplicates of reimaged devices. I then realised that one of those was a genuine issue with connection. Something I very nearly missed.
This isn't a feature, it's a glitch. It needs fixing.
Thijs Lecomte
Aug 26, 2021Bronze Contributor
I am not sure I understand the issue?
You can tag the device and create a machine group based on that tag. Within device inventory, you can then filter out the inactive machine group.
If old entries of devices that are reimaged would be removed, the old data of the device would be lost. That's a huge security risk?
You can tag the device and create a machine group based on that tag. Within device inventory, you can then filter out the inactive machine group.
If old entries of devices that are reimaged would be removed, the old data of the device would be lost. That's a huge security risk?