Limit and/or obfuscate data sent to Microsoft Defender ATP cloud service

%3CLINGO-SUB%20id%3D%22lingo-sub-1232249%22%20slang%3D%22en-US%22%3ELimit%20and%2For%20obfuscate%20data%20sent%20to%20Microsoft%20Defender%20ATP%20cloud%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1232249%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20Community%2C%3C%2FP%3E%3CP%3Eis%20there%20a%20way%20to%20limit%20and%2For%20obfuscate%20data%20sent%20from%20Windows%2010%20workstations%20and%20Windows%20Server%202016%20to%20the%20Microsoft%20Defender%20ATP%20cloud%20service%3F%3C%2FP%3E%3CP%3EThank%20you%20in%20advance%20for%20your%20help%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1398344%22%20slang%3D%22en-US%22%3ERe%3A%20Limit%20and%2For%20obfuscate%20data%20sent%20to%20Microsoft%20Defender%20ATP%20cloud%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1398344%22%20slang%3D%22en-US%22%3ENo%2C%20because%20the%20data%20collected%20is%20necessary%20to%20identify%20indicators%20of%20attack%20(IOAs)%20in%20your%20organization%2C%20such%20as%20file%20names%2C%20sizes%2C%20and%20hashes%2C%20process%20data%20(running%20processes%2C%20hashes)%2C%20registry%20data%2C%20network%20connection%20data%20(host%20IPs%20and%20ports)%2C%20and%20machine%20details%20(such%20as%20machine%20identifiers%2C%20names%2C%20and%20the%20operating%20system%20version)%3CBR%20%2F%3ETo%20learn%20more%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fdata-storage-privacy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fdata-storage-privacy%3C%2FA%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Hello Community,

is there a way to limit and/or obfuscate data sent from Windows 10 workstations and Windows Server 2016 to the Microsoft Defender ATP cloud service?

Thank you in advance for your help

1 Reply
No, because the data collected is necessary to identify indicators of attack (IOAs) in your organization, such as file names, sizes, and hashes, process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as machine identifiers, names, and the operating system version)
To learn more: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/data-stor...