No, because the data collected is necessary to identify indicators of attack (IOAs) in your organization, such as file names, sizes, and hashes, process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as machine identifiers, names, and the operating system version) To learn more: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/data-stor...