Offboard devices

Applies to:

  • Microsoft Defender for Endpoint Plan 1 and 2
  • Microsoft Defender for Endpoint for servers Plan 1 or Plan 2
  • Microsoft Defender for Servers Plan 1 or Plan 2
  • Microsoft Defender for Business
  • Microsoft Defender Vulnerability Management
  • Microsoft Defender XDR

Platforms

  • Windows client devices
  • Windows Server 2025
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • Windows Server 2012 R2
  • Mac devices
  • Linux servers

When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to inactive. Devices that weren't active within the past 30 days are not factored into your organization's exposure score.

Past data, such as alerts, vulnerabilities, and the device timeline, for an offboarded device is displayed in the Microsoft Defender portal until the configured retention period expires. You also see the device profile (without data) in the device inventory for up to 180 days. To view data for active devices only, you can use filters, such as sensor health state, device tags, or device groups.

Offboard Windows client devices

In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.

You can also use other methods, such as:

Offboard servers

In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.

You can also use other methods, such as:

Offboard Mac devices

In the following procedure, steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.

  1. Create a device tag, and name the tag decommissioned. Assign the tag to the Mac devices that you want to offboard from Defender for Endpoint.

  2. Create a Device group and name it something like, Decommissioned Mac. Assign this tag to an appropriate user group.

  3. Remove policies for Tamper Protection. See Set preferences on Mac: Tamper protection or use manual configuration.

  4. In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.

    Or, if you're using a non-Microsoft device management solution, disable integration with Defender for Endpoint.

  5. Uninstall the Defender for Endpoint app on Mac devices.

  6. Remove Mac devices from the group for system extension policies if an MDM was used to set them.

Offboard Android or iOS devices

To offboard an Android or iOS device, uninstall the Microsoft Defender app on the device.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.