Offboard devices
Applies to:
- Microsoft Defender for Endpoint Plan 1 and 2
- Microsoft Defender for Endpoint for servers Plan 1 or Plan 2
- Microsoft Defender for Servers Plan 1 or Plan 2
- Microsoft Defender for Business
- Microsoft Defender Vulnerability Management
- Microsoft Defender XDR
Platforms
- Windows client devices
- Windows Server 2025
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2
- Mac devices
- Linux servers
When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to inactive. Devices that weren't active within the past 30 days are not factored into your organization's exposure score.
Past data, such as alerts, vulnerabilities, and the device timeline, for an offboarded device is displayed in the Microsoft Defender portal until the configured retention period expires. You also see the device profile (without data) in the device inventory for up to 180 days. To view data for active devices only, you can use filters, such as sensor health state, device tags, or device groups.
Offboard Windows client devices
In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.
You can also use other methods, such as:
- Offboard devices using a local script
- Offboard devices using Group Policy
- Offboard devices using Mobile Device Management tools
Offboard servers
In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.
You can also use other methods, such as:
- Offboard devices using Group Policy
- Offboard devices using Configuration Manager
- Offboard devices using Mobile Device Management tools
- Offboard devices using a local script
Offboard Mac devices
In the following procedure, steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.
Create a device tag, and name the tag
decommissioned
. Assign the tag to the Mac devices that you want to offboard from Defender for Endpoint.Create a Device group and name it something like,
Decommissioned Mac
. Assign this tag to an appropriate user group.Remove policies for Tamper Protection. See Set preferences on Mac: Tamper protection or use manual configuration.
In the Microsoft Defender portal, in the navigation pane, select Settings > Offboard, and then select an operating system to start the offboarding process.
Or, if you're using a non-Microsoft device management solution, disable integration with Defender for Endpoint.
Uninstall the Defender for Endpoint app on Mac devices.
Remove Mac devices from the group for system extension policies if an MDM was used to set them.
Offboard Android or iOS devices
To offboard an Android or iOS device, uninstall the Microsoft Defender app on the device.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.