CISO-Toolbox
  • Microsoft CISO PoV
  • M365E5 - CISO PoV
  • Ciberseguridad e Inteligencia Artificial
    • Inteligencia artificial ética y responsable
    • Modelo de responsabilidad compartida de la inteligencia artificial (IA)
    • GPT-RAG Arquitectura de Referencia
    • Inteligencia Artificial como Amenaza
    • Amenazas sobre Inteligencia Artificial
      • AI + Machine Learning security
    • Inteligencia Artificial como Defensa
  • Microsoft Copilot
    • Copilot: Adopción Segura
    • Copilot for Security
  • AI + machine learning
    • Azure-Content-Safety
    • Servicios cognitivos disponibles en Microsoft Azure
  • Microsoft Security
    • Defender
      • Microsoft Defender XDR
      • Automatic attack disruption
      • Data Retention on MDE
      • MDE - MTD (IOs/Android)
    • Azure Security
    • GitHub Security
    • Microsoft Entra
      • EntraID - Identity Protection
      • Risk-based Conditional Access
      • Microsoft-managed policies
    • Sentinel - SOC (SIEM/SOAR)
      • Microsoft Sentinel Technical Playbook for MSSPs
      • Microsoft Sentinel Integrations
    • Intune - EndPoint Mng
    • Purview - Data Protection
    • Copilot Security
    • Consola unificada - XDR
    • Azure network security
    • Ecosistema Ciberseguridad
    • What's New?
  • Licenciamiento Microsoft
  • Soporte y Servicios
    • FastTrack
      • FastTrack Microsoft Defender
    • Soporte Unificado
    • Advanced deployment guides for Microsoft 365 and Office 365 products
  • Microsoft Security Adoption Framework (SAF)
    • Zero Trust
    • Microsoft Cybersecurity Reference Architectures
    • CISO Workshop
    • CISO Threat Framework
    • Security in the Microsoft Cloud Adoption Framework for Azure
    • Diagramas de Arquitectura
    • Secure Score (3)
    • Enterprise Security Assessment
  • Azure cloud solutions
    • Page 1
  • Ciber Resiliencia
    • Ransomware
      • Human-operated ransomware attacks
      • Quickly protect your organization against ransomware attacks
      • Backup and restore plan to protect against ransomware
      • Recovering from systemic identity compromise
    • Ciber Higiene
    • Threat Modeling
      • Integrating threat modeling with DevOps
  • Reportes y Estadísticas
    • Reportes de Inteligencia Microsoft
    • Microsoft Security Blog
    • Microsoft Cyber Signals
    • Reportes de 3ros
  • Microsoft Research
    • Post-quantum Cryptography
      • Post-Quantum TLS
      • Post-quantum Cryptography VPN
      • Post-Quantum SSH
    • AI + Machine Learning
      • Phi-3
  • Estándares y Regulaciones
    • Centro de confianza de Microsoft
    • Organizaciones (Ciber)
    • NIST
    • MITRE
    • CIS
    • Metodologia de Analisis y gestion de riesgos
    • Security baselines - Windows Desktop
    • Azure Blueprints
  • Bibliografia y referencias
    • Analistas de Industria
    • Congresos_Conferencias
    • SCavanna ppts
    • CECIB
    • Libros Recomendados
  • Microsoft Privacy
  • Skilling
    • Skilling
      • Ninja Serie
    • Tools
      • Regex
      • Sysinternals Utilities Index
    • Eventos
  • Social
    • Linkedin-X-Youtube
    • SME's
    • SME On Linkedin-X-Youtube
Powered by GitBook
On this page
  1. Microsoft Security
  2. Defender

Data Retention on MDE

Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.

Last updated 7 months ago

Microsoft Defender for Endpoint data storage and privacy - Microsoft Defender for EndpointMicrosoftLearn
Logo