Microsoft Defender for Endpoint provides transient device tagging to identify transient devices.
Transient device tagging is currently in preview.
Important
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
Addressing challenges
Transient devices present challenges within device inventories. They appear for short times in the network, and so are often unknown device types. They're difficult to effectively track, classify, and audit, potentially causing inventory noise and reporting inaccuracies.
Defender for Endpoint addresses some of these issues by identifying and tagging transient devices, making the device inventory easier to manage.
How does transient tagging work?
Transient device tagging uses an internal algorithm to tag transient devices in the inventory.
The algorithm runs on discovered devices within the device inventory.
The algorithm excludes specific devices from tagging. Excluded device types include: Server, NetworkDevice, Printer, Industrial, Surveillance, SmartFacility, and SmartAppliance.
The algorithm is mainly based on the frequency with which devices appear in the network.
Transient tagging doesn't delete any devices from the inventory. It simply tags them.
Important
Transient tagging doesn't delete any devices from the network. It tags them, and then it filters them out of the device inventory by default.
How do I work with transient tagging?
Transient devices are filtered out of the inventory by default. You can turn off the filter as needed. Note that turning off the filter doesn't affect tagging. The tag remains on inventory assets identified as transient.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.
Learn about the available features that you can use from the Devices list such as sorting, filtering, and exporting the list to enhance investigations.