If you can’t act on a device, for example if it’s offboarded or a duplicate, you can choose to have it excluded from threat and vulnerability management views. Excluded devices won’t be visible in any of the vulnerability management pages and reports, and they won’t have updated or relevant information about vulnerabilities. Not being able Read More