Skip to content

Exclude TrapEye Devices from Microsoft Defender

This guide explains how to configure Microsoft Defender so its automated scans do not generate unnecessary activity inside the TrapEye console.


TrapEye devices intentionally expose services designed to attract attackers. They monitor and react to any connection attempt, scan, probe, authentication request or network interaction.

Microsoft Defender for Endpoint (MDE) and Microsoft Defender for Identity (MDI) occasionally probe network devices.

When these automated probes reach TrapEye, you may see alerts such as:

  • Unexpected authentication attempts
  • Suspicious port access

Adding exclusions ensures these probes won’t be send to TrapEye devices and misinterpreted as threats.


  1. Log into your TrapEye Platform.

  2. Navigate to Management → Devices menu.

  3. Click on 3 dots icon and select Export to CSV.

    Export as CSV

You will find inside the .csv file all the IPs that needs to be enter in Microsoft Defender.


  1. Open the Microsoft Defender Portal at https://security.microsoft.com/.

  2. In the navigation sidebar, go to System → Settings → Device Discovery.

  3. Open the Exclusions section.

  4. Click Add exclusion and enter the first TrapEye IP address.

  5. Repeat the process for all your TrapEye devices.

  6. Confirm changes by clicking Save.

This prevents MDE from attempting to classify or scan TrapEye devices as regular endpoints.


Exclude Trapeye in Microsoft Defender for Identity

Section titled “Exclude Trapeye in Microsoft Defender for Identity”

If Defender for Identity is active in your environment, you also need to apply these steps.

  1. In the Defender Portal, open System → Settings → Identities.

  2. Click Global excluded entities.

  3. In the IP addresses section, add each TrapEye device IP individually.

  4. Save the exclusions once all IPs have been added.


Optionnal: Remove TrapEye Appliances from the Defender Assets Inventory

Section titled “Optionnal: Remove TrapEye Appliances from the Defender Assets Inventory”

By default, Defender attempts to populate an asset inventory of everything detected on the network.
TrapEye devices do not need vulnerability scoring, patch information, or endpoint analytics. Excluding them keeps the asset list clean.

  1. Go to Assets → Devices in the Defender Portal.

  2. Search for each TrapEye IP.

  3. If a matching entry appears, select it.

  4. Open the actions menu (three dots) and choose Exclude.

  5. If a TrapEye device is not listed, simply continue with the next IP.

Your TrapEye devices are now cleanly excluded from Microsoft Defender.

If any Defender alerts still appear for TrapEye after applying these steps, our support team can assist with validation or troubleshooting.