DefenderReporter

Docs

When Did Microsoft Defender Scan Last? Quick and Full Scan Visibility

Check the last quick scan and full scan times so small teams can confirm endpoint scan coverage without manual host-by-host review.

Category: Quick Answers | Published 2026-03-06 | Updated 2026-03-21

Question for Operators reviewing scan compliance and endpoint coverage

Scan timestamps are one of the fastest ways to prove coverage. Use this page to decide whether a device is following policy, drifted from policy, or simply has not checked in recently.

What You'll Get

  • Use quick and full scan timestamps as coverage evidence
  • Identify systems drifting from scan policy
  • Prioritize remediation based on freshness and endpoint criticality

Jump To

Short Answer

Verify the last Defender scan by checking quick and full scan completion timestamps. For teams managing many endpoints, this is the fastest way to prove scan coverage and identify devices that drifted from policy. If you need to confirm Defender is actually installed and running before you read scan timestamps, use the Defender status guide first. For the wider operating model, use the endpoint posture monitoring guide.

Where to Check in Defender Reporter Dashboard

Open the Devices page and review Quick Scan End and Full Scan End for each endpoint. These timestamps show the last reported completion times and are rendered in local browser time for easier operations review.

Fast Local Validation Commands

If you need to confirm scan history on one endpoint, compare the dashboard values with PowerShell.

PS> Get-MpComputerStatus | Select-Object QuickScanEndTime, FullScanEndTime, LastFullScanSource, LastQuickScanSource

Windows Security protection history can also help validate whether the device has recent scan and threat activity.

How to Read Missing or Old Scan Times

Recent timestamps indicate scan activity is occurring. Older timestamps can indicate scan drift, powered-off endpoints, or policy execution problems. A dash usually means scan metadata has not been reported yet from that endpoint.

Follow-Up Workflow for Small Internal Teams

Sort devices by oldest scan timestamps, focus first on high-risk or high-value systems, and assign remediation owners. Use a weekly review cadence to keep scan compliance from becoming a silent backlog.

Set Practical Scan Freshness Targets

Define expected quick scan and full scan windows by endpoint type so your team can classify variance quickly. Without a baseline, teams often mislabel normal behavior as incidents or miss true compliance drift.

Differentiate Missed Scan vs Offline Endpoint

Combine scan timestamps with Last Seen and protection status. If scan is old but endpoint is actively checking in, treat it as policy execution failure. If both are old, handle as endpoint availability or connectivity issue first. If you also see stale signatures, cross-check with the Defender update-status guide.

Balance Coverage and Performance

If users report performance impact, tune scan schedules instead of disabling scans outright. A balanced schedule with explicit exceptions gives better long-term coverage than ad-hoc disablements.

Escalation Triggers

Escalate when critical systems miss full scans beyond policy threshold, or when large endpoint groups drift simultaneously. Pattern-based escalation helps lean teams focus on structural risk rather than isolated noise.

FAQ

Where can I see the last Microsoft Defender scan time?

Use the Quick Scan End and Full Scan End fields in DefenderReporter or review the same timestamps with Get-MpComputerStatus locally.

What if the scan time is blank?

A blank value usually means scan metadata has not been reported yet or the endpoint has not checked in recently.

Should I prioritize old scan times even when no detections are present?

Yes. Missing or stale scans are coverage risks and should be investigated even if the environment looks quiet.

Authoritative Source

Microsoft Learn: Use PowerShell cmdlets for Microsoft Defender Antivirus

Primary Microsoft reference for supported PowerShell commands that expose Defender scan history and related endpoint state.

Use This Guide With the Product

See how scan freshness fits into the product posture view and daily review cadence.

Review endpoint posture monitoring

Related Docs

Browse all docs or see product features.