Skip to content

Commit 08e8ab5

Browse files
committed
Security Assessment: Remove Inactive Service Accounts (Preview) change 180 days to 90 days
1 parent 9a1afcc commit 08e8ab5

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

ATPDocs/remove-inactive-service-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99
# Security Assessment: Remove Inactive Service Accounts (Preview)
1010

11-
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 90 days.
1212

1313
## Why do inactive service accounts pose a risk?
1414

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For UEBA tenants without a Microsoft Defender for Identity license, synchronizat
4444

4545
### New security assessment: Remove inactive service accounts (Preview)
4646

47-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
47+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 90 days, to help you mitigate security risks associated with unused accounts.
4848

4949
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
5050

0 commit comments

Comments
 (0)