Skip to content

Commit 5cd0db1

Browse files
committed
remove preview tag
1 parent bd5e312 commit 5cd0db1

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

defender-for-identity/remove-inactive-service-account.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
2+
title: 'Security Assessment: Remove Inactive Service Account'
33
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
44
ms.date: 08/17/2025
55
ms.topic: how-to
66
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
77
---
88

9-
# Security Assessment: Remove Stale Service Accounts (Preview)
9+
# Security Assessment: Remove Inactive Service Accounts
1010

11-
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
11+
This recommendation lists Active Directory service accounts detected as inactive within the past 90 days.
1212

13-
## Why do stale service accounts pose a risk?
13+
## Why do inactive service accounts pose a risk?
1414

1515
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
1616

defender-for-identity/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,11 +98,11 @@ Previously, Defender for Identity tenants received Microsoft Entra ID risk level
9898

9999
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
100100

101-
### New security assessment: Remove stale service accounts (Preview)
101+
### New security assessment: Remove inactive service accounts
102102

103-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been stale for the past 90 days, to help you mitigate security risks associated with unused accounts.
103+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive for the past 90 days, to help you mitigate security risks associated with unused accounts.
104104

105-
For more information, see: Security Assessment: [Remove Stale Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
105+
For more information, see: Security Assessment: [Remove Inactive Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
106106

107107
### New Graph based API for response actions (preview)
108108

0 commit comments

Comments
 (0)