You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3
+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4
+
ms.date: 08/17/2025
5
+
ms.topic: how-to
6
+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7
+
---
8
+
9
+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10
+
11
+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12
+
13
+
## Why do inactive service accounts pose a risk?
14
+
15
+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16
+
17
+
This exposure creates several risks:
18
+
19
+
- Unauthorized access to sensitive applications and data.
20
+
21
+
- Lateral movement across the network without detection.
22
+
23
+
24
+
## How do I use this security assessment to improve my organizational security posture?
25
+
26
+
To use this security assessment effectively, follow these steps:
27
+
28
+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29
+
1. Review the list of exposed entities to discover which of your service account is inactive.
30
+
31
+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32
+
33
+
1. Take appropriate actions on those entities by removing the service account. For example:
34
+
35
+
-**Disable the account:** Prevent any usage by disabling the account identified as exposed.
36
+
37
+
-**Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38
+
39
+
-**Delete the account:** If no issues are observed, delete the account and fully remove its access.
40
+
41
+
> [!NOTE]
42
+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43
+
44
+
## Related articles
45
+
46
+
-[Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,27 @@ For updates about versions and features released six months ago or earlier, see
26
26
## August 2025
27
27
28
28
29
-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
29
+
### New security assessment: Remove inactive service accounts (Preview)
30
+
31
+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
32
+
33
+
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
34
+
35
+
### New Graph based API for response actions (preview)
36
+
37
+
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
38
+
39
+
This capability is currently in preview and available in API Beta version.
40
+
41
+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta&preserve-view=true).
42
+
43
+
### Identity scoping is now generally available (GA)
44
+
45
+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
46
+
47
+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
48
+
49
+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
30
50
31
51
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
32
52
@@ -47,11 +67,11 @@ Improved detection logic to include scenarios where accounts were locked during
47
67
48
68
## July 2025
49
69
50
-
**Expanded coverage in ITDR deployment health widget**
70
+
### Expanded coverage in ITDR deployment health widget
51
71
52
72
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
53
73
54
-
**Time limit added to Recommended test mode**
74
+
### Time limit added to Recommended test mode
55
75
56
76
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/investigate-anomaly-alerts.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
8
8
# How to investigate anomaly detection alerts
9
9
10
10
11
-
12
11
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-salesforce.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
55
55
56
56
| Type | Name |
57
57
| ---- | ---- |
58
-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58
+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
59
59
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
60
60
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
Copy file name to clipboardExpand all lines: defender-endpoint/mde-demonstration-amsi.md
+18-10Lines changed: 18 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
2
title: AMSI demonstrations with Microsoft Defender for Endpoint
3
3
description: Demonstration of AMSI detection by Microsoft Defender for Endpoint
4
-
author: emmwalshh
5
-
ms.author: ewalsh
4
+
author: paulinbar
5
+
ms.author: painbar
6
6
ms.reviewer: yongrhee
7
7
ms.localizationpriority: medium
8
8
ms.service: defender-endpoint
@@ -11,7 +11,7 @@ audience: ITPro
11
11
ms.collection:
12
12
- m365-security
13
13
ms.topic: how-to
14
-
ms.date: 10/16/2024
14
+
ms.date: 08/19/2025
15
15
search.appverid: met150
16
16
ms.custom:
17
17
- partner-contribution
@@ -49,8 +49,11 @@ In this demonstration article, you have two engine choices to test AMSI:
49
49
50
50
1. Save the following PowerShell script as `AMSI_PoSh_script.ps1`:
51
51
52
-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-powershell-save-script.png" alt-text="Screenshot showing PowerShell script to save as AMSI_PoSh_script.ps1" lightbox="media/mde-demonstrations-amsi/test-amsi-powershell-save-script.png":::
53
-
52
+
```powershell
53
+
$testString = "AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386"
54
+
Invoke-Expression $testString
55
+
```
56
+
54
57
2. On your device, open PowerShell as an administrator.
55
58
56
59
3. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
@@ -64,17 +67,22 @@ In this demonstration article, you have two engine choices to test AMSI:
64
67
65
68
1. Save the following VBScript as `AMSI_vbscript.vbs`:
66
69
67
-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-save-script.png" alt-text="Screenshot showing VBScript to save as AMSI_vbscript.vbs" lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-save-script.png":::
68
-
70
+
```vbscript
71
+
REM Save this sample AMSI vbscript as AMSI_vbscript.vbs
72
+
Dimresult
73
+
result=eval("AMSI Test Sample: "+"7e72c3ce-861b-4339-8740-0ac1484c1386")
74
+
WScript.Echoresult
75
+
```
76
+
69
77
2. On your Windows Device, open Command Prompt as an administrator.
70
78
71
-
2. Type `wscript AMSI_vbscript.js`, and then press **Enter**.
79
+
1. Type `wscript AMSI_vbscript.vbs`, and then press **Enter**.
72
80
73
81
The result should be as follows:
74
82
75
-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
83
+
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
84
+
76
85
77
-
78
86
### Verifying the test results
79
87
80
88
In your protection history, you should be able to see the following information:
Copy file name to clipboardExpand all lines: defender-endpoint/web-content-filtering.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
author: denisebmsft
7
7
ms.reviewer: ericlaw
8
8
ms.localizationpriority: medium
9
-
ms.date: 06/27/2025
9
+
ms.date: 08/18/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -53,7 +53,7 @@ Ensure you meet the requirements described in the following table:
53
53
|:---|:---|
54
54
| Subscription | Your subscription must include one of the following plans:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 A5<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](/defender-xdr/eval-defender-endpoint-overview)<br/>- [Microsoft Defender for Business](/defender-business/mdb-overview)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|
55
55
| Portal access | You must have access to the [Microsoft Defender portal](https://security.microsoft.com). |
56
-
| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- For macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
56
+
| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- Windows Server 2019 or later <br/>- For macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
57
57
| Browser | Your devices must be running one of the following browsers: <br/>- Microsoft Edge<br/>- Google Chrome<br/>- Mozilla Firefox<br/>- Brave<br/>- Opera<br/>- Internet Explorer|
58
58
|Related protection |[Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. |
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-about.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams
2
+
title: Microsoft Defender for Office 365 support for Microsoft Teams
3
3
f1.keywords:
4
4
- NOCSH
5
5
author: chrisda
@@ -14,14 +14,15 @@ search.appverid:
14
14
ms.collection:
15
15
- m365-security
16
16
- tier1
17
-
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
17
+
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365.
18
18
ms.service: defender-office-365
19
-
ms.date: 07/28/2025
19
+
ms.date: 08/18/2025
20
20
appliesto:
21
-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
21
+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
0 commit comments