Skip to content

Commit 9070e5b

Browse files
Merge pull request #4761 from MicrosoftDocs/main
[AutoPublish] main to live - 08/18 07:33 PDT | 08/18 20:03 IST
2 parents 8f201a0 + 45c5183 commit 9070e5b

File tree

4 files changed

+57
-3
lines changed

4 files changed

+57
-3
lines changed
456 KB
Loading
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/17/2025
5+
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7+
---
8+
9+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10+
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12+
13+
## Why do inactive service accounts pose a risk?
14+
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
23+
24+
## How do I use this security assessment to improve my organizational security posture?
25+
26+
To use this security assessment effectively, follow these steps:
27+
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29+
1. Review the list of exposed entities to discover which of your service account is inactive.
30+
31+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32+
33+
1. Take appropriate actions on those entities by removing the service account. For example:
34+
35+
- **Disable the account:** Prevent any usage by disabling the account identified as exposed.
36+
37+
- **Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38+
39+
- **Delete the account:** If no issues are observed, delete the account and fully remove its access.
40+
41+
> [!NOTE]
42+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43+
44+
## Related articles
45+
46+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,10 +249,12 @@ items:
249249
href: security-assessment-clear-text.md
250250
- name: LAPS usage assessment
251251
href: security-assessment-laps.md
252-
- name: Riskiest lateral movement paths
253-
href: security-assessment-riskiest-lmp.md
254252
- name: Remove discoverable passwords in Active Directory account attributes
255253
href: remove-discoverable-passwords-active-directory-account-attributes.md
254+
- name: Remove inactive service accounts
255+
href: remove-inactive-service-account.md
256+
- name: Riskiest lateral movement paths
257+
href: security-assessment-riskiest-lmp.md
256258
- name: Unsecure Kerberos delegation assessment
257259
href: security-assessment-unconstrained-kerberos.md
258260
- name: Unsecure SID History attributes

ATPDocs/whats-new.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,19 @@ For updates about versions and features released six months ago or earlier, see
2626
## August 2025
2727

2828

29+
### New security assessment: Remove inactive service accounts (Preview)
30+
31+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
32+
33+
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
34+
2935
### New Graph based API for response actions (preview)
3036

3137
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
3238

3339
This capability is currently in preview and available in API Beta version.
3440

35-
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta).
41+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta&preserve-view=true).
3642

3743
### Identity scoping is now generally available (GA)
3844

0 commit comments

Comments
 (0)