Skip to content

Commit b3b55b2

Browse files
committed
change stale to inactive
1 parent 5759084 commit b3b55b2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-for-identity/remove-inactive-service-account.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This recommendation lists Active Directory service accounts detected as inactive
1212

1313
## Why do inactive service accounts pose a risk?
1414

15-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Inactive service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
1616

1717
This exposure creates several risks:
1818

@@ -25,9 +25,9 @@ This exposure creates several risks:
2525

2626
To use this security assessment effectively, follow these steps:
2727

28-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove inactive service account.
2929

30-
1. Review the list of exposed entities to discover which of your service accounts are stale and haven't performed any login activity in the last 90 days.
30+
1. Review the list of exposed entities to discover which of your service accounts are inactive and haven't performed any login activity in the last 90 days.
3131

3232
1. Take appropriate actions on those entities by removing the service account. For example:
3333

0 commit comments

Comments
 (0)