Skip to content

Commit b911da1

Browse files
committed
fix toc and intro
1 parent f6acdfb commit b911da1

File tree

3 files changed

+14
-6
lines changed

3 files changed

+14
-6
lines changed

ATPDocs/remove-inactive-service-account.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
33
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4-
ms.date: 08/04/2025
4+
ms.date: 08/17/2025
55
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
67
---
78

89
# Security Assessment: Remove Inactive Service Accounts (Preview)
@@ -11,7 +12,14 @@ This recommendation lists Active Directory service accounts detected as inactive
1112

1213
## Why do inactive service accounts pose a risk?
1314

14-
Unused service accounts can pose significant security risks to your organization, as some of these accounts can possess elevated privileges, which, if accessed by an attacker, could result in substantial damage. Therefore, it's imperative to identify and address any unused or orphaned service accounts.
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
1523

1624
## How do I use this security assessment to improve my organizational security posture?
1725

ATPDocs/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,12 +249,12 @@ items:
249249
href: security-assessment-clear-text.md
250250
- name: LAPS usage assessment
251251
href: security-assessment-laps.md
252+
- name: Remove discoverable passwords in Active Directory account attributes
253+
href: remove-discoverable-passwords-active-directory-account-attributes.md
252254
- name: Remove inactive service accounts
253255
href: remove-inactive-service-account.md
254256
- name: Riskiest lateral movement paths
255257
href: security-assessment-riskiest-lmp.md
256-
- name: Remove discoverable passwords in Active Directory account attributes
257-
href: remove-discoverable-passwords-active-directory-account-attributes.md
258258
- name: Unsecure Kerberos delegation assessment
259259
href: security-assessment-unconstrained-kerberos.md
260260
- name: Unsecure SID History attributes

ATPDocs/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ For updates about versions and features released six months ago or earlier, see
2828

2929
### New security assessment: Remove inactive service accounts (Preview)
3030

31-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your environment. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, helping you mitigate security risks associated with unused accounts.
31+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
3232

33-
For more information see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
33+
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
3434

3535

3636
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)

0 commit comments

Comments
 (0)