You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/remove-inactive-service-account.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,13 +6,13 @@ ms.topic: how-to
6
6
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7
7
---
8
8
9
-
# Security Assessment: Remove Inactive Service Accounts (Preview)
9
+
# Security Assessment: Remove Stale Service Accounts (Preview)
10
10
11
-
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
11
+
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
12
12
13
-
## Why do inactive service accounts pose a risk?
13
+
## Why do stale service accounts pose a risk?
14
14
15
-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15
+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16
16
17
17
This exposure creates several risks:
18
18
@@ -25,10 +25,9 @@ This exposure creates several risks:
25
25
26
26
To use this security assessment effectively, follow these steps:
27
27
28
-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29
-
1. Review the list of exposed entities to discover which of your service account is inactive.
28
+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
30
29
31
-
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
30
+
1. Review the list of exposed entities to discover which of your serviceaccounts are stale and have not performed any login activity in the last 90 days.
32
31
33
32
1. Take appropriate actions on those entities by removing the service account. For example:
Copy file name to clipboardExpand all lines: defender-office-365/outbound-spam-protection-about.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.custom:
19
19
- seo-marvel-apr2020
20
20
description: Admins can learn about the outbound spam controls in Microsoft 365, and what to do if you need to send mass mailings.
21
21
ms.service: defender-office-365
22
-
ms.date: 07/07/2025
22
+
ms.date: 09/03/2025
23
23
appliesto:
24
24
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
25
25
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -34,6 +34,9 @@ In all organizations with cloud mailboxes, we take managing outbound spam seriou
34
34
35
35
This article describes the controls and notifications that are designed to help prevent outbound spam, and what you can do if you need to send mass mailings.
36
36
37
+
> [!TIP]
38
+
> If you're an end-user and your email is blocked or fails to send due to outbound spam protection, you receive a non-delivery report (also known as an NDR or bounce message). This behavior is expected. Only admins can review and resolve these issues, so contact your email admin for assistance.
39
+
37
40
## What admins can do to control outbound spam
38
41
39
42
- **Use built-in notifications**: When a user exceeds [sending limits of the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options) or [outbound spam policies](outbound-spam-policies-configure.md) and is restricted from sending email, the default alert policy named **User restricted from sending email** sends email notifications to members of the **TenantAdmins** group (**Global Administrator** members). To configure who else receives these notifications, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users). Also, the default alert policies named **Email sending limit exceeded** and **Suspicious email sending patterns detected** send email notifications to members of the **TenantAdmins** group (**Global Administrator** members). For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
0 commit comments