Inactive User Accounts
Identifies user accounts inactive for 90+ days
Why this matters
What this means
User accounts were found that have not signed in for over 90 days. These dormant accounts still have active credentials and any previously assigned roles and group memberships.
Why is it a security risk?
- Inactive accounts are prime targets for credential-stuffing and password-spray attacks — the legitimate owner is unlikely to notice unusual sign-in activity.
- Former employees or contractors whose accounts were not properly off-boarded may still have access to sensitive resources.
- Each unused account with a valid password is a dormant entry point into your organisation.
Recommended next steps
- Go to Microsoft Entra admin center → Users and sort or filter by last sign-in activity.
- Cross-reference with HR records to identify users who have left the organisation.
- Disable sign-in for confirmed inactive accounts, then delete after a grace period.
- Set up Access Reviews to automatically flag inactive accounts on a recurring basis.
How to fix it
Disable or remove inactive user accounts
Required Microsoft Graph permissions
EntraAnalyzer needs the following read-only Graph permissions to evaluate this rule:
Directory.Read.AllUser.Read.AllAuditLog.Read.All
Further reading
Run this check on your tenant
EntraAnalyzer evaluates this rule automatically on every scan and emails you the results.
Get started — free first scan →