Stale Guest Users
Identifies guest users who have not signed in for 90+ days
Why this matters
What this means
Guest users (external identities) were found that have not signed in for over 90 days. These stale accounts represent unnecessary access paths into your tenant.
Why is it a security risk?
- Inactive guest accounts may still have access to Teams channels, SharePoint sites, and other resources.
- The external user's home organisation may have been compromised without your knowledge — their credentials could be used to access your data.
- Compliance frameworks (ISO 27001, SOC 2) require regular review and removal of unused external access.
Recommended next steps
- Go to Microsoft Entra admin center → Users → Guest users and sort by last sign-in date.
- For each stale guest, verify with the inviting team whether the collaboration is still active.
- Remove guests that are no longer needed or disable their sign-in.
- Set up Access Reviews to automatically review guest access on a recurring schedule.
How to fix it
Review and remove inactive guest accounts
Required Microsoft Graph permissions
EntraAnalyzer needs the following read-only Graph permissions to evaluate this rule:
Directory.Read.AllUser.Read.AllAuditLog.Read.All
Further reading
Run this check on your tenant
EntraAnalyzer evaluates this rule automatically on every scan and emails you the results.
Get started — free first scan →