Inactive accounts shall be blocked or deleted
Description
Deleting or blocking accounts that haven't been used for over 30 days helps prevent unauthorized use of inactive accounts. These accounts can be targets for attackers who are looking to find ways to access your data or move laterally throughout an organization without being noticed.
Policy
Inactive accounts shall be blocked or deleted.
Users who leave the organization shall have their account switched to a blocked state immediately.
Licensing Considerations
To gather the user’s last sign in from the Audit logs, you will need an Azure AD P1 subscription which can be purchased standalone or as part of the following bundles:
Microsoft 365 Business Premium
EMS+ E3 or EMS + E5
Microsoft 365 E3
Microsoft 365 E5
You will want to search for users who haven't signed-in within 30+ days.
Any Microsoft Licensing supports blocking sign-in.
Set Up Instructions
Manage inactive user accounts in Azure AD: How to manage inactive user accounts in Azure AD - Microsoft Entra | Microsoft Learn
Blocking Sign-In
Click Users>Active Users
Select the account you want to block
Click Block sign-in at underneath the account name
End-User Impact
Level: None
If accounts are truly dormant, there should be no impact to end-users. Proper validation is required before blocking or deleting accounts.
Tips
Block user accounts after someone leaves the organization. Develop a retention policy that defines how long you will keep the account before removing completely.
PowerShell Scripts
Leveraging Graph API: How to manage inactive user accounts in Azure AD - Microsoft Entra | Microsoft Learn.
Find Azure AD Inactive Users using Powershell and Graph - Azure365Pro.com
Videos
None Currently
Last updated