GOV-02: Automatically Disable Stale Accounts
Frequently asked questions about implementing and managing the GOV-02 security control in Microsoft 365 and Entra ID.
QWhat is GOV-02 (Automatically Disable Stale Accounts)?▼
GOV-02 is a security control that manual reviews miss accounts. automated disabling ensures that former employees, forgotten accounts, and inactive identities cannot be used by attackers. the 14-day warning prevents disruption for legitimate users. It requires that accounts inactive for 90+ days are automatically disabled and a warning notification is sent 14 days before disabling, emergency access accounts and service accounts are excluded.
QWhy is Automatically Disable Stale Accounts important for Microsoft 365 security?▼
Manual reviews miss accounts. Automated disabling ensures that former employees, forgotten accounts, and inactive identities cannot be used by attackers. The 14-day warning prevents disruption for legitimate users.
QHow do I implement GOV-02 in my tenant?▼
TrueConfig can automate stale account disabling with exclusion lists
QWhat license do I need for GOV-02?▼
This control requires Azure AD Premium P2 (included in Microsoft 365 E5) or standalone P2.
QWhich security baseline includes GOV-02?▼
GOV-02 is included in the Enhanced Security baseline (Level 2). This level adds stricter controls for security-conscious organizations.
5
Questions
1
Related Controls
—
Categorized
Related Resources
Still have questions?
Our security experts are here to help. Start a free trial and get personalized guidance for your Microsoft 365 environment.
Start Free Trial