Dormant accounts are easy targets
An account that nobody is watching is an account nobody will notice when it gets compromised. Inactive accounts with retained permissions are a common entry point for attackers.
Every Entra ID tenant accumulates inactive accounts over time. Former employees, expired guest accounts, dormant service principals, and users who simply stopped logging in. Each one holds permissions and often a paid license. Zombie Account Hunter surfaces them so you can clean up, recover spend, and reduce your identity attack surface.
Why it matters
An account that nobody is watching is an account nobody will notice when it gets compromised. Inactive accounts with retained permissions are a common entry point for attackers.
Microsoft 365 E3 or E5 licenses assigned to accounts that have not signed in for months represent direct cost waste. Across a tenant with hundreds of users, the recovery can be significant.
External guest accounts from past collaborations, vendor engagements, or one-time shares accumulate and retain access to shared resources long after their purpose has ended.
Security frameworks expect regular access reviews and cleanup of inactive identities. Zombie Account Hunter provides the data needed to satisfy these requirements without manual directory audits.
Built with
FAQ
Built by Orygn
Orygn builds custom software, security tooling, and identity-focused systems. This tool is part of a broader set of open-source Entra ID utilities for tenant hygiene, cost recovery, and identity security.
View on GitHub