RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
Long after individual workers have left your company's employ, their virtual presence may linger in the form of unclosed access to IT resources. Close the security gap caused by old network IDs belonging to "ghost workers". Download and tailor this account privileges expiry policy to exorcise "ghost workers" from your network.