A company has implemented a new policy to enhance the security of user accounts. The policy requires an automated process to identify and handle inactive accounts. Which of the following BEST aligns with the company's policy?
Network location
Account disablement
Lockout
Password history
Password complexity
Password reuse