Jul 09 2021
06:26 AM
- last edited on
Jan 14 2022
03:26 PM
by
TechCommunityAP
Jul 09 2021
06:26 AM
- last edited on
Jan 14 2022
03:26 PM
by
TechCommunityAP
Can anyone provide any guidance about how to conduct a security review of applications that were previously authorized by users in AAD? What should we be looking for? How can we easily identify the apps with the most worrisome permissions that should get closer scrutiny?
Jul 09 2021 09:19 AM
SolutionJul 09 2021 09:19 AM
Solution