Application Permissions - Ensure Third Party Integrated Applications Are Not Allowed

 






Summary

Third party integrated applications should not be allowed to connect to your services.

Reason

As stated above, third party integrated applications should not be allowed to be connected to your services, unless, there is a very clear value and you have robust security controls in place. Attackers can easily gain access via breached accounts to third party applications, in order to exfiltrate data from your tenancy without maintaining the breached account.

What If?

This change will affect both end users and administrators. While end users will not be able to integrate third-party applications that they really want to use, the administrators will probably receive requests from end users for permissions to the necessary third party applications.  

How to?

To prohibit third party integrated applications, use the Microsoft 365 Admin Center:
  1. Select the Admin centers and Azure Active Directory.
  2. Select Users from the Azure navigation pane.
  3. Select Users settings.
  4. Set App registrations to No.
  5. Now, click Save.

Monitor:

To verify that third party integrated applications are not allowed, use the Microsoft 365 Admin Center:
  1. Select the Admin centers and Azure Active Directory.
  2. Select Users from the Azure navigation pane.
  3. Select Users settings.
  4. Verify if App registrations is set to No.





























Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements