Application Permissions - Ensure User Consent to Apps Accessing Company Data on their Behalf is not Allowed

 










Summary

Users can generally consent to the applications accessing an organization's data, by default, although only for some permissions. For example, by default a user can consent to allow an app to access their own mailbox or the Teams conversations for a team the user owns, but cannot consent to allow an app unattended access to read and write to all SharePoint sites in your organization.

Users should not grant consent to apps accessing company data on their behalf.

Reason

Attackers often use custom applications to trick users into granting them access to company data.

When users are allowed to consent by themselves, they become capable of acquiring useful applications that integrate with Microsoft 365, Azure and other services, it can also represent a risk if it is not used and monitored carefully.

Future user consent operations must be disabled to help reduce the threat-surface and mitigate risks. However, even if the user consent is disabled, previous consent grants will still be honored while all the future consent operations must be performed by an administrator. 

What If?

Even if the user consent is disabled, previous consent grants will still be honored while all the future consent operations must be performed by an administrator. Tenant-wide admin consent can be requested through an integrated administrator consent request workflow or through organizational support processes.

How to?

To prohibit user consent to apps accessing company data on their behalf, use the Microsoft 365 Admin Center:
  1. Select Admin centers and Azure Active Directory.
  2. Select Enterprise Applications from the Azure navigation pane.
  3. Under Security, pick consent and permissions.
  4. Now, under User consent for applications select Do not allow user consent.
  5. Click the Save button at the top of the window.

To prohibit user consent to apps accessing company data on their behalf, use the Microsoft Online PowerShell module:

  1. Connect to Microsoft Online service using Connect-MSOLService.
  2. Run the following command:

Set-MSOLCompanySettings -UsersPermissionToUserConsentToAppEnabled $False

Monitor:

To verify that user consent to apps accessing company data on their behalf is not allowed, use the Microsoft 365 Admin Center:
  1. Select Admin centers and Azure Active Directory.
  2. Select Enterprise Applications from the Azure navigation pane.
  3. Under Security, pick consent and permissions.
  4. Now, verify User consent for applications is set to Do not allow user consent.

To verify that user consent to apps accessing company data on their behalf is not allowed, use the Microsoft Online PowerShell module:

  1. Connect to Microsoft Online service using Connect-MSOLService.
  2. Run the following command:

Get-MSOLCompanyInformation | Select-Object
UsersPermissionToUserConsentToAppEnabled

      3. Verify the value for UsersPermissionToUserConsentToAppEnabled is set to False.

























































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements