Connected Apps
Discover and manage third-party cloud applications connected to your Microsoft 365 environment. Monitor OAuth app consents, API permissions, and data access to identify risky applications and enforce governance policies.
Note: Connected Apps visibility is provided by Microsoft Defender for Cloud Apps (MCAS). Included with Microsoft 365 E5 or available as a standalone license.
Discovery Overview
- 1,247 — Discovered Apps
- 89 — OAuth Apps
- 34 — Sanctioned
- 12 — Unsanctioned
App Sources
OAuth Connected Apps
Third-party apps that users or admins have granted access to Microsoft 365 data via OAuth consent. These apps have direct API access to services like Exchange, SharePoint, and Graph API.
Discovered Apps (Shadow IT)
Cloud apps discovered through network traffic analysis and endpoint telemetry. Identifies SaaS usage that may not be officially sanctioned by IT.
Connector Apps
Apps with MCAS API connectors for deeper visibility. Includes major SaaS platforms like Salesforce, ServiceNow, Box, and Dropbox.
Custom Apps
Line-of-business applications registered in your Entra ID tenant. Includes apps developed internally or by IT partners.
App Details
| Property | Description |
|---|---|
| App Name | Application display name |
| Publisher | App developer or company |
| Risk Score | 1-10 based on security assessment |
| Category | Productivity, Storage, CRM, etc. |
| Users | Number of users accessing app |
| Data Volume | Traffic or API calls to app |
| Status | Sanctioned, Unsanctioned, or Unreviewed |
Risk Assessment
Risk Score Factors
Apps are scored 1-10 based on multiple security factors:
Security
- Data encryption at rest and in transit
- MFA support for authentication
- Security certifications (SOC2, ISO 27001)
- Vulnerability disclosure program
Compliance
- GDPR compliance
- Data residency options
- Audit logging capabilities
- Privacy policy transparency
General
- Company founding date and size
- Domain registration age
- User reviews and ratings
- Legal terms clarity
Legal
- Terms of service
- Data ownership clauses
- Service level agreements
- Data deletion policies
Risk Levels
- Low Risk (8-10) — Well-established apps with strong security posture. Generally safe for business use.
- Medium Risk (5-7) — Apps with some security concerns. Review before sanctioning for broad use.
- High Risk (1-4) — Significant security gaps or unknown apps. Consider blocking or restricting access.
App Governance
Mark as Sanctioned
Approve app for organizational use. Users see sanctioned apps as IT-approved. Can be used in access policies.
Mark as Unsanctioned
Flag app as not approved. Can optionally block access. Users receive warning when accessing unsanctioned apps.
Block App
Prevent users from accessing the app. Requires Defender for Endpoint integration for network-level blocking.
Revoke Permissions
For OAuth apps: remove all user consents and block API access to Microsoft 365 data.
App Discovery
Continuous Discovery
Automatic discovery using Defender for Endpoint telemetry. No additional setup required for Windows devices.
Log Collector
Upload firewall/proxy logs for network-based app discovery. Supports major vendors: Palo Alto, Cisco, Zscaler, etc.
Snapshot Reports
Upload one-time log files for point-in-time analysis. Useful for initial shadow IT assessment.
Session Policies
For connector apps, apply real-time session controls:
- Monitor all activities — Full visibility into user actions
- Block downloads — Prevent file downloads to unmanaged devices
- Block uploads — Prevent data upload to app
- Block copy/paste — Prevent data exfiltration
- Apply sensitivity labels — Auto-label downloaded files
- Protect on download — Encrypt files leaving app
Alerts and Policies
Built-in Anomaly Detection
- New high-privilege app detected
- Unusual data access patterns
- App accessing data from new location
- Spike in app usage or API calls
Custom Policies
- Alert on new OAuth apps with high permissions
- Alert on unverified publisher apps
- Alert on apps accessing sensitive data
- Block risky apps automatically
Best Practices
- Review new apps weekly — Check newly discovered apps and OAuth consents regularly.
- Set baseline sanctioned apps — Identify and approve commonly used business applications.
- Enable discovery continuously — Use Defender for Endpoint integration for real-time shadow IT visibility.
- Block high-risk categories — Consider blocking categories like personal cloud storage or file sharing.
API Reference
GET /api/security/connected-apps— List all connected and discovered appsGET /api/security/connected-apps/:appId— Get app details and risk assessmentPUT /api/security/connected-apps/:appId/status— Update app sanctioned/unsanctioned statusGET /api/security/connected-apps/discovery— Get shadow IT discovery reportPOST /api/security/connected-apps/:appId/block— Block app access