Skip to content

Commit 4da0727

Browse files
committed
Learn Editor: Update protect-against-consent-phishing.md
1 parent 4f077e6 commit 4da0727

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Administrators, users, or Microsoft security researchers may flag OAuth applicat
3535
When Azure AD disables an OAuth application, the following actions occur:
3636

3737
- The malicious application and related service principals are placed into a fully disabled state. Any new token requests or requests for refresh tokens are denied, but existing access tokens are still valid until their expiration.
38-
- The disabled state is surfaced through an exposed property called *disabledByMicrosoftStatus* on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph.
38+
- These applications will show `DisabledDueToViolationOfServicesAgreement` on the `disabledByMicrosoftStatus` property on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph. To prevent them from being instantiated in your organization again in the future, you cannot delete these objects.
3939
- An email is sent to a global administrator when a user in an organization consented to an application before it was disabled. The email specifies the action taken and recommended steps they can do to investigate and improve their security posture.
4040

4141
## Recommended response and remediation
@@ -73,3 +73,4 @@ Administrators should be in control of application use by providing the right in
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
7575
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)
76+

0 commit comments

Comments
 (0)