Skip to content

Commit 9384fdd

Browse files
authored
Update protect-against-consent-phishing.md
Article is missing one piece of our best practice recommendation on User Consent policies - restricting user consent to apps with verified publishers AND low risk permissions. That best practice is called out clearly in other linked docs like Configure how users consent to applications and Secure your Azure AD identity infrastructure, along with the actual UI for the feature in the Azure portal. I've proposed a short addition to line 67 for this purpose.
1 parent 6d65bdd commit 9384fdd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Administrators should be in control of application use by providing the right in
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
6565
- Allow access to trusted applications and protect against those applications that aren't:
6666
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process.
67-
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to specific trusted applications, such as applications developed by the organization or from verified publishers.
67+
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to specific trusted applications, such as applications developed by the organization or from verified publishers and only for low risk permissions you select.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
6969

7070
## Next steps

0 commit comments

Comments
 (0)