Skip to content

Commit dd78ae1

Browse files
Merge pull request #230259 from ebasseri/docs-editor/protect-against-consent-phishi-1678471128
clarifying disabled app details
2 parents 60438bc + deb9762 commit dd78ae1

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Administrators, users, or Microsoft security researchers may flag OAuth applicat
3535
When Azure AD disables an OAuth application, the following actions occur:
3636

3737
- The malicious application and related service principals are placed into a fully disabled state. Any new token requests or requests for refresh tokens are denied, but existing access tokens are still valid until their expiration.
38-
- The disabled state is surfaced through an exposed property called *disabledByMicrosoftStatus* on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph.
38+
- These applications will show `DisabledDueToViolationOfServicesAgreement` on the `disabledByMicrosoftStatus` property on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph. To prevent them from being instantiated in your organization again in the future, you cannot delete these objects.
3939
- An email is sent to a global administrator when a user in an organization consented to an application before it was disabled. The email specifies the action taken and recommended steps they can do to investigate and improve their security posture.
4040

4141
## Recommended response and remediation
@@ -73,3 +73,4 @@ Administrators should be in control of application use by providing the right in
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
7575
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)
76+

0 commit comments

Comments
 (0)