The remediation action for Application management policies is NOT available in the Essentials solution.
These policies are designed to enhance Entra ID app management and security.
The list below provides an overview of the Application management out-of-the-box policies, what type of remediation action they are set to execute, and which remediation settings you can configure.
App registrations with expiring certificates
Show more
Description
This policy is designed to monitor application registrations with certificates nearing expiration.
It lists the application's display name, the certificate thumbprint, a description of the app, the key ID, and the certificate's expiration date, focusing on those expiring in the next 30 days.
This tool helps IT administrators proactively renew certificates and maintain application security and functionality.
Impact on your tenant
App registrations with expiring certificates can lead to service disruptions or security risks if not addressed in time. Regularly reviewing and updating these certificates is essential.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Set the policy to target expiring certificates in the next 30, 60, or 90 days
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
App registrations with expiring secrets
Show more
Description
This policy helps you keep track of app registrations with secrets that are about to expire.
It shows the app's name, the secret's name, when it was created, and when it's set to expire. You'll also see the unique application ID.
This tool is useful for staying on top of your app security, ensuring you renew or update secrets before they cause access issues. This way, you can keep your apps running smoothly and securely.
Impact on your tenant
Expiring secrets in app registrations can cause application failures or security vulnerabilities. Proactive management of these secrets ensures continued operation and security.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Set the policy to target expiring secrets in the next 30, 60, or 90 days
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps added in the last 30 days
Show more
Description
This policy is aimed at identifying enterprise applications that have been recently added to your directory. It displays the application name, the service principal display name, and tracks the creation date, focusing on apps that have been added in the last 90 days. It also provides information about the publisher, confirms whether the app is enabled, and indicates if it is a registered app and whether it is a built-in service..
Impact on your tenant
Newly added service principals can be a vector of attack, it is essential to actively monitor them to ensure they are legitimate applications and not harmful.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps assigned with "Application.Read.All" permission
Show more
Description
This report gathers all service principals assigned with "Application.Read.All" permission.
Impact on your tenant
Assigning service principals with "Application.Read.All" permission allows them to read all application objects within the organization's directory, including highly sensitive and confidential app configurations and metadata. From a security standpoint, this broad level of access could elevate the risk of data exposure and potential breaches if these principals are compromised. Best practices suggest adhering to the principle of least privilege, ensuring that service principals are granted only the permissions necessary for their specific roles, thereby minimizing the attack surface and enhancing the organization's security posture.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps assigned with "Application.ReadWrite.All" permission
Show more
Description
This report gathers all service principals assigned with "Application.ReadWrite.All" permission.
Impact on your tenant
Assigning service principals the "Application.ReadWrite.All" permission grants them extensive control over application registrations and configurations within an Azure AD environment. This level of access potentially exposes the organization to security risks, such as unauthorized application modifications or data breaches, if these principals are compromised. As a best practice, adhering to the principle of least privilege—only granting permissions as necessary for the required tasks—can mitigate these risks, alongside regular audits and monitoring of service principal activities to ensure compliance and detect anomalies.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps assigned with "Directory.Read.All" permission
Show more
Description
This policy gathers all service principals assigned with "Directory.Read.All" permission.
Impact on your tenant
Assigning service principals the "Directory.Read.All" permission grants them extensive control over the Azure AD environment. This level of access potentially exposes the organisation to security risks, such as unauthorised directory modifications or data breaches, if these principals are compromised. As a best practice, adhering to the principle of least privilege—only granting permissions as necessary for the required tasks—can mitigate these risks, alongside regular audits and monitoring of service principal activities to ensure compliance and detect anomalies.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps assigned with "Directory.ReadWrite.All" permission
Show more
Description
This policy gathers all service principals assigned with "Directory.ReadWrite.All" permission.
Impact on your tenant
Assigning service principals the "Directory.ReadWrite.All" permission grants them extensive control over the Azure AD environment. This level of access potentially exposes the organisation to security risks, such as unauthorised directory modifications or data breaches, if these principals are compromised. As a best practice, adhering to the principle of least privilege—only granting permissions as necessary for the required tasks—can mitigate these risks, alongside regular audits and monitoring of service principal activities to ensure compliance and detect anomalies.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with calendar access
Show more
Description
This report compiles a list of service principals that are granted permission to access calendars, at a minimum.
Impact on your tenant
Allowing enterprise apps to access calendars poses security risks, such as data breaches and privacy violations. To mitigate these, it's crucial to enforce strict access controls, adhere to data protection policies, and regularly review app permissions, ensuring both organizational security and user privacy are maintained.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with contact access
Show more
Description
This report compiles a list of service principals that are granted permission to access contacts, at a minimum.
Impact on your tenant
Granting enterprise apps access to contacts raises security concerns, such as data breaches. To counteract this, it's crucial to enforce strict access controls and encrypt data, ensuring sensitive information remains protected.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with file access
Show more
Description
This report compiles a list of service principals that are granted permission to access files, at a minimum.
Impact on your tenant
Granting enterprise apps file access increases security risks, requiring strict access controls, data encryption, and regular permission audits to protect sensitive information and comply with regulations, thereby maintaining data integrity and organizational trust.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with mail access
Show more
Description
This report compiles a list of service principals that are granted permission to access email, at a minimum.
Impact on your tenant
Allowing enterprise apps email access raises security concerns, requiring strong authentication, strict access controls, and encryption to prevent data breaches and unauthorized access. Adhering to these best practices ensures the secure integration of email functionalities within enterprise environments.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with more than 5 delegated permission
Show more
Description
This report compiles all service principals granted access to data with more than five scopes of delegated permissions.
Impact on your tenant
Granting an enterprise application more than five delegated permissions can escalate security risks by unnecessarily broadening its access, potentially exposing sensitive data and systems. Adhering to the principle of least privilege, regularly reviewing permissions, and implementing strict access controls are essential best practices to mitigate these risks.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with site access
Show more
Description
This report compiles a list of service principals that are granted permission to access sites, at a minimum.
Impact on your tenant
Enterprise apps with site access heighten security risks, requiring stringent access controls and encryption to prevent breaches. Adopting best practices such as least privilege access and secure coding, alongside regular security audits, is essential for protecting sensitive data and maintaining a secure operational environment.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with unverified publishers
Show more
Description
This policy identifies enterprise applications with unverified publishers in your environment. It provides key information including the application name, service principal display name, publisher, verification status, and whether the app is enabled.
Additionally, it indicates if the app is a custom registration or built-in.
This tool helps IT security teams assess and manage potential risks associated with unverified applications, ensuring compliance with organizational security policies and maintaining the integrity of your enterprise app ecosystem.
Impact on your tenant
Enterprise apps with unverified publishers can introduce potential risks. Verifying the publishers of these apps helps maintain a secure environment.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps with "ReadWrite" access
Show more
Description
This policy gathers all service principals assigned with "ReadWrite" application permissions.
Impact on your tenant
Assigning service principals "ReadWrite" permissions grants them the ability to modify objects in your directory. This level of access potentially exposes the organisation to security risks, such as unauthorised directory modifications or data breaches, if these principals are compromised. As a best practice, adhering to the principle of least privilege—only granting permissions as necessary for the required tasks—can mitigate these risks, alongside regular audits and monitoring of service principal activities to ensure compliance and detect anomalies.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Enterprise apps without owners
Show more
Description
This policy identifies enterprise applications that currently have no assigned owners.
It displays information such as the application name, service principal display name, publisher, and enabled status.
The policy confirms the lack of owners and indicates whether the app is a custom registration or built-in. By highlighting apps without owners, this policy enables prompt assignment of responsibility, ensuring better management and security oversight of enterprise applications.
Impact on your tenant
Enterprise apps without owners can become unmanaged and pose security risks. Assigning owners to all apps ensures proper oversight and governance.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Long-term expiry app registration certificates
Show more
Description
This policy identifies app registration with certificates that expire beyond a 180-day threshold.
It displays the application name, the thumbprint, the key ID, the creation date, and the expiration date, focusing on apps with certificates expiring in over 180 days.
Impact on your tenant
By flagging these certificates well in advance, you ensure continuous service availability, prevent potential authentication disruptions, and maintain a high standard of security.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Long-term expiry app registration secrets
Show more
Description
This policy identifies app registration with secrets that expire beyond a 180-day threshold.
It displays the application name, the secret display name, the creation date, and the expiration date, focusing on apps with secrets expiring in over 180 days.
Impact on your tenant
By flagging these secrets well in advance, you ensure continuous service availability, prevent potential authentication disruptions, and maintain a high standard of security.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Expired app certificates
Show more
Description
This policy identifies app registration certificates that have expired but have not been removed yet.
It displays the application name and ID, the certificate display name, the key ID, the creation date, and the expiration date.
Impact on your tenant
Regularly updating and removing outdated certificates is part of good security hygiene.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Expired app secrets
Show more
Description
This policy identifies app registration secrets that have expired but have not been removed yet.
It displays the application name and ID, the secret display name, the key ID, the creation date, and the expiration date.
Impact on your tenant
Regularly updating and removing outdated secrets is part of good security hygiene.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action
Unused enterprise apps
Show more
Description
This policy identifies enterprise applications that have not been used recently.
It displays the application name and the service principal display name, and tracks the last sign-in activity, focusing on apps with no sign-ins in the previous 90 days.
It also provides information about the publisher, confirms whether the app is enabled, and indicates whether it is a registered app or a built-in service.
Impact on your tenant
Unused enterprise apps can create unnecessary security risks or consume resources. Regularly reviewing and decommissioning these apps helps maintain an efficient and secure environment.
Remediation action
Schedule and send the report to a custom recipient
What you can configure
- Set the policy to target apps without sign-ins in the previous 30, 60, 90, 180 days, or ever.
- Type the recipient of the email (custom address)
- Schedule the recurrence of the remediation action