Azure Active Directory has excellent security with conditional access being one of the most widely used tool to protect Azure Active Active Directory.
The sceen shot below shows the default settings for an Azure AD Premium Plan 2 tenant.
The information tab on the user consent to apps accessing company data on their behalf reads like this:
If this option is set to yes, then users may consent to allow applications which are not published by Microsoft to access your organization’s data, if the user also has access to the data. This also means that the users will see these apps on their Access Panels.
If this option is set to no, then admins must consent to these applications before users may use them.
So in the scenario where a phishing email slipped through the cracks and an end user grants access to a non Microsoft application to their organizations’s data. We do not want that to happen!!!!
The correct setting is listed below
Application administrators should be granted the application administrator role in Azure Active Directory , Then the next time an and user wants to add an application, the application administrator will receive an email and can approve from his\her Outlook client.
The next time an end user or IT staff member wants to add an application to Azure AD, Do not just simply grant the global administrator role.
User Azure Privileged Identity Management and Application Administrator Roles!