How to audit for app permission threats with Microsoft Entra workbooks
Modern organizations heavily rely on cloud apps and services, often granting these apps specific permissions to access data or execute tasks within their environments. However, improper app permissions or unauthorized changes can pose significant security risks, potentially leading to data exposure or compromised accounts. Identifying and mitigating app permission threats involves monitoring several key activities, including changes to app authentication methods, new permissions granted, and updates to service principal roles. Audit logs alone are insufficient for these tasks, as they require significant time to parse and interpret.
Microsoft Entra ID workbooks simplify this process by aggregating data into visual dashboards and interactive reports. These tools summarize the data from audit logs and categorize them. This allows IT teams to detect anomalies such as unauthorized permission changes, monitor trends in sensitive operations over time, and pinpoint high-risk actors or apps.
In this blog, we’ll explore how you can use Microsoft Entra ID workbooks to track app permission threats, delve into the details of key reports, and discuss how these tools enhance the security of your Microsoft 365 environment.
How to access the Sensitive Operations Report workbooks
To access the Sensitive Operations Report workbook in Microsoft Entra ID, follow these steps.
- Log in to Microsoft Entra ID using an account with permissions to view workbooks.
- Navigate to Identity > Monitoring & Health > Workbooks.
- Select the Sensitive Operations Report workbook template from the available list.
Once you open the workbook, you’ll see a variety of reports categorized under key operations displaying details on modified credentials, permissions, and membership changes.
Microsoft Entra ID Sensitive Operations Report workbook explained
The Sensitive Operations Report workbook provides detailed insights into app permission changes and other critical activities. Here are the primary sections of the workbook and the insights they offer:
- Modified application and service principal credentials/authentication methods
- New permissions granted to service principals
- Directory role and group membership updates to service principals
- Modified federation settings
Modified application and service principal credentials/authentication methods
The reports under this category show the metrics and details on the modification of credentials used to sign in to apps and service principals. The reports are:
- Number of applications and service principals updated by authentication method
- Top actors updating authentication methods
- Updates to service principal authentication methods over time
- Recent updates to application/service principal authentication methods
Number of applications and service principals updated by authentication method
This report displays the count of apps and service principals that have had their authentication methods modified. Administrators can use this data to identify whether a certain type of credential is modified more frequently than others.

Top actors updating authentication methods
In this report, identify the users or processes who frequently change their authentication methods, ranked by activity volume. This helps pinpoint actors who may require further scrutiny since these activities indicate their accounts might have been hijacked.

Updates to service principal authentication methods over time
In this report, view trends in authentication method changes across a specific period. This graph aids in identifying patterns or spikes in authentication changes that may indicate malicious intent.

Recent updates to application/service principal authentication methods
This report contains a detailed list of the latest changes to authentication methods, including timestamps, actors, and affected apps. This comes in handy when administrators wish to identify the exact events summarized by the reports mentioned above.

New permissions granted to service principals
This category of reports monitors for changes to OAuth 2.0 permissions granted to service principals. Administrators can use this to identify privilege escalations where apps are granted higher permissions that either grant access to sensitive data or represent opportunities for lateral movement by attackers. There are two reports under this category:
New Application (AppOnly) permissions added to service principals
This report provides a list of AppOnly permission assignments to apps. This can be used to monitor newly added app permissions, which can have significant implications for security if misconfigured.

Recent app permissions activity
This report provides a chronological overview of all recent app permission activities with the details of who carried out said changes, helping administrators audit them and ensure that there are no unauthorized changes.

Directory role and group membership updates to service principals
This report highlights changes to service principals associated with directory roles and group memberships. Such changes can escalate privileges for these apps, which necessitates monitoring them closely for unauthorized modifications.

Modified federation settings
Federation settings govern how external entities authenticate with the on-premises domains of your organization that you synced with Microsoft Entra ID. This report displays any recent changes by users or apps to federation settings, ensuring that unauthorized modifications are detected promptly.
Get a clear overview of your Microsoft 365 environment with M365 Manager Plus
ManageEngine M365 Manager Plus is a comprehensive administration and security solution for Microsoft 365 used for reporting, managing, monitoring, auditing, and creating alerts for critical activities in your Microsoft 365 environments. You can gain a thorough understanding of your environment not just in Microsoft Entra ID, but also Exchange Online, SharePoint Online, OneDrive for Business, and other Microsoft 365 services, with detailed reports and intuitive visualizations, all from a single console.
There are even more benefits to using M365 Manager Plus to manage and monitor your Microsoft 365 environment:
- Filter your reports just once and save them as custom reports that you can access in just a few clicks.
- Export reports generated in M365 Manager Plus in not just CSV, but also in other presentable formats such as HTML, PDF, and XLSX.
- Delegate granular permissions to technicians without elevating their Microsoft 365 privileges and create custom roles with any combination of reporting, management, and auditing tasks.
- Easily manage users, groups, contacts, mailboxes, teams, and sites in bulk without PowerShell scripting.
- Keep tabs on even the most granular user activities in your Microsoft 365 environment.
- Configure alert profiles in M365 Manager Plus to notify you of specific activities that take place outside of business hours or occur at unusual frequencies.
- Monitor the health and performance of Microsoft 365 features and endpoints around the clock.
Effortlessly schedule and export reports on your Microsoft 365 environment.
Try now for freeStreamline your Microsoft 365 governance and administration with M365 Manager Plus
Get Your Free TrialRelated Resources
-
Entra ID administration
- How to create custom roles in Microsoft Entra ID
- How to setup SSO in Microsoft Entra ID
- How to configure Conditional Access in Microsoft Entra ID
- What is Microsoft Entra ID?
- What are Microsoft Entra ID administrative units
- How to configure external authentication methods in Microsoft Entra ID
- How to set up self-service group management in Entra ID
- How to takeover unmanaged directory as administrator
- How to change authentication type of subdomain
- What is self-service signup in Entra ID
- Delete a tenant in Microsoft Entra ID
- Manage custom domain names in Microsoft Entra ID
- Multi-tenant organization interaction
-
Entra ID auditing and reporting
-
Entra ID bulk user management
-
Entra ID dynamic groups
-
Entra ID group management
- How to enforce naming policy on Microsoft 365 groups in Entra ID
- How to clean up resources related to all user groups
- How to create basic groups and add members in Entra ID
- Group management cmdlets
- How to add group to another group in Entra ID
- How to delete a group in Entra ID
- How to remove a group from another group in Entra ID
- Check import status
- Edit group settings in Entra ID
- Migrate users with individual licenses to groups
- Restore deleted groups in Microsoft Entra ID
- Set expiration for Microsoft 365 groups in Entra ID
-
Entra ID group membership
- How to utilize Microsoft Entra groups in Entra ID
- How to add group members in Entra ID
- How to add group owners in Microsoft Entra ID
- How to add or remove group member automatically in Entra ID
- How to create group of guest users using native admin center
- How to manage groups and group memberships in Entra ID
- How to remove guests from all user groups in Entra ID
- How to utilize groups and administrator roles in Entra ID
- Add or remove a group from another group in Entra ID
- Bulk group members addition in Entra ID
- Bulk remove group members from Entra ID groups
- How to remove members/owners of a group in Entra ID
-
Entra ID group reports
-
Entra ID license management
- How to automate inactive license management for Entra ID users
- How to change license assignments for user in Entra ID
- How to assign licenses to groups in Entra ID
- How to leverage group-based licensing for optimizing license management in Entra ID
- License assignment troubleshooting
- Assign licenses in Microsoft Entra ID
- Azure AD license membership modification
- Remove licenses in Microsoft Entra ID
- View license plans and details in Microsoft Entra ID
-
Entra ID User management
- How to manage permissions using access reviews in Microsoft Entra ID
- How to restrict guest access permissions in Entra ID
- How to clean up unmanaged Microsoft Entra accounts
- How to assign custom security attributes to users in Entra ID
- How to clean up stale accounts using access reviews
- How to share accounts with Entra ID
- How to update custom security attributes to users in Entra ID
- Add guest users
- Add users to Azure AD
- Assign user roles with Entra ID
- Close user account in an unmanaged Microsoft Entra organization
- How to revoke user access in Microsoft Entra ID using PowerShell
- Microsoft 365 delete users
- Remove custom security attribute assignments from users
-
Entra ID user reports
- How to monitor risky sign-ins in Microsoft Entra ID
- License usage reports in Microsoft Entra ID
- How to get the last logon date of users in Microsoft Entra ID
- How to view Microsoft 365 login attempts using PowerShell and Microsoft Entra ID
- How to report the MFA status for users in Microsoft Entra ID
- How to monitor recently created users in Entra ID
- Track password changes by admins in Microsoft Entra ID
- How to monitor user role changes in Entra ID
- How to track self-service password resets in Microsoft Entra ID
- How to create custom sign-in reports in Entra ID
- How to find deleted users in Entra ID
- How to verify deleted users in Entra ID
- Filter users based on custom security attributes
- Download Microsoft 365 user list
-
Entra ID workbooks
- How to create custom Microsoft Entra ID workbooks
- What are Microsoft Entra ID workbooks
- How to handle privilege escalation in Microsoft Entra ID
- How to monitor risky sign-ins using Microsoft Entra ID workbooks
- How to monitor your Microsoft 365 MFA setup using Entra ID workbooks
- How to audit for app permission threats with Microsoft Entra workbooks
- Conditional Access Gap Analyzer workbook in Microsoft Entra ID
-
Exchange Online administration
- How to change deleted items retention for Exchange Online mailboxes
- How to change the branding of clutter notifications in Exchange Online
- How to configure message delivery restrictions for Exchange Online mailboxes
- How to configure moderated recipients in Exchange Online
- How to create user mailboxes in Exchange Online
- How to enable and disable MAPI for a mailbox in Exchange Online
- How to enable or disable Outlook on the web for a mailbox in Exchange Online
- How to manage mail contacts in Exchange Online
- How to manage permissions for recipients in Exchange Online
- How to manage resource mailbox in Exchange Online
- How to save sent items in a delegators mailbox in Exchange Online
- How to create and edit shared mailboxes in Exchange Online
- How to add or remove email address for a mailbox in Exchange Online
- How to configure email forwarding for a mailbox in Exchange Online
- How to convert a mailbox in Exchange Online
- How to delete or restore user mailboxes in Exchange Online
- How to manage user mailboxes in Exchange Online
-
Exchange Online groups
- Create and manage groups in Exchange admin center in Exchange Online
- How to create and manage distribution list groups in Exchange Online
- How to create and manage dynamic distribution list groups in Exchange Online
- How to create distribution group naming policy in Exchange Online
- How to manage guest access to Microsoft 365 groups in Exchange Online
- How to manage role groups in Exchange Online
- How to override the distribution group naming policy in Exchange Online
- How to view members of a distribution group in Exchange Online
-
Microsoft Teams
-
Public Folders
- Create public folder calendar in Exchange Online
- How to restore deleted public folder in Exchange Online
- How to setup public folders in new organization
- Migrate public folders to Microsoft 365 groups in Exchange Online
- Recover deleted public folder mailbox in Exchange Online
- How to mail-enable and mail-disable public folders in Exchange Online