Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management service used by many organizations to manage user authentication and authorization for their applications and services. However, with the increasing number of cloud-based applications and services, it can be challenging for IT administrators to keep track of which applications are being used and whether they are authorized by the organization.
One issue that can arise is the use of illicit or unauthorized applications in Azure AD. These are applications that have been installed or granted permissions by users without proper approval or oversight, and can pose a security risk to the organization. To help identify and remediate these applications, Azure AD provides several tools and features.
- Azure AD Audit Logs: Azure AD audit logs can provide valuable information about the applications that users are accessing and using. To view audit logs, go to the Azure AD portal and navigate to Audit logs under Monitoring. You can filter logs by activity type, date range, and user or application name. Look for activities related to app consent grants or app installations to identify unauthorized applications.
- Azure AD App Permissions: Azure AD provides a list of all applications that have been granted permissions by the organization. To view this list, go to the Azure AD portal and navigate to Enterprise applications. You can filter applications by status, category, and user or group assignment. Look for applications that have been granted permissions without proper approval or oversight.
- Microsoft Cloud App Security: Microsoft Cloud App Security is a cloud access security broker (CASB) service that can help organizations discover and control the use of cloud-based applications and services. To use Cloud App Security, you must first enable it in your Azure AD tenant. Once enabled, Cloud App Security can scan your Azure AD environment to identify illicit applications and provide recommendations for remediation.
- Azure AD Identity Protection: Azure AD Identity Protection is a feature that can help identify and remediate security risks related to user identities in Azure AD. Identity Protection can detect suspicious sign-in activity, risky user behavior, and potential security issues related to applications and services. To use Identity Protection, you must first enable it in your Azure AD tenant.
- Azure AD Privileged Identity Management: Azure AD Privileged Identity Management is a feature that can help organizations manage and control access to privileged roles and resources in Azure AD. Privileged Identity Management can help prevent unauthorized access to applications and services by enforcing access policies and providing auditing and reporting capabilities.
In summary, there are several tools and features available in Azure AD that can help organizations identify and remediate illicit applications. By regularly monitoring your Azure AD environment and taking proactive steps to prevent unauthorized access, you can help ensure the security and integrity of your organization’s data and applications.

