15.5 Revocation and Cleanup
Revocation and Cleanup
Required role: Application Administrator or Cloud Application Administrator.
Action 1: Remove the malicious application from the tenant
Option A: Delete the enterprise application (affects all users).
Navigate to Entra ID → Enterprise Applications → search for the application by name or AppId → Properties → Delete.
Blast radius: All consents to this application are revoked for all users. The application can no longer access any data in the tenant. If any legitimate user was using this application for a legitimate purpose: they lose access. Tenant-wide for this application.
Rollback: The application can be restored from soft-delete within 30 days (Entra ID → Deleted applications).
Option B: Remove individual user consents (if some consents are legitimate).
Navigate to Entra ID → Enterprise Applications → [App] → Users and groups → remove the specific users who were phished.
Blast radius: Only the removed users’ consents are revoked. Other users retain their consent. Per-user for this application.
For this incident: use Option A. “Microsoft Security Update Tool” is entirely malicious — no legitimate users should have consented. Delete the enterprise application.
Action 2: Verify removal
| |
Expected: Zero rows, or rows with ResultType indicating failure (the application’s tokens are invalidated after enterprise application deletion).
| |
Action 3: Block the application proactively
Prevent the application from being re-consented if the phishing campaign is still active:
| |
Blast radius: The application cannot be consented by any user in the tenant. No impact on other applications. Per-application.
Action 4: Notify affected users
Send a communication (via a channel other than email if mailbox integrity is uncertain) to the 12 affected users: “Your account was targeted by a consent phishing attack. A malicious application was granted access to your email and files. The application has been removed. As a precaution: review your recent email for any suspicious activity, check your sent folder for emails you did not send, and report any unusual activity to IT immediately.”
Compliance mapping: NIST CSF RS.CO-2 (Information shared with stakeholders). ISO 27001 A.5.26 (Response to incidents).
Subsection artifact: The revocation procedure with verification queries. This is the revocation section of your OAuth investigation playbook.
Knowledge check
Post-revocation monitoring
After deleting the enterprise application, monitor for:
Re-consent attempts. If the phishing campaign is still active, additional users may click the consent link. The consent will fail (the application is deleted), but the attempt is logged:
| |
Each failed consent attempt identifies a user who clicked the phishing link — they were targeted and should receive awareness communication, even though the consent failed.
Application re-registration. A sophisticated attacker may register a new application with a different AppId but similar name and permissions. Monitor:
| |
New applications with names similar to the deleted malicious application warrant immediate investigation. If registered from an external tenant: block the new AppId proactively.
Try it yourself
After the revocation exercise: run both monitoring queries against your tenant. Are there any failed consent attempts in the last 48 hours? Any new application registrations with security-themed names? In a production environment, these queries should run as scheduled analytics rules — providing ongoing monitoring for consent phishing recurrence.
What you should observe
In a lab: likely zero results (no active phishing campaign). In production: there may be legitimate failed consents (users clicking stale links) or new application registrations from IT. The exercise builds familiarity with the monitoring queries so you can deploy them quickly during a real consent phishing incident.
Check your understanding
1. After deleting the enterprise application, you check AADServicePrincipalSignInLogs and see new sign-in attempts from the same AppId with ResultType = failure. What does this mean?