๐Ÿ” Dashboard๐Ÿ“ก Pulseโœ‰๏ธ Inbox Shield๐Ÿ›ก๏ธ BrandGuard๐Ÿข Workspace Posture๐Ÿ“‹ Compliance
Google WorkspaceMicrosoft 365OAuth Security

How to Audit Your SaaS App Permissions in M365 and Google Workspace

The average M365 tenant has 40+ third-party apps with OAuth access. Most were authorised by individual employees during free trials, product evaluations, or one-off integrations โ€” and never reviewed again. Some have read access to all email. Some have write access to all files. A few have admin-level permissions that most IT teams don't know about. Here's how to find them and what to do.

Why OAuth app sprawl is a real security risk

OAuth lets users grant third-party applications access to their Google or Microsoft account without sharing their password. The problem: the access granted is often far broader than necessary and persists indefinitely โ€” even after the user has stopped using the app, left the company, or the trial has expired.

Audit OAuth apps in Microsoft 365

Via the Microsoft Entra admin center

  1. Go to Microsoft Entra admin center โ†’ Identity โ†’ Applications โ†’ Enterprise Applications
  2. Filter by "Application type: All Applications" and review the list
  3. For each app, check: Permissions granted, Users assigned, Last sign-in activity
  4. Sort by "Last activity" โ€” apps with no activity in 90+ days are strong candidates for removal

Via Microsoft Defender for Cloud Apps

If you have M365 E5 or Defender for Cloud Apps, go to Cloud Apps โ†’ OAuth Apps. This gives you a risk score per app, permission scope breakdown, and which users have authorised it.

High-risk permission scopes to flag immediately

ScopeWhat it grantsRisk
Mail.ReadWriteRead and modify all emails in all user mailboxesCritical
Directory.ReadWrite.AllRead and write all directory data including users and groupsCritical
Files.ReadWrite.AllRead and write all files in SharePoint and OneDriveCritical
User.ReadWrite.AllCreate, update, and delete all users in the directoryCritical
Mail.ReadRead all emails in all mailboxesHigh
Calendars.ReadWriteRead and modify all calendar eventsMedium

Audit OAuth apps in Google Workspace

Via the Google Admin Console

  1. Go to admin.google.com โ†’ Security โ†’ Access and data control โ†’ API controls
  2. Click "Manage Third-Party App Access" to see all connected apps
  3. Filter by "Access type: Has access to Google data"
  4. Review the OAuth scopes column โ€” look for apps with access to Gmail, Drive, or Admin SDK
  5. Click any app to see which users have it connected and what data it can access

High-risk Google OAuth scopes

ScopeWhat it grantsRisk
https://mail.google.com/Full Gmail access โ€” read, send, delete all emailsCritical
https://www.googleapis.com/auth/driveFull Drive access โ€” read, write, delete all filesCritical
https://www.googleapis.com/auth/admin.directory.userManage users, read user info across the orgCritical
https://www.googleapis.com/auth/gmail.readonlyRead all Gmail messagesHigh
https://www.googleapis.com/auth/contactsRead and write all Google ContactsMedium

Google's verdict system: Google labels each third-party app as "Verified", "Unverified", or "Google-owned". Unverified apps have not passed Google's security review โ€” treat any unverified app with broad scopes as high-risk until proven otherwise.

What to revoke, block, or restrict

OAuth app audit checklist

Automate your OAuth app audit โ€” weekly

Workspace Posture Pro audits your M365 or Google Workspace OAuth apps every Monday and alerts you to new high-risk app authorisations, broad permission scopes, and stale app access before they become incidents.

Set Up Workspace Posture Pro โ€” $19/mo โ†’