Skip to content

Commit 11d6d85

Browse files
authored
Improve README formatting and content clarity
Reformatted the list of Azure AD application auditing tools for clarity and added details to the Audit-AppDelegationRisks.ps1 section.
1 parent c35769c commit 11d6d85

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

README.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,11 @@ PowerShell-Scripts/
2222
│ └── sendmail.py
2323
│ └── Check-AllPowerfulAzurePerms3.ps1
2424
│ └── enum_entra_admins.ps1 & find_disabled_ad_accounts.ps1
25-
│ └── list_all_applications2.ps1 & BulkMultiPermExploitability2.ps1 & Profile-App.ps1 & Audit-AppDelegationRisks.ps1
25+
│ └── ** Azure AD application auditing tools **
26+
list_all_applications2.ps1
27+
BulkMultiPermExploitability2.ps1
28+
Profile-App.ps1
29+
Audit-AppDelegationRisks.ps1
2630
│ └── Audit-AllUsersRolePerms.ps1
2731
├── On-Prem Active Directory/
2832
│ └── ad_object_permissions3.ps1 (uses ActiveDirectory module (ADWS))
@@ -189,7 +193,7 @@ Admins should investigate these files and clean up their AD/AAD as needed.
189193
- **Frequency:** Run **ad‑hoc** during investigations, risk reviews, or onboarding/offboarding of third‑party apps.
190194

191195
### `Audit-AppDelegationRisks.ps1`
192-
- **Purpose:** Focuses on delegated OAuth2 grants.
196+
- **Purpose:** Focuses on delegated OAuth2 grants. Profiles a single service principal to audit delegated permission grants and identify high‑risk delegated scopes (e.g., mail, calendars, device management).
193197
- **Use Case:** Flags **tenant‑wide consents** with risky scopes and resolves who can access the app.
194198
- **Frequency:** Run **ad‑hoc** when reviewing suspicious or high‑risk apps.
195199

0 commit comments

Comments
 (0)