This detection identifies when an application consented to suspicious OAuth scope and made a higher volume of uncommon e-mail look for activities, such as e mail search for distinct content in the Graph API.Validate whether or not the application is critical to your Firm ahead of thinking of any containment steps. Deactivate the application employi