Get hold of end users and admins who have granted consent to this application to confirm this was intentional as well as excessive privileges are standard. TP: If you're able to verify that the application has accessed delicate electronic mail knowledge or produced numerous unconventional calls into the Exchange workload. https://lukasygidu.bloggazzo.com/32379721/the-fact-about-new-social-app-like-facebook-that-no-one-is-suggesting