APP-07Advanced

How to Fix: Identify Unused Service Principals

Step-by-step guide to implement identify unused service principals in your Microsoft 365 environment.

15-20 minutes

Estimated Time

4

Steps

medium

Severity

Enhanced Security

Baseline Level

Why This Matters

Dormant service principals with valid credentials are invisible persistence mechanisms. Attackers can use forgotten apps with stale credentials to maintain access long after initial compromise detection.

Prerequisites

  • 1Global Administrator or appropriate admin role in Microsoft Entra ID
  • 2Access to Microsoft Entra admin center (entra.microsoft.com)
  • 3Microsoft Entra ID P2 license

Expected Configuration

  • Service principals with no sign-in activity for 90+ days are identified
  • Unused service principals are disabled or removed
  • Exceptions are documented for service accounts with infrequent use

Remediation Steps

1

Audit Current Applications

Review the applications in your Entra ID tenant.

  • Navigate to Microsoft Entra admin center
  • Go to Applications > Enterprise applications
  • Review app registrations and permissions
2

Identify Required Changes

Determine which applications need modification.

  • Compare against expected configuration
  • Identify risky or non-compliant apps
  • Plan remediation approach
3

Apply Remediation

Make the necessary changes to application configurations.

  • Update consent settings as needed
  • Modify application permissions
  • Configure app governance policies
4

Verify Compliance

Confirm applications meet security requirements.

  • Run TrueConfig scan
  • Review any remaining findings
  • Document changes made

Related Resources

Automate Your Security Configuration

TrueConfig continuously monitors your Microsoft 365 environment and can automatically fix configuration drift. Start your free trial today.

Start Free Trial