If you suspect that the app is suspicious, contemplate disabling the applying and rotating credentials of all impacted accounts.Evaluate consent grants to the appliance created by people and admins. Look into all routines performed from the application, especially entry to mailbox of affiliated consumers and admin accounts.If you continue to suspec