Overview all activities accomplished from the app. Critique the scopes granted with the application. Critique any inbox rule action developed by the application. Evaluation any substantial importance e-mail examine activity accomplished through the application. This detection identifies an OAuth App that consented to suspicious scopes, resul