Verify first-party Microsoft applications in sign-in reports - Azure (2024)

  • Article

Note

Was this article helpful? Your input is important to us. Please use the Feedback button on this page to let us know how well this article worked for you or how we can improve it.

When you review your sign-in reports, you might see an application in your sign-in report that you don't own and want to identify. You also might wonder how you signed in to that app, if you don't remember accessing the app.

Here's an example sign-in report:

Verify first-party Microsoft applications in sign-in reports - Azure (1)

For example, when you access learn.microsoft.com, the application that's shown in the sign-in log may show dev-rel-auth-prod, but this isn't descriptive of learn.microsoft.com.

Although the apps that are listed in sign-in reports are owned by Microsoft and aren't suspicious applications, you can determine whether Microsoft owns a Microsoft Entra service principal that's found in your Microsoft Entra logs.

Note

First-party Microsoft applications don't always result in a service principal that's created in your tenant. In this case, you'll likely continue to see the applications in your sign-in reports. This article lists the application IDs of commonly used Microsoft applications.

Verify a first-party Microsoft service principal in your Microsoft Entra tenant

  1. Open the list of enterprise applications in Microsoft Entra ID.

  2. In the navigation pane, select All applications.

  3. In the Application Type drop-down list, select Microsoft Applications, and then select Apply. All applications that are listed here are owned by Microsoft.

    Verify first-party Microsoft applications in sign-in reports - Azure (2)

  4. In the search box below the drop-down lists, filter the Microsoft application list by adding a specific Display Name or Application ID.

    Verify first-party Microsoft applications in sign-in reports - Azure (3)

  5. Select the desired app, and then select Properties in the navigation pane to view the listed app's properties. Verify that you see the following error message:

    You can't delete this application because it's a Microsoft first party application.

    Verify first-party Microsoft applications in sign-in reports - Azure (4)

Verify a first-party Microsoft service principal through PowerShell

  1. Open the Azure Active Directory module in PowerShell.

  2. In the PowerShell module, enter the following cmdlet:

    Get-AzureADServicePrincipal -Filter "DisplayName eq '<display-name>'" | fl *

    Replace <display name> with the app's actual display name.

    Note

    Azure AD and MSOnline PowerShell modules are deprecated as of March 30, 2024. To learn more, read the deprecation update. After this date, support for these modules are limited to migration assistance to Microsoft Graph PowerShell SDK and security fixes. The deprecated modules will continue to function through March, 30 2025.

    We recommend migrating to Microsoft Graph PowerShell to interact with Microsoft Entra ID (formerly Azure AD). For common migration questions, refer to the Migration FAQ. Note: Versions 1.0.x of MSOnline may experience disruption after June 30, 2024.

  3. Review the result's AppOwnerTenantId.

    Verify first-party Microsoft applications in sign-in reports - Azure (5)

    In the screenshot, f8cdef31-a31e-4b4a-93e4-5f571e91255a is the Microsoft Service's Microsoft Entra tenant ID.

Application IDs of commonly used Microsoft applications

The following table lists some, but not all, first-party Microsoft applications. You may see these applications in the Sign-ins report in Microsoft Entra ID.

Application NameApplication IDs
ACOM Azure Website23523755-3a2b-41ca-9315-f81f3f566a95
ADIbizaUX74658136-14ec-4630-ad9b-26e160ff0fc6
AEM-DualAuth69893ee3-dd10-4b1c-832d-4870354be3d8
App Service7ab7862c-4c57-491e-8a45-d52a7e023983
ASM Campaign Servicing0cb7b9ec-5336-483b-bc31-b15b5788de71
Azure Advanced Threat Protection7b7531ad-5926-4f2d-8a1d-38495ad33e17
Azure Data Lakee9f49c6b-5ce5-44c8-925d-015017e9f7ad
Azure Lab Services Portal835b2a73-6e10-4aa5-a979-21dfda45231c
Azure Portalc44b4083-3bb0-49c1-b47d-974e53cbdf3c
Azure SQL Database022907d3-0f1b-48f7-badc-1ba6abab6d66
AzureSupportCenter37182072-3c9c-4f6a-a4b3-b3f91cacffce
Bing9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7
ContactsInferencingEmailProcessor20a11fe0-faa8-4df5-baf2-f965f8f9972e
CPIM Servicebb2a2e3a-c5e7-4f0a-88e0-8e01fd3fc1f4
CRM Power BI Integratione64aa8bc-8eb4-40e2-898b-cf261a25954f
Dataverse00000007-0000-0000-c000-000000000000
Enterprise Roaming and Backup60c8bde5-3167-4f92-8fdb-059f6176dc0f
Exchange Admin Center497effe9-df71-4043-a8bb-14cf78c4b63b
FindTimef5eaa862-7f08-448c-9c4e-f4047d4d4521
Focused Inboxb669c6ea-1adf-453f-b8bc-6d526592b419
GroupsRemoteApiRestClientc35cb2ba-f88b-4d15-aa9d-37bd443522e1
HxServiced9b8ec3a-1e4e-4e08-b3c2-5baf00c0fcb0
IAM Supportabilitya57aca87-cbc0-4f3c-8b9e-dc095fdc8978
IrisSelectionFrontDoor16aeb910-ce68-41d1-9ac3-9e1673ac9575
MCAPI Authorization Prodd73f4b35-55c9-48c7-8b10-651f6f2acb2e
Media Analysis and Transformation Service944f0bd1-117b-4b1c-af26-804ed95e767e
0cd196ee-71bf-4fd6-a57c-b491ffd4fb1e
Microsoft 365 Security and Compliance Center80ccca67-54bd-44ab-8625-4b79c4dc7775
Microsoft 365 Support Serviceee272b19-4411-433f-8f28-5c13cb6fd407
Microsoft App Access Panel0000000c-0000-0000-c000-000000000000
Microsoft Approval Management65d91a3d-ab74-42e6-8a2f-0add61688c74
38049638-cc2c-4cde-abe4-4479d721ed44
Microsoft Authentication Broker29d9ed98-a469-4536-ade2-f981bc1d605e
Microsoft Azure CLI04b07795-8ddb-461a-bbee-02f9e1bf7b46
Microsoft Azure PowerShell1950a258-227b-4e31-a9cf-717495945fc2
MicrosoftAzureActiveAuthn0000001a-0000-0000-c000-000000000000
Microsoft Bing Searchcf36b471-5b44-428c-9ce7-313bf84528de
Microsoft Bing Search for Microsoft Edge2d7f3606-b07d-41d1-b9d2-0d0c9296a6e8
Microsoft Bing Default Search Engine1786c5ed-9644-47b2-8aa0-7201292175b6
Microsoft Defender for Cloud Apps3090ab82-f1c1-4cdf-af2c-5d7a6f3e2cc7
Microsoft Docs18fbca16-2224-45f6-85b0-f7bf2b39b3f3
Microsoft Dynamics ERP00000015-0000-0000-c000-000000000000
Microsoft Edge Insider Addons Prod6253bca8-faf2-4587-8f2f-b056d80998a7
Microsoft Exchange ForwardSync99b904fd-a1fe-455c-b86c-2f9fb1da7687
Microsoft Exchange Online Protection00000007-0000-0ff1-ce00-000000000000
Microsoft Exchange ProtectedServiceHost51be292c-a17e-4f17-9a7e-4b661fb16dd2
Microsoft Exchange REST API Based Powershellfb78d390-0c51-40cd-8e17-fdbfab77341b
Microsoft Exchange Web Services47629505-c2b6-4a80-adb1-9b3a3d233b7b
Microsoft Formsc9a559d2-7aab-4f13-a6ed-e7e9c52aec87
Microsoft Graph00000003-0000-0000-c000-000000000000
Microsoft Intune Web Company Portal74bcdadc-2fdc-4bb3-8459-76d06952a0e9
Microsoft Intune Windows Agentfc0f3af4-6835-4174-b806-f7db311fd2f3
Microsoft Officed3590ed6-52b3-4102-aeff-aad2292ab01c
Microsoft Office 365 Portal00000006-0000-0ff1-ce00-000000000000
Microsoft Office Web Apps Service67e3df25-268a-4324-a550-0de1c7f97287
Microsoft Online Syndication Partner Portald176f6e7-38e5-40c9-8a78-3998aab820e7
Microsoft password reset service93625bc8-bfe2-437a-97e0-3d0060024faa
Microsoft Power BI871c010f-5e61-4fb1-83ac-98610a7e9110
Microsoft Storefronts28b567f6-162c-4f54-99a0-6887f387bbcc
Microsoft Stream Portalcf53fce8-def6-4aeb-8d30-b158e7b1cf83
Microsoft Substrate Management98db8bd6-0cc0-4e67-9de5-f187f1cd1b41
Microsoft Supportfdf9885b-dd37-42bf-82e5-c3129ef5a302
Microsoft Teams1fec8e78-bce4-4aaf-ab1b-5451cc387264
Microsoft Teams Servicescc15fd57-2c6c-4117-a88c-83b1d56b4bbe
Microsoft Teams Web Client5e3ce6c0-2b1f-4285-8d4b-75ee78787346
Microsoft Whiteboard Services95de633a-083e-42f5-b444-a4295d8e9314
O365 SkypeSpaces Ingestion Servicedfe74da8-9279-44ec-8fb2-2aed9e1c73d0
O365 Suite UX4345a7b9-9a63-4910-a426-35363201d503
Office 365 Exchange Online00000002-0000-0ff1-ce00-000000000000
Office 365 Management00b41c95-dab0-4487-9791-b9d2c32c80f2
Office 365 Search Service66a88757-258c-4c72-893c-3e8bed4d6899
Office 365 SharePoint Online00000003-0000-0ff1-ce00-000000000000
Office Delve94c63fef-13a3-47bc-8074-75af8c65887a
Office Online Add-in SSO93d53678-613d-4013-afc1-62e9e444a0a5
Office Online Client Microsoft Entra ID- Augmentation Loop2abdc806-e091-4495-9b10-b04d93c3f040
Office Online Client Microsoft Entra ID- Lokib23dd4db-9142-4734-867f-3577f640ad0c
Office Online Client Microsoft Entra ID- Maker17d5e35f-655b-4fb0-8ae6-86356e9a49f5
Office Online Client MSA- Lokib6e69c34-5f1f-4c34-8cdf-7fea120b8670
Office Online Core SSO243c63a3-247d-41c5-9d83-7788c43f1c43
Office Online Searcha9b49b65-0a12-430b-9540-c80b3332c127
Office.com4b233688-031c-404b-9a80-a4f3f2351f90
Office365 Shell WCSS-Client89bee1f7-5e6e-4d8a-9f3d-ecd601259da7
OfficeClientService0f698dd4-f011-4d23-a33e-b36416dcb1e6
OfficeHome4765445b-32c6-49b0-83e6-1d93765276ca
OfficeShredderWacClient4d5c2d63-cf83-4365-853c-925fd1a64357
OMSOctopiPROD62256cef-54c0-4cb4-bcac-4c67989bdc40
OneDrive SyncEngineab9b8c07-8f02-4f72-87fa-80105867a763
OneNote2d4d3d8e-2be3-4bef-9f87-7875a61c29de
Outlook Mobile27922004-5251-4030-b22d-91ecd9a37ea4
Partner Customer Delegated Admin Offline Processora3475900-ccec-4a69-98f5-a65cd5dc5306
Password Breach Authenticatorbdd48c81-3a58-4ea9-849c-ebea7f6b6360
PeoplePredictions35d54a08-36c9-4847-9018-93934c62740c
Power BI Service00000009-0000-0000-c000-000000000000
Schedulingae8e128e-080f-4086-b0e3-4c19301ada69
SharedWithMeffcb16e8-f789-467c-8ce9-f826a080d987
SharePoint Online Web Client Extensibility08e18876-6177-487e-b8b5-cf950c1e598c
Signupb4bddae8-ab25-483e-8670-df09b9f1d0ea
Skype for Business Online00000004-0000-0ff1-ce00-000000000000
SpoolsProvisioning61109738-7d2b-4a0b-9fe3-660b1ff83505
Sticky Notes API91ca2ca5-3b3e-41dd-ab65-809fa3dffffa
Substrate Context Service13937bba-652e-4c46-b222-3003f4d1ff97
SubstrateDirectoryEventProcessor26abc9a8-24f0-4b11-8234-e86ede698878
Substrate Search Settings Management Servicea970bac6-63fe-4ec5-8884-8536862c42d4
Sway905fcf26-4eb7-48a0-9ff0-8dcc7194b5ba
Transcript Ingestion97cb1f73-50df-47d1-8fb0-0271f2728514
Universal Store Native Client268761a2-03f3-40df-8a8b-c3db24145b6b
Viva Engage (formerly Yammer)00000005-0000-0ff1-ce00-000000000000
WeveEngine3c896ded-22c5-450f-91f6-3d1ef0848f6e
Windows Azure Active Directory00000002-0000-0000-c000-000000000000
Windows Azure Security Resource Provider8edd93e1-2103-40b4-bd70-6e34e586362d
Windows Azure Service Management API797f4846-ba00-4fd7-ba43-dac1f8f63013
WindowsDefenderATP Portala3b79187-70b2-4139-83f9-6016c58cd27b
Windows Search26a7ee05-5602-4d76-a7ba-eae8b7b67941
Windows Spotlight1b3c667f-cde3-4090-b60b-3d2abd0117f0
Windows Store for Business45a330b1-b1ec-4cc1-9161-9f03992aa49f
Yammer Webc1c74fed-04c9-4704-80dc-9f79a2e515cb
Yammer Web Embede1ef36fd-b883-4dbf-97f0-9ece4b576fc6

Application IDs of Microsoft tenant-owned applications

The following table lists some, but not all, Microsoft tenant-owned applications (tenant ID: 72f988bf-86f1-41af-91ab-2d7cd011db47).

Application NameApplication IDs
Graph Explorerde8bc8b5-d9f9-48b1-a8ad-b748da725064
Microsoft Graph Command Line Tools14d82eec-204b-4c2f-b7e8-296a70dab67e
OutlookUserSettingsConsumer7ae974c5-1af7-4923-af3a-fb1fd14dcb7e
Vortex [wsfed enabled]5572c4c0-d078-44ce-b81c-6cbf8d3ed39e

More information

For more information, see Sign-in activity reports in the Microsoft Entra admin center.

If you have questions or need help, create a support request, or ask Azure community support. You can also submit product feedback to Azure feedback community.

Verify first-party Microsoft applications in sign-in reports - Azure (2024)
Top Articles
Latest Posts
Article information

Author: Wyatt Volkman LLD

Last Updated:

Views: 5776

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.