Use the next common guidelines when investigating any kind of alert to gain a clearer idea of the prospective threat in advance of applying the advised motion.This detection identifies an OAuth App that consented to suspicious scopes, produces a suspicious inbox rule, and afterwards accessed consumers mail folders and messages throughout the Graph