Critique all activities accomplished because of the app. Assessment the scopes granted with the app. Critique any inbox rule action created from the application. Evaluation any superior value e mail examine action performed through the application. TP: If you can confirm that the OAuth application is delivered from an unfamiliar source, and