Evaluate all pursuits performed with the application. When you suspect that an application is suspicious, we advise that you just look into the app’s name and reply area in different application shops. When checking application merchants, target the following forms of applications:This detection generates alerts for multitenant OAuth applications