circle-exclamation
Documentation is updated to support Bsure version 2. Select version 1 in the menu if you are still running that version.

Drilldown

Give you an overview of all your appllications in Entra ID their related sign-in events

Purpose

The Applications – Drilldown report provides a detailed overview of all applications registered in Microsoft Entra ID, with a focus on actual usage.

The report helps you:

  • Understand which applications are actively used

  • Identify unused or inactive applications

  • Track end-user sign-ins and system sign-ins (service principals / managed identities)

  • Support cleanup, governance, and security reviews

By combining application metadata with sign-in activity, the report enables data-driven decisions around application lifecycle management.


What problem does this report solve?

Over time, Entra ID tenants accumulate applications that:

  • Are no longer used

  • Were created for temporary projects

  • Are used only by automation or integrations

  • Still have credentials, permissions, or owners assigned

This report consolidates usage signals into a single view, making it easier to:

  • Detect applications that can be reviewed or decommissioned

  • Distinguish between user-driven apps and system-only apps

  • Reduce security risk from dormant identities


How to use the report

1. Use slicers to narrow down the scope

The slicer menu allows you to filter applications based on usage, ownership, and sign-in behavior.

Available slicers:

  • Applications Displays the total number of applications based on the selected filters.

  • Microsoft App Filter between Microsoft-owned applications and third-party / custom applications.

  • Enabled Filter applications that are enabled or disabled for sign-in.

  • App In Use Indicates whether the application is considered in use.

    Logic:

    • No → No user sign-ins, no system sign-ins, and no SCIM configuration

    • Yes → Used by end-users or service principals / managed identities or has SCIM configured

  • User Sign-In Filter applications that have been used by end-users.

  • Latest User Sign-In Filter applications based on a specific time period for end-user sign-ins.

  • System Sign-In Filter applications that have been used by a service principal or managed identity.

  • Application Owner Filter applications where an owner is assigned in Entra ID.

  • Type Filter by service principal type (for example Application, Managed Identity, Social IdP, Legacy). Reference: https://learn.microsoft.com/en-us/entra/identity-platform/app-objects-and-service-principals?tabs=browser#service-principal-objectarrow-up-right


2. Analyse application details

The Application Details Table shows one row per application and combines configuration data with usage data, such as:

  • Application name

  • Creation date

  • Application owner

  • Enabled status

  • App in use indicator

  • User count

  • Last user sign-in

  • Last system sign-in

  • Service principal type

  • Credential and SCIM information (optional via column selector)

Use the Column Selector to customize which attributes are visible depending on your review scenario.


Typical use cases

Identify unused applications

  • Filter App In Use = No

  • Combine with Enabled = Yes

  • Review applications that may be candidates for cleanup

Review service principal usage

  • Filter System Sign-In = Yes

  • Inspect last system sign-in and service principal type

  • Validate automation and integration dependencies

Validate application ownership

  • Filter applications without an owner

  • Identify apps that require ownership assignment for governance

Support audits and security reviews

  • Identify dormant applications with active credentials

  • Validate applications with SCIM or long-lived credentials

  • Support least-privilege and lifecycle management initiatives

Last updated

Was this helpful?