TP: If you can affirm that inbox rule was established by an OAuth 3rd-bash application with suspicious scopes delivered from an mysterious resource, then a real constructive is indicated.Severity: Medium A non-Microsoft cloud application is utilizing a brand that was observed by a machine Finding out algorithm for being just like a Microsoft logo