O365 ApplicationImpersonation Role Assigned
Account Manipulation, Additional Email Delegate Permissions
Account Manipulation, Additional Email Delegate Permissions
Compromise Accounts, Cloud Accounts, Modify Authentication Process, Multi-Factor Authentication
Disable or Modify Tools, Impair Defenses
Account Access Removal
Data Destruction, File Deletion, Indicator Removal