Hello @Aureli Aurel ,
Thank you for posting your question to Microsoft Q&A,
Running third-party app depends on whether it has the trusted source or not and what level of system or account access it requests. Third-party apps outside the Microsoft Store aren’t automatically verified by Microsoft, so you should check the publisher’s reputation and digital signature before installing.
- About permissions and how these apps interact with Windows and Microsoft cloud services
Third-party apps that request broad or unusual permissions—especially those outside the Microsoft Store—should always be treated with caution.
- Windows does not validate permissions for apps installed outside the Store, so you rely on the publisher’s reputation and digital signature.
- If the app accesses files, network, or devices, those permissions can’t be managed through standard Microsoft 365 or Entra controls unless the app integrates with Microsoft identity services.
To monitor and control app activity:
- Use Microsoft Defender for Endpoint or Defender SmartScreen to check for unsafe or malicious behavior.
- Microsoft Purview can help enforce Data Loss Prevention (DLP) and compliance rules if the app interacts with corporate or cloud data.
- Microsoft Entra ID (Azure AD) can apply Conditional Access or App consent policies when the app is registered or uses OAuth for sign-in.
If the app doesn’t authenticate with Entra ID, it operates outside of Microsoft’s cloud governance boundary and cannot be managed or restricted directly.
- Microsoft Identity Manager and Microsoft Authenticator can secure your sign-ins and accounts, but don’t guarantee a third-party app’s safety.
For keeping your PC and cloud service apps safe when using third-party app, I recommend Install only from trusted sources, avoid granting excessive permissions, and test isolated before using it with corporate data.
Hope this helps! If my answer was helpful - kindly follow the instructions here so others with the same question can benefit as well.