Identify and remove unauthorized services and applications across local systems, cloud platforms (AWS, Azure, GCP), and SaaS environments to eliminate unapproved, risky, or malicious background processes and shadow IT.
Given access to local systems, cloud tenant management consoles, SaaS application reports, and monitoring tools.
All unauthorized services, apps, and cloud services are identified, removed or disabled, and documented.
Get-Service | Where-Object {$_.Status -eq "Running"} | Select-Object Name, DisplayName, Status
Look for:
systemctl list-units --type=service --state=running
ps aux
Look for:
launchctl list
ps aux
Operator Note: Cross-reference running services with baseline and approved software lists.
Get-WmiObject -Class Win32_Product | Select-Object Name
dpkg -l
system_profiler SPApplicationsDataType
Look for:
Operator Note: Alert on remote access tools (AnyDesk, TeamViewer, etc.) if not approved.
Get-AzureADServicePrincipal -All $true | Select DisplayName, AppId
Look for:
Look for:
Tool | Platform | Usage |
---|---|---|
Microsoft Cloud App Security (Defender for Cloud Apps) | Azure | SaaS discovery |
Netskope | Cloud | SaaS usage monitoring |
Zscaler | Cloud | Shadow IT discovery |
Operator Note: SaaS apps added without IT knowledge pose major risk → escalate immediately.
aws resourcegroupstaggingapi get-resources
aws ec2 describe-instances
aws lambda list-functions
Look for:
Get-AzResource
Azure Portal → Resource Groups → Filter by owner / tags.
Look for:
gcloud projects list
gcloud services list --enabled
gcloud compute instances list
Look for:
Operator Note: Services with owner=unknown or missing tags should be treated as suspect.
Stop-Service -Name "ServiceName"
Set-Service -Name "ServiceName" -StartupType Disabled
sudo systemctl stop servicename
sudo systemctl disable servicename
sudo launchctl bootout system /Library/LaunchDaemons/com.unauthorized.service.plist
Remove-AzureADServicePrincipal -ObjectId <AppId>
Admin Console → Apps → Connected Apps → Remove access
aws ec2 terminate-instances --instance-ids <instance-id>
aws lambda delete-function --function-name <function-name>
Remove-AzResource -ResourceId "<resource-id>"
gcloud compute instances delete <instance-name> --zone=<zone>
Operator Note: Follow change management process when deleting cloud resources → review with owners first.
Tool | Platform | Installation | Usage |
---|---|---|---|
PowerShell | Windows | Built-in | Local service/application enumeration |
systemctl / launchctl | Linux/macOS | Native | Local service management |
Cloud CLI Tools (aws, az, gcloud) | Cross-platform | Package manager | Cloud service management |
SaaS App Management Consoles | Web | Native | Azure AD / Google Workspace app control |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Created from scratch with deep operator-focused guidance across local, cloud, and SaaS platforms | Leo |