Connect-Entra seems to give more Scopes than requested.
Describe the bug If I start a brand new PS console and connect using for example the Scope Group.Read.All... Connect-Entra -TenantId xxxx -Scopes Group.Read.All
And then look at my Context using (Get-EntraContext).Scopes it will show all available scopes assigned to the Enterprise Application Example...  and I would recommend reading a help for any of them.
Connecting to the AzureAD API and Microsoft Graph is very different and your users of the Entra PowerShell should bother with the -Scopes parameter.
I would also recommend reading this blog post.
You should avoid using the Directory.AccessAsUser.All permission. It's overprivileged permission and goes against the least privilege model suggested for Microsoft Graph (and Entra).
So your suggestion would be to create different App Registrations for different IT teams needing different -Scopes of accesses.
For example one for the Device Team with Permissions related to their needs and another for Help Desk team with Permissions related to theirs.
But what do we do in smaller companies where all in IT need to be able to perform almost all tasks in Entra/Intune. In my mind using delegated Admin Consented, Directory.AccessAsUser.All still makes sence and then focus on Roles and accesses in Entra / Intune to control what users can actually do. This is how we controlled the access when AzureAD module was used.
Because what I see happen there is a very long list of User Consent Permissions when the IT-users and Power Users read some blog and use some odd scope and just approves it.
But maybe I'm wrong when trying to avoid User Consent Permissions and it's considered "better" to have "odd" Permissions/Scopes being User Consented than Admin Consented.
@alexandair What would you say is best practice around Admin vs User consent around the Application used for Graph Access?