Building a Microsoft 365 security tool — got some tough feedback, would appreciate input from admins
I’ve been working on a Microsoft 365 security tool focused on identity misconfigurations (things like MFA gaps, excessive admin roles, dormant accounts, etc.).
The core idea is:
- connect via OAuth (Entra ID)
- read tenant configuration
- highlight risky settings
- optionally help remediate them
- provide rollback option in case of mistaken operations carried out
Recently I shared it and got some strong (and fair) feedback from admins, mainly around trust and risk, not functionality.
Some of the concerns raised:
- “What stops any user in the tenant from authenticating to the app?”
- “How is admin consent handled and documented?”
- “How are enterprise app restrictions (users/groups/CA policies) expected to be configured?”
- “Where is tenant data stored, and how is isolation enforced?”
- “What guarantees are there that automated fixes won’t break things?”
None of these are unreasonable — and it made me realize that even if the implementation is secure, if the trust model isn’t clear and explicit, admins will (rightfully) reject it.
So I wanted to ask this community directly:
From your perspective as admins/security folks:
- What would you need to see before trusting a tool like this?
- What are non-negotiables when it comes to:
- OAuth apps / enterprise app access
- Graph permissions
- data storage & isolation
- How should remediation be handled? (fully manual vs staged vs automated with guardrails)
- What kind of documentation or transparency would make you comfortable enough to even test something like this?
I’m not trying to sell anything here — just trying to understand how to build this in a way that aligns with how admins actually think about risk.
Appreciate any honest feedback, even if it’s blunt.