What Neo Can Do
User Lifecycle
User Lifecycle
Create, update, disable, enable, and delete users in Entra ID or on-prem Active Directory. Assign managers, update job titles and departments, and manage user properties — all from a single agent.
Passwords & Security
Passwords & Security
Reset passwords, unlock accounts, revoke sign-in sessions, reset MFA, and manage authentication methods. Block and unblock user sign-in. In hybrid environments, Neo makes changes on-prem and triggers Azure AD Connect sync automatically.
Licensing
Licensing
Assign and remove Microsoft 365 licenses. Look up friendly license names from SKU IDs. Works with direct Microsoft licensing, Pax8, and Partner Center.
Groups
Groups
Add and remove users from security groups, Microsoft 365 groups, distribution lists, and mail-enabled security groups. Search and list groups across Entra ID and on-prem AD. In hybrid environments, Neo automatically routes group operations to the correct directory.
Directory Roles
Directory Roles
Assign and remove Entra ID directory roles (Global Admin, Exchange Admin, User Admin, etc.). View a user’s current role assignments.
Mailboxes
Mailboxes
Convert mailboxes to shared, create new shared mailboxes, and delete shared mailboxes. Set up and remove email forwarding. Configure mailbox delegation (full access, send-as, send-on-behalf). Works with Exchange Online and on-prem Exchange Server.
Mailbox Permissions
Mailbox Permissions
Grant and revoke full access, send-as, and send-on-behalf permissions. Add and remove recipient permissions. View current mailbox permission assignments.
Conditional Access
Conditional Access
List, view, create, update, and delete Conditional Access policies. Destructive operations always require technician approval regardless of workflow settings.
Devices
Devices
View user devices in Intune. Remote wipe and retire mobile devices. Device deletion is always blocked for safety.
On-Prem Active Directory
On-Prem Active Directory
Full AD management via RMM: user and computer management, organizational units, group operations, infrastructure queries, and Entra Connect sync triggers.
Exchange Server (On-Prem)
Exchange Server (On-Prem)
All Exchange operations work on-prem too: mailbox management, permissions, recipients and contacts, distribution groups, mail flow and transport rules, address lists and policies, compliance and auditing.
Granular Permission Controls
Every agent workflow has its own permission configuration. You control exactly what the agent can and cannot do — per integration, per operation category.Microsoft Graph
8 permission groups covering users, groups, licensing, security, roles, devices, conditional access, and domains
Active Directory
6 permission groups covering users, groups, computers, OUs, infrastructure, and Entra Connect sync
Exchange
7 permission groups covering mailboxes, permissions, recipients, distribution groups, mail flow, address lists, and compliance
| Level | What the agent can do |
|---|---|
| Disabled | No access to this category |
| Read Only | Query and list operations only |
| Read / Write | Full access including create, update, and delete |
Built-in safety guardrails: Some destructive operations (like deleting a user or wiping a device) always require technician approval, even if the permission group doesn’t have it enabled. Other operations (like deleting a domain) are blocked entirely.
| Profile | Best for |
|---|---|
| Read Only | Monitoring and reporting agents |
| Helpdesk | Tier 1 agents — password resets, group changes, basic user updates |
| IT Admin | Tier 2/3 agents — user lifecycle, licensing, mailbox management |
| Full Automation | Fully autonomous agents — all operations, no approval required |
Works Everywhere
Neo supports cloud, on-prem, and hybrid Microsoft environments — configured independently per client company.| Environment | Identity | Mailbox |
|---|---|---|
| Cloud | Entra ID via Microsoft Graph API | Exchange Online via Graph + PowerShell |
| On-prem | Active Directory via RMM + PowerShell | Exchange Server via RMM + PowerShell |
| Hybrid | On-prem AD with Azure AD Connect sync | Exchange Hybrid (on-prem cmdlets + cloud routing) |
Connect Cloud Tenants
Two ways to connect Neo to customer Microsoft 365 tenants:| GDAP | Direct Consent | |
|---|---|---|
| Who consents | MSP admin, using GDAP access — no customer involvement | A tenant admin in each customer tenant |
| How Neo authenticates | Standard client_credentials (same for both) | Standard client_credentials |
| CSP enrollment required | Yes | No |
| Best for | MSPs managing many tenants — onboard without waiting for each customer’s admin | Individual tenants, or non-CSP scenarios |
GDAP (coming soon)
CSP partners can consent to Neo on behalf of customers using existing GDAP access.
Direct Consent
A tenant admin in each customer tenant consents to the Neo app directly.
Connect On-Prem Environments
On-prem
Connect on-premises Active Directory and Exchange environments via RMM.
Hybrid environments: Configure as on-prem — Neo executes operations on your domain controller and Azure AD Connect syncs changes to the cloud.
