I disagree with this argument against taking action regarding "Quick Assist": - "In case of social engineering attack, they could just ask user to install alternative remote assistance tools."Not if the user doesn't have Administrator privileges on the endpoint to be able to download and install other remote assistance tools. And even if the attacker directed the user to a malicious site to download a remote assistance tool, that is additional activity that can be detected and shutdown by firewalls and endpoint protection. It also will often make the user more suspicious in many cases.
There is still a risk that an attacker might be able to trick the user to download something from a fake site and get past your firewalls and endpoint protection and might work. But, it makes it much more difficult than simply calling someone up and tricking them to think you are "Microsoft Support" and instruct them on launching and using "Quick Assist" which the user might not even realize does.
Your general (non-Admin) personnel shouldn't have Administrator privileges. And they should seek desktop support from your company IT Support Desk, not from the vendors directly. I would recommend disabling, removing, or blocking it and using a different one that requires Administrator access (on the connector side) to use it. Administrators may still need it on their endpoints in order to get support from Microsoft in some cases. So, you might leave it on theirs if they get support from Microsoft through it.
A smaller risk elsewhere does not justify ignoring the larger risk right in front of you.