Contact Us

Microsoft SCOUT Health Check

Our Microsoft SCOUT Health Check provides a report of cost, usage, wastage and optimisation opportunities, with recommendations tailored to your organisation’s Azure and 365 environments.

To request a free Microsoft 365 and Azure cost optimisation health check, complete our short form.

This field is for validation purposes and should be left unchanged.

Microsoft SCOUT - FAQs

What should I expect?

The automated self-service process will guide you through setting up a connection between the platform and your environment.

Who needs to be involved?

You’ll need the Global Admin and (if on-boarding Azure) the Azure Subscription and Reservation Order Owner for your business.

What data does the platform provide?

The platform is an analytical tool that provides optimisation recommendations on Microsoft 365 and Microsoft Azure customer environments.

How long does the intake period last?

For Microsoft 365, it takes up to 14 days to ingest the data; for Azure, it’s 4-5 days.

Who is able to see the data?

That’s up to you. Your organisation’s users can be assigned ‘personas’ to delineate the insights they have access to.

How soon before I can see insights?

Optimisation recommendations will be available 1 week from on-boarding for Azure tenants, and 2-3 weeks from on-boarding for Microsoft 365 tenants. We recommend these time frames to ensure accuracy, data inclusion, and a more detailed view.

Where is data stored?

On-boarded customer data is stored in a database in Azure.

How is data security managed?

The Azure build incorporates Application Gateway with WAF, data encryption in transit and at rest.

How are bugs and issues reported?

Users can report bugs and issues directly from the platform.

What access is required?

The platform requires read-only access exclusively.

What security measures are taken?

Data is encrypted in-transit using TLS1.2, and at-rest with AES. We use best-in-class database encryption, as well as implementing data segregation and role separation to enforce the principle of least privilege across our multi-tenant architecture.

Access is controlled via tight access control technical policies and strong authentication, with data masking available within the product where required. We have standard backup and data retention practices, and we proactively monitor component and system status.