Services · Take-Over Assessment

Take-Over Assessment — you know what you are getting, before you sign.

Before an engagement handover, we capture the legacy system in a structured way — inventory, customization audit, risk evaluation. Fixed price, no surprises. You get handover-ready documentation and a clear recommendation: take over, rebuild, or drop — per component.

Structured intake Customization audit Fixed price · pricing on request Handover-ready documentation

Management · Owner

A partner switch as risk reduction — not a leap into the unknown.

A provider switch without a structured intake is the most common cause of six-figure follow-up costs. We deliver a fixed-price audit (pricing on request) that creates clarity before the contract is signed: what exists technically, who has which rights, where the risks lie — and what the handover realistically costs?

Department head · Business unit

Documented handover plan for the steering committee.

You get a handover report that holds up internally: 9-dimension intake, risk matrix with mitigation actions, customization inventory with complexity rating, security audit, and a concrete handover plan with milestones. Ready for CIO, CFO, and steering committee.

IT leadership · CIO · Solution Architect

Technical takeover list — code, ALM, customizing, integrations.

Code inventory (plugins, JavaScript, PCF, Power Fx components) with risk flags. ALM repointing to your Azure DevOps org. Customization inventory per solution with dependency graph. Integration endpoints, service accounts, secrets inventory, workflow status — fully handover-ready.

For Managing Directors · partner switch without a six-figure surprise

Fixed price invested — six-figure follow-up costs avoided (pricing on request).

The most expensive version of a provider switch is the blind flight. We make the risk visible before you sign a contract: 9-dimension intake at a fixed price, clear handover report, risk matrix with mitigation actions, and a realistic cost frame for the handover. You decide on a data basis — not on sales promises — and reduce switch risk to a calculable level.

Start take-over audit

For department heads · steering-committee-ready handover plan

A handover report that stands up in the steering committee.

A structured first engagement with documented results: 9-dimension intake, risk matrix with concrete mitigation actions, customization inventory with complexity score, security audit, data-quality samples, and a handover plan with milestones. A complete decision template for CIO, CFO, and steering committee — you do not have to build the template yourself.

Request handover plan

For IT leadership · technical code-takeover list

Code inventory, ALM repointing, and customizing inventory — fully handover-ready.

You get a technical handover package at architecture level: plugin and JavaScript inventory with function description and risk flags, PCF and Power Fx component list, solution inventory with dependency graph, ALM repointing to your Azure DevOps org with documented pipeline setup, service-account and secrets inventory, integration endpoints with connector status. No black-box handover — everything named, documented, takeable.

45-min architecture conversation

What we capture

Nine intake dimensions — complete, handover-ready.

Before an engagement handover, it must be clear what exists technically, how it is configured, who has which rights, and where the risks lie. We capture all nine dimensions in a structured way.

Tenant structure

Microsoft 365 and Dataverse environments, regions, hierarchy, links. Which tenants talk to each other, which are isolated?

Licenses

Current license assignment per user, add-ons, premium connector consumption, NCE dates, unused seats. Foundation for the renewal strategy.

Customizations

Solutions, tables, columns, relationships, forms, views, charts, dashboards. Inventory with complexity rating.

Plugins & JavaScript

Code inventory with function description, trigger configuration, dependencies, risk flags. Complete capture of all code extensions.

Workflows & flows

Classic workflows, Power Automate cloud flows, business process flows. Status (active / failed / orphaned), triggers, endpoints.

Integrations

Interfaces to third-party systems (ERP, DMS, webshops, banking). Dataverse connectors, Logic Apps, Azure Functions, direct DB access.

Data quality

Sample audit: required-field discipline, duplicates, orphaned records, owner distribution. Reality versus expected data-model state.

Security model

Security roles, business units, team logic, field-level security, record-sharing rules. Audit on consistency and compliance maturity.

Documentation status

What is documented? How current? How handover-ready? Concrete gaps that must be closed for a handover.

Three size tiers

Fixed price, matched to system complexity.

Which tier fits depends on tenant count, customization depth, and integration density. We clarify the tier in the initial conversation — binding before contract signature.

Fixed price · 1 week

SMB

Pricing on request (net)

Single tenant, manageable customizations, few integrations, clear security structure. Up to 50 users, up to 10 central customizing solutions, up to 3 external interfaces.

Most common case
Fixed price · 2 weeks

Mid-market

Pricing on request (net)

1–2 tenants, medium customization depth, several integrations, complex security model. 50–250 users, mixed plugin and flow inventory.

Fixed price · 3+ weeks

Complex / Enterprise

Pricing on request (net)

Multi-tenant setups, deep customizations, many integrations, international license mix, regulated industries. 250+ users, separate subsidiary logic, compliance requirements.

Deliverables

Four concrete delivery artifacts.

What you have in hand at the end — handover-ready, classically documented, without special tools.

1. Inventory table

Structured list of all components: solutions, tables, plugins, flows, connectors, integrations. Per entry: name, purpose, complexity, status, risk flag. Format: Excel and PDF.

2. Customization map

Visualization of the customization architecture — which component calls which, what data flows exist, where the nodes are. Format: architecture diagram as PDF and editable source (Lucid or draw.io).

3. Risk register

Severity-classified findings: technical risks (code quality, performance bottlenecks), organizational risks (knowledge concentration, documentation gaps), license and compliance risks. With recommendations per finding.

4. Take-over recommendation

One recommendation per main component: take over (clean, documented, sustainable), rebuild (not sustainable, refactoring effort higher than a rebuild), or drop (function no longer used or replaceable by standard). With effort estimate per path.

Frequently asked questions

What we clarify before every Take-Over Assessment.

Do we have to award you the engagement afterward?

No. The Take-Over Assessment is priced as a standalone and delivers handover-ready documentation. You can use it internally, hand it to another provider, or continue with us. The separation is deliberate — we want the handover decision to be made on a clean basis, not on an engagement pitch.

What happens with the previous provider?

That is your call. In open mode, we work with the previous provider (orderly handover, knowledge-transfer sessions). In discreet mode, the assessment runs without contact — access exclusively through your accounts, without informing the previous provider. Both modes are legitimate and contractually clean.

How do you handle undocumented code?

Reverse engineering: we read the code directly — plugins, JavaScript, PCF, Power Fx formulas, workflows. From the code analysis we reconstruct function, data flows, and business logic. Where code analysis is not enough (e.g., complex process logic), we propose targeted interviews or process mining — see our Knowledge Recovery offering.

Is the assessment enough to terminate the contract?

That depends on your contract with the current provider. The assessment delivers the functional and technical foundation — inventory, risk evaluation, handover readiness. The legal evaluation of contract termination is a matter for your legal counsel. We recommend running both in parallel so that you can act on the cut-off date.

Can you also evaluate custom apps outside Microsoft?

We focus on the Microsoft stack (Dynamics 365, Power Platform, Microsoft 365, Azure integrations). If the legacy system contains adjacent non-Microsoft components (e.g., SAP interface, external SaaS), we evaluate the Microsoft side and describe the interface. We do not take on pure non-Microsoft evaluations.

Related services

What fits before and after the handover.

All services

Book take-over conversation

A handover with solid ground underfoot.

30-min initial conversation — we clarify system complexity, tier classification, and mode (open or discreet). Fixed price — pricing on request. You get handover-ready documentation and a clear recommendation per component.

To take away · two materials

Factsheet and whitepaper.

Two depths for different reading needs. The factsheet is quick reference (3–5 min) and immediately downloadable. The whitepaper is market education with methodology and comparison data (15–30 min) — you receive it by email after a short request.

Factsheet · 2 pages

Take-Over Assessment factsheet

3–5 min reading time · direct download · no form

Compact overview: scope, key figures, pricing model, approach — ideal for forwarding to CFO, procurement, or business unit.

Download factsheet (PDF)

Whitepaper · 12 pages

Take-Over Assessment — deep dive

15–30 min reading time · by email on request

Methodology, comparison data, recommendation framework — material for internal argumentation toward stakeholders.