Ms Dynamics 365 Pricing

Breakdown of the pricing for Microsoft Dynamics 365 applications that could suit agricultural supplies, servicing, and equipment business:

Dynamics 365 Business Central:
• Essentials: £70 per user/month
• Includes core functionalities such as finance, sales, purchasing, and inventory management.
• Premium: £100 per user/month
• Offers all Essentials features plus service management and manufacturing capabilities.
• Team Members: £8 per user/month
• Designed for users who need light access, such as viewing reports or updating specific data.

Note: Prices are in GBP from USD and may vary based on your region and specific requirements. 

Dynamics 365 Field Service:
• Standard License: £105 per user/month
• Provides comprehensive field service management, including work order management, scheduling, and mobile capabilities.
• Contractor License: £50 per user/month
• Tailored for external frontline technicians, offering essential tools for work order management.

August 25, 2025

Menu

CAVEAT

Disclaimer:

This content is United Kingdom-focused and is provided for general informational and discussion purposes only—primarily as my personal notes to self. It does not constitute professional financial, tax, legal, or any other advice. Remember, this is the internet; information can be out of date, or downright wrong! While efforts have been made to ensure accuracy, regulations and individual circumstances vary. Readers must seek their own independent professional advice tailored to your specific situation. It is your responsibility to conduct all necessary inquiries and due diligence, including consulting relevant professionals and authorities, to ensure compliance with applicable laws and regulations. The author(s) accept no liability for any reliance placed on this information or for any actions taken based on it.

Network menu is here

Microsoft Dynamics

  1. Pricing
  2. An idea of costs
  3. Analysis of 30k quote
  4. Setup

Transition

  1. Termination
  2. Gifting Process
  3. Doc templates / guides
  4. Gift Vs Buy
  5. Shares buy back
  6. Shares buy back process
  7. Buy back docs
  8. Company Pension Contributions

Systems Generation

  1. A.I. Response 1
  2. A.I. Response 2 from 1
  3. Core Systems and Their Integrations
  4. Systems & Integrations by category
  5. Systems & integrations & integrations with integrations & systems check list
  6. Other accounting systems
  7. Workshop management integration
  8. Systems with POS as well as Workshop
  9. Systems pricing before integrations
  10. Systems pricing with integrations
  11. Upgrading our existing Sage system
  12. Sage business Cloud data transfer out
  13. Jobber
  14. ServiceM8
  15. Systems not yet mentioned in other words what else is there aside from Giles?
  16. SAP Business One
  17. SAP Details Part 1
  18. SAP Details Part 2 - expensive, but may be worth an enquiry
  19. OGL comparison
  20. Satellite internet

August 25, 2025

Md Apps

Best Markdown Writing Apps (Alternatives to Ulysses)

1. Typora Typora A seamless and elegant Markdown editor that provides a live preview feature, allowing you to focus on content creation without distraction. Read more on Said Hasim

3. Obsidian Obsidian A versatile note-taking app that supports Markdown and allows for extensive customization through plugins, making it suitable for creating a personal knowledge base. Read more on The Verge

5. Bear Bear A beautiful and minimalistic writing app that supports Markdown, offering a range of themes and a focus mode to enhance creativity and focus. Read more on The Verge

August 25, 2025

M I T M Read This

- imagine a crook is trying to mug you, hoping you won’t notice until it’s too late. So we aspire to being Crocodile Dundee (youtube link), bearing in mind he defends without attacking (much). Incidentally in my opinion our best defence is to dump external (anything from the internet) email and use practically a n y t h i n g else. That would also kill off the spam problem, for a while or even permanently, also phishing’s prime method and phishing is the greatest cause of grief, arguably. Having your email identity spoofed is VERY frustrating, to put it mildly. Get this wrong and your computer can be used by crooks for their own purposes, such as sending spam and/or attacking other computers, without you knowing, for ever. Hundreds of thousands of computers around the world are in use as such, while the owners remain blissfully oblivious.

MITM stands for Man In The middle attacks.

Remember all that follows is my view of it all. I am NOT a cyber tech, but I have to work with all these things to be in business - and so do you whether you are aware of it or not. Can you imagine running a business and not being aware of all that follows? Most do.

Another expression or two are attack vector” and attack surface”.
When all’s said and done those are really a bit vague unless you are a cyber specialist. However, jargon has its place because it facilitates communications between those who know. Like a different language. So we can pick up a few of the terms to help us along. I am going to copy the list of common attack vectors from the wikipedia attack surface entry below.

 Vector (malware)

Attack vectors include user input fields, protocolsinterfaces, and services. There are over 100 attack vectors and breach methods that hackers can use. Here are some of the most common attack vectors: https://en.wikipedia.org/wiki/Attack_vector

Some common attack vectors:

exploiting buffer overflows; this is how the Blaster worm was able to propagate.

exploiting webpages and email supporting the loading and subsequent execution of JavaScript or other types of scripts without properly limiting their powers.

exploiting networking protocol flaws to perform unauthorized actions at the other end of a network connection.

phishing: sending deceptive messages to end users to entice them to reveal confidential information, such as passwords.

What are these exactly?

I have split them into two types, and initially put misconfiguration” in both lists and then changed my mind. Then I will/have add my own take (attempt) on who or what needs our attention for each. All general of course, for example anyone can suffer a DDoS attack.

Attack vectors

HUMAN weakness

Compromised credentials - user attitude and attention

Weak and stolen passwords - user haveIbeenpwned.com

Malicious insiders - beware traitors

Missing or poor encryption - owner and users

Misconfiguration - owner and users (byod)

Ransomware - owner and user training

Phishing - user training, don’t click links!”

Trust relationships - beware MITM attacks.

COMPUTER weakness

Javascript Threats (Magecart) - web site owners

Distributed Denial of Service (DDoS) - enterprise service providers

Brute force attack - server admins

Zero-day vulnerabilities - software developers

Misconfiguration - once set, system issues.

Attack surfaces

That’s a long list, yet short in so far as it gives us the context of what we have to be aware of as regards common” ones. Elsewhere in my pages here you can see I have a narrow focus on ransomeware, which is because there is no real time (that means right now, immediate, instant) defence yet. Zero-day is a bit worrying, but we have to rely on our confidence in our suppliers - which means that also needs our attention.

ok so that’s what vectors” look like and now also copied from the wikipedia entry for Attack surface entry:

An attack surface [4] composition can range widely between various organizations, yet often identify many of the same elements, including:

Autonomous System Numbers (ASNs) - vast numbers of i p addresses are managed by typical ASNs, as in hundreds of thousands and they supply the suppliers that supply us.

IP Address and IP Blocks - still huge blocks of i p addresses, but managed by our direct suppliers, such as Heart Internet or 123-Reg.

Domains and Sub-Domains (direct and third-parties) - The registrant (i.e. you) so we manage registration details and maybe DNS.

SSL Certificates and Attribution - We validate and buy from them.

WHOIS Records, Contacts, and History - We manage these.

Host and Host Pair Services and Relationship unknown.

Internet Ports and Services - Firewall manager, me/you.

NetFlow - I think this is above our pay grade, i.e. an enterprise matter.

Web Frameworks (PHP, Apache, Java, etc.) - Web server manager.

Web Server Services (email, database, applications) - ditto esp email

Public and Private Cloud - Again us, but typically at the level of dropbox, gdrive and onedrive type of things, running your own cloud is out of my scope here.

I have not split the above because they are I think all computer matters, not human. However, we do of course have a human role that is usually responsible so I will have a crack at adding what I think these are, by reference to who is hands on” as opposed to carries responsibiity, as that’s the IT director or similar name or maybe just you with that hat on.

Summary call to action

So, from that list the ones where we interact directly in our one-person non i.t. tech” business I draw out the following:

Domain registration management

Whois management

Firewall management

Email

Cloud storage

And more technical not for the feint hearted:
Server management PHP, Java, Apache, databases and applications.

CAN I BUY SOLUTIONS?

Yes, and the most obvious is Google’s gmail and associated array of apps and services. However, it is possible to engage with them and fail to understand what you are buying, thinking there is no need to think - all perfectly normal. By way of an example if you are one of these go check their application of DKIM and how that affects your email security as in is it good, better or best. For multiple email accounts the issue with Google is cost-per-user so there is a temptation to share for example sales” email between all sales staff, which is a cyber security risk - see Attack Vectors.

CONCLUSION

So as above it is possible to find service providers who offer to provide all of these things. Let us say you do that.

What that leaves is my (cut down wikipedia list) list of HUMAN weaknesses listed above. There really isn’t a dodge for those. You have to be aware of them and behave appropriately. For example never use the same password twice and preferably never use a login email more than once. Be aware that password strength is determined by length not complexity. The received wisdom is to use a password manager of which there are several.

August 25, 2025

Ltd Co Small Business Start Up Timeline

Click this for Audio version of this document, with extra comment

Formation

Compliance

So this is matters derived from company law, such as how many directors, corporate or not, whether a company secretary, modfications to model articles - really the realms of professionals who live and breathe these matters, but your usual formation agents” typically automatically ensure you comply. Watch out for: directors’ quorum being affected by altered articles.

Planning

Types of shares, directors’ matters such as special voting rights, if corporate. Much of this has to do with how you view what may happen in the future and / or how long the life of the company is expected to be, for example a construction company’s subsidiary formed (to ringfence risk) to build a housing estate won’t be expected to have an infinite life. So what you might see as formed for a (special) purpose (you will hear of these referred to as SPVs”.

Timing is important in so far as where you have an EXPECTED source of sales based on a contract of supply you are busy negotiating, you do not really want to form the company only to find it all comes to nothing and you have (a) incurred the costs involved in formation and (b) you now have the responsibility of a company not required; even if all you do is have it struck off, these are all time distractions a busy person can do without - and for which a professional will charge you professional rates to do it for you; all for the sake of getting the timing right and not being over enthusiastic. Typically a company can be formed by the end of tomorrow and even today if at a little extra cost. Assuming you have put all the requirements in place of course and have simply to hit submit” AND you have not made any mistakes in there, such as finding your chosen name is already taken (watch out for N.I. companies appearing).

The list of caveats is endless, so be aware there will be much you do not know you do not know and this even applies to general practitioners in all spheres. However, using the usual specialist formation agents should offer protection against much. Their charges for tailor making changes are usually reasonable when you explain what you wish to achieve, and their modifications to the model articles will be based on specialised legal opinion (or should be).

Succession

Worthy of note on its own is the area we call succession planning which in its most obvious form (is it?) is where a company is handed on from father to son (mother to daughter etc etc). This is a very specialised area in its own right so just be aware of it if this is relevant for you.

Legal

Negotiation and population of contracts of sales and purchases, being aware of pre-incorporation” contracts. Check companies house for existence

Take insurance policies, both required by law (motor and employer) and other risks mitigation (e.g. p.i.i and product liability etc) . Check START dates result in desirable renewal dates (so for NOT expiring weeks before the company year end (Accounting Period) where renewal can be required despite only a week or two’s cover is required.

Professional review of contracts preferably before, but can be after signature. Awareness of whether third parties can view the absence of such reviews to be an absence of business control (competence), so sometimes one may not think review is necessary, but the presence of that process is the more important in risk mitigation. There seems to be a certain irony in a legal contract review being important in risk management not for the result of the review, but for having been carried out regardless.

Technical (“Tech”)

Creation of business infrastructure

Domain registration

DNS (independent)

DNS Reputation

Blacklist defence

Server (independent of the above)

Ransomeware defence (or notes of why not).

SPF

DNS Sec

DKIM

PGP etc

SSL Certicates

Emal server

Email accounts - not personal ones like Hotmail

Email distributions

Web site

Linkedin

Linkedin

This tends to be used more for personal identity purposes, such as by Fintech banks. Consider a dedicated business profile. Likewise Facebook and others.

Telephone numbers / system

Do NOT use private and/or home numbers.

Banks

Consider use of high street” or Fintech” banks or indeed both. As regards Fintech the current experience is their reliability can be compromised because they make insufficient effort at the time of account opening in favour of ease of that process and then freeze a transaction while demanding documentary evidence for it. High Street banks tend to be more difficult to open but more reliable ongoing, subject to their later requests, but these do not involve freezing live transactions.

In view of the risk of a bank being unreliable it is wise to have more than one so that if one closes your account and sends you a cheque for the balance made payable to your company, you have somewhere to pay in this cheque.

Given you have two accounts, use one for larger and / or formal” matters such as taxation, VAT, dividends, sales (low volume), payroll, rent and so on. Use the other for the shrapnel” transactions; so these are relatively high volume low value, for example daily subsistence coffee, fuel purchases, small stationery and so on. Perhaps as a very rough rule of thumb this may be all amounts less than £5,000 unless formal”.

AVOID using any of your personal accounts whether debit or credit. Do NOT engage in re-imbursed expenses” which you may be accustomed to doing previously. Why? HMRC P.a.y.e. traps which are no problem until they are AND in any case require payroll operations when simply using a company card removes all of this red tape.

Clearly do not mix business and personal transactions between business and personal bank (and card) accounts. However, if in doubt use the company account because this can be simply allocated to (ceteris paribus) your director’s loan account, whereas a business payment paid personal leads you in to re-imbursed expenses” as above. Keep it simplest.

More than two accounts? Sure, no problem. Make SURE you have the bookeeping sorted, preferably automatically using tech not people. Check for bookkeeping systems in the cloud that are offered free with one bank account or another, then check all your accounts can automatically feed this, including if that includes all or only some types of and level of account (such as basic” versus pro”). Some require their own proprietary system to be used for feeds and other offer nothing at all and must be manually exported and imported (which is easy enough as long as the cut off dates are always strictly checked).

Company Taxes

In likely order of ability to enact by passage of time. The issue in these is that while we desire to get everything done immediately so we can no longer have to give it further attention, these matters are forcibly delayed by HMRCs procedures

VAT - pre or at registration threshold

CT41G HMRC form arrives (eventually) making possible the following:

Payroll scheme if required.

Gov Gateway to HMRC account (immediate access) - personal identity controls can be very difficult, despite on the surface appearing simple enough.

Notify company start of activity date - this is intended to avoid doing more than ONE corporation tax return at the end of the first year” of business.

Apply for and activate Corporation tax in the gateway - delay as code is sent by post.

Check the ARD (“year end”) date as companies house is as desired - keep in mind an extension can be done only ONCE every FIVE years while shortenings are not restricted.

Make sure your S.A. matters are all also working. I question mixing these two.

———————————————————————


I am not saying this is going to be easy.
I am saying it will be worth it.
Foresight” this is known as paying attention to all the details”… something which is sorely lacking in much of today’s business.

August 25, 2025

Ltd Co Small Business Deadlines And Applications

Formation - leads to

Date of formation shown on the COI (Certificate of Incorporation)

1st accounts filing date is EXACTLY 9 months later

2nd accounts filing date is 12 months to the year end date (the A.R.D.)

1st CS01 is 12 months plus 15 days later.

Contract dates - plan ahead

These must be on or after the formation date, not before

End dates are as negotiated and need to be monitored.

Insurance policy dates should be carefully matched with contracts to avoid annual renewals a short time before a contract expires.

Legal reviews must be considered before or after start dates, depending on circumstances.

Similarly other legal aspects must be considered outside the contract terms, such as how business is conducted as compared to the contract. This is about the intentions of the parties as demonstrated rather than as written.

Communications - protect your privacy

Domain name can be any time by you, but ownership should be transferred to the company when formed and all contact data managed to avoid exposing private details (especially home addresses) to the internet. E.g. also email addresses and telephone numbers.

Telephone numbers to be company related not personal numbers

Email as for phone numbers.

Companies house make sure SAIL addresses are used, not home addresses.

Taxation - crucial early settings

HMRC will send a form CT41G with company UTR (Unique Tax Reference), in due course and littel can be done until this arrives.

With UTR create Gov Gateway account to access HMRC (immediate) and details from any two of

UK Passport

UK Driving licence

Three answers from credit record (no one gets these right so get a copy of your credit record first)

P60

S.A. (make sure you have your own SA access set up first)

With Gateway account set date of activity start” with HMRC (immediate)

With Gateway account activate Corporation Tax (a code is sent by post, so NOT immediate)

Set up paye if required.

Vat Registration if desired prior to registration threshold.

Banks - dates are a moveable feast

Applications require various authentications and these often request the following so make sure you have set these up first, there are no deadlines except to be ready for account applications:

Web page for the company

Linkedin profile for director(s)

Copies of contracts

Passports

Driving licences

Business activity description

Contrary to popular belief bank accounts may be less urgent because until money is due in their details are not required, for example in contracts and individuals personally wanting to complete the process is not the same as it being mandatory - stay in control and do not hand it over to others.

That said get two banks at least so that in any event your business can continue to operate.

August 25, 2025