Quick start
Deploy a first Wadyu customer and obtain a reliable first ROI signal without skipping the security steps.
Product documentation
Wadyu documentation centralises deployment guides, functional modules, security rules, production operations and MSP governance arguments.
Deploy a first Wadyu customer and obtain a reliable first ROI signal without skipping the security steps.
Connect a Microsoft 365 customer tenant to Wadyu while keeping the relationship strictly scoped to the current MSP.
Deploy the Wadyu App Metering collector through Intune Proactive Remediation.
Configure the collection profile, privacy level, discovery mode, catalogue targets and collector command.
Understand tenant isolation, encryption, sessions, collector keys, CSP and production controls.
Diagnose visible Wadyu issues through scope, Microsoft consent, collector activity and permissions.
Wadyu answers a simple question that native administration tools rarely cover: are paid licences actually used? Intune shows what is installed. Wadyu shows what is used. The difference is what turns a technical inventory into a financial and governance decision.
The documentation surface is intentionally separated from app.wadyu.tech. It is static, public, does not carry Wadyu application sessions and does not proxy the API. The authenticated MSP console remains the only place for customer data, secrets and operational actions.
Wadyu is not an employee surveillance product. It does not read documents, capture screens or inspect file contents. It measures targeted application usage with the minimum signal required to support licence governance.
Start with one pilot customer, a short list of expensive applications, a controlled Intune group and a clearly documented observation window. Expand only after the consent flow, collector, costs, reports and reclaim decisions have been validated end to end.
Client secrets, Graph tokens, MSAL caches, webhooks and collector keys must never be exposed in documentation, screenshots, exports or support messages.