Visit the crayon.com enterprise site
Crayon Channel APAC
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login

Search

Become a Partner Partner Login
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login
Crayon Channel APAC

Search

Home / Enablement Hub / Training / Technical / VMware VCSP Licenses

VMware VCSP: Best Practices to Manage Licenses & Analyse HUR Reports

29th May 2025
Mastering VMware VCSP Licensing: Avoiding Overages & Optimizing Usage

Mastering VMware VCSP Licensing: Avoiding Overages & Optimizing Usage

Avoiding Overages: The Case for Proactive License Management

With VCSP licenses, the Premier or Affiliate partner is able to generate as many licenses as required, sometimes spiraling without proper monitoring. This could then lead to unwanted overages and subsequently more spending. Following is some of the best practices that can be followed to better manage your licenses.

1. Understanding your contract

1. Understanding your contract

a. Some partners have multiple contracts, due to various reasons. So, it is essential you know what your entitlements for each contract are.
b. It is important to make sure that you understand and document this.
c. Tip: refer to the ESD email for full information.

2. Generating and tracking licenses

2. Generating and tracking licenses

a. Licenses are generated from the Consumption Portal based on your requirement for each contract. This will be available in My Entitlements >> Consumption Portal.
b. The best practice is to generate one license key for each cluster or each vCenter, instead of generating a single license key for the entire entitlement of your contract. This way, the usage can be tracked more efficiently.
c. Create an excel sheet with the details and keep them updated whenever a license key is created or removed from usage. This is a customizable sample which you can use to start with.
d. Note: You cannot delete a license key in Consumption portal once generated, but it is not taken into account unless it is applied and used.

3. Overage

3. Overage

a. Overage is triggered when the usage for each contract is above the total number of cores committed.
b. Overage can be tracked manually by generating the HUR Report from Cloud Console.
c. The HUR report is originally in TSV format which is displayed in an Excel csv format.
d. The HUR report in its original format is not very useful, but with some formatting and formulas, it can be easily understood.

4. Analyzing HUR Reports

4. Analyzing HUR Reports

a. We have created a custom Excel automation script which instantly transforms the HUR report into an easy-to-read format with the calculations applied automatically.
b. You then need to key in the generated or committed value for each license key (which can be found in the tracking file you generated in step 2) to check if there is an overage and the cost.
c. Attached is a video and instructions on how to run the script.

How to use the Automation Script:

How to use the Automation Script:

1. First open the text file containing the script – HUR Report Automation v2.
2. Then open the HUR report (in tsv format) in Microsoft Excel.
3. The save the file as a .xlsx file to preserve the formatting.
4. Next, go to the Automate tab in Excel and select New Script.
5. This will then open the Script Editor on the right side of the page.
6. Now, select all and delete the existing content and replace it with the content from the HUR Report Automation v2.txt file (copy and paste the content).
7. Next, click on Save Script to keep this script stored for future use. You then don’t have to repeat the steps above to use the script again.
8. Then, click on the Run button to execute the script.
9. Once executed, the file should be formatted properly and a new table will be created from Column L to N.
10. In Column M (highlighted in yellow), enter the committed cores per contract to see the approximate overage cost.
11. When you have multiple license keys per contract, split the commit between them and ensure the total committed cores does not exceed your actual commit to get a more accurate overage value.

Disclaimer: This calculation is based on estimation from the HUR Report only. For actual overage, you will need to refer to the invoice and consumption report from Broadcom.

How to use HUR Automation Script

Related tags:
VCSP Cloud Solutions Infrastructure CloudVMware
SHARE

Related

Data Protection for Business Leadership

Sales and Marketing

Data Protection for Business Leadership

Business leaders don't live in the tools. They live in the outcomes. The metrics they care about most are not always limited to compliance and risk. So how do you connect data protection to the big-ticket objectives, when they're less obvious? Our in-house pre-sales expert, Michael Brooke explains.

Learn More
Data Protection Playbook #3
Featured

Guides and eBooks

Data Protection Playbook #3

As SMBs mature in the Data Protection lifecycle, they need help to optimise spend, reduce the compliance burden and ensure results align to business objectives. The third installment of our Data Protection Playbook series provides practical guidance for partners on how to address emerging pressure and connect ongoing investment to measurable business value.

Get Started
Copilot Agents: Level up from chatbots
Featured

Training

Copilot Agents: Level up from chatbots

Copilot Agents: what are they and how do they differ from AI assistants and chatbots? Our in-house Copilot expert Ksenia Turner explains the use cases and service opportunities for partners.

Learn more
Proving Data Protection Compliance
Featured

Blogs

Proving Data Protection Compliance

Fragmented data protection systems and processes create compliance proof-gaps for SMB customers. Scott Hagenus, Director, Cybersecurity here at Crayon explains.

Learn More
Data Protection Sales
Featured

Sales and Marketing

Data Protection Sales

Ever wonder why a pitch has some IT Managers leaning forward, while others glaze over? Michael Brooke, Cybersecurity Pre-Sales Lead offers some insight on how to tune your approach to chime with different technical mindsets.

Read Now
Data Protection Playbook #2
Featured

Guides and eBooks

Data Protection Playbook #2

How can partners help their SMB customers to move from silos of security and continuity to a more cohesive, measurable and insurable data protection framework? The second edition in our Data Protection Playbook series maps out their journey, and yours.

Get Started
Copilot for Business
Featured

Vendor Announcements

Copilot for Business

Copilot for Business has landed at Microsoft Ignite 2025, levelling the GenAI playing field for SMB customers. Learn all about it from our man on the ground, Andreas Bergman.

Read More
Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award
Featured

Press Release

Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award

Read more
Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award
Featured

Press Release

Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award

Read more
Data Protection Partner Playbooks for SMB Customers

Blogs

Data Protection Partner Playbooks for SMB Customers

As cybersecurity and continuity converge in platforms and in practice, partners need new playbooks to address modern Data Protection standards. Our in-house cybersecurity pre-sales lead, Michael Brooke explains why.

Learn More
Data Protection Playbook #1
Featured

Guides and eBooks

Data Protection Playbook #1

What triggers an SMB customer to begin exploring their need for better Data Protection? The first of our four Data Protection Playbooks for partners breaks down how to position and win in the Pre-Adoption and Exploration stage.

Get Started
Data Protection Resource Round-Up
Featured

Insights

Data Protection Resource Round-Up

Data Protection priorities are shifting for SMBs. Ramp up your ability to respond with curated insights, articles and resources to help you guide every customer conversation with confidence.

Get Started
The strong, supportive partnership driving Acceltech’s growth
Featured

Partner Spotlight

The strong, supportive partnership driving Acceltech’s growth

In this Partner Spotlight, Acceltech Managing Director Ivy Tarrobago shares how Crayon’s responsive support enhances client outcomes and business growth.

Read the Story
Strengthening Data Protection for SMBs
Featured

Whitepapers

Strengthening Data Protection for SMBs

Data Protection is a must for all SMBs but how can partners align solution investment with critical business objectives? Our latest paper shows you how.

Get Started
Crayon wins at CRN Channel Awards Asia 2025

Press Release

Crayon wins at CRN Channel Awards Asia 2025

Crayon has been recognised with a huge double win at the CRN Channel Asia awards ceremony.

Read more
M365 Copilot Hub
Featured

Insights

M365 Copilot Hub

All the latest insights, articles and resources on M365 Copilot, curated into one place.

Read More
Secure Backup and Recovery
Featured

Insights

Secure Backup and Recovery

SMB customers are storing greater volumes of sensitive data in more places than ever. Secure backup and recovery practices are essential to how they protect it.

Learn More
Crayon Expertise: Why Bigfish is hooked
Featured

Partner Spotlight

Crayon Expertise: Why Bigfish is hooked

Bigfish Technology saved AU$20,000 on its annual Microsoft licensing after one call with Crayon and has since built a strong partnership that enabled Bigfish to get access to Crayon’s expertise and vendor ecosystem.

Read the Story
Insider Risk: SMB data and the threat within

Insights

Insider Risk: SMB data and the threat within

Insider risk is a subtle and continuous challenge for SMB customers. Turn it into a manageable and quantifiable aspect of their Data Protection strategy.

Learn More.
Data Protection for SMBs
Featured

Blogs

Data Protection for SMBs

From rethinking backup to governance frameworks and behavioural analytics, what's involved in building a complete Data Protection strategy for SMB customers?

Find Out
Microsoft’s Channel Evolution
Featured

Insights

Microsoft’s Channel Evolution

We explore the evolution of Microsoft's channel strategy over the past ten years, and what can be learned by viewing it through a Value Cycle lens.

Learn More
The Microsoft Fabric Partner Guide

Guides and eBooks

The Microsoft Fabric Partner Guide

The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.

Read more
Cybersecurity Resource Round-up

Insights

Cybersecurity Resource Round-up

Support your cybersecurity game plans with our top picks of new and updated risk and resilience resources.

How to Design your Copilot Offer

Sales and Marketing

How to Design your Copilot Offer

Practical tips for crafting and activating a compelling Copilot GTM proposition.

Learn more
Meet Crayon’s “Copilot Queen”: Ksenia Turner’s journey from tech support to industry leader

Blogs

Meet Crayon’s “Copilot Queen”: Ksenia Turner’s journey from tech support to industry leader

From retail to corporate tech, Ksenia Turner built a career on learning, adapting, and helping others do the same. Now, as Business Success Manager at Crayon, she helps partners understand and use AI and Microsoft solutions in real, practical ways.

Read her story
Copilot for M365 Implementations: Key Risk Considerations for Partners

Training

Copilot for M365 Implementations: Key Risk Considerations for Partners

M365 Copilot implementations for customers should be viewed through a risk tolerance lens. Explore risk tolerance profiles and what they mean.

Learn More

Microsoft 365 Copilot

Read more
Microsoft 365 Copilot Training Webinar

Webinars Series

Microsoft 365 Copilot Training Webinar

Designed by our M365 Copilot SureStep experts, the workshop will help you to start selling and deploying Copilot and AI projects for your customers.

Watch video
Enhance your Microsoft 365 security to get Copilot ready

Webinars Series

Enhance your Microsoft 365 security to get Copilot ready

Watch video
Cloud Security Assessments are a Growth Opportunity

Blogs

Cloud Security Assessments are a Growth Opportunity

Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.

Read more
Visit the crayon.com enterprise site

Subscribe to Crayon Channel APAC news

Receive the latest updates, industry insights and technology developments from around the world, and across the Asia Pacific region.

Thank you for subscribing!

  • Become a Partner
    • Partner Value Guide
  • Solutions
    • Business Applications
    • Business Continuity
    • Cloud Infrastructure
    • Productivity
    • Security
  • Community
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • PAC
    • Community Events
  • About
    • Careers
    • Contact Us
    • APAC Leadership
    • Visit Crayon Japan
  • Platforms
    • PRISM
    • Cloud-iQ
  • Services
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Access4
  • Acronis
  • Airlock Digital
  • Automox
  • AvePoint
  • Backup365
  • ConnectWise
  • ContraForce
  • CoreView
  • Cytrack
  • Delinea
  • DNSFilter
  • Docusign
  • ESET
  • Hornetsecurity
  • invicti
  • Layer 8 Security
  • Microsoft
  • Nerdio
  • Netwrix
  • NinjaOne
  • Octopus Cloud
  • Probax
  • Runecast
  • Senserva
  • SigniFlow
  • SmartEncrypt
  • SMX
  • Swoosh.Cloud
  • Trend Micro
  • usecure
  • Veeam
  • VIPRE
  • Virtuozzo
  • VMware by Broadcom
  • Wasabi
  • Zimbra
  • ZIRILIO
  • Zoom
  • View All
Crayon Channel APAC Contact us today
  • Privacy
  • Terms & Conditions
  • Human Rights Transparency Statement

© 2025 Crayon LTD

back to top

Strengthening Data Protection for SMBs

Connect Data Protection to strategic objectives via this Whitepaper

Learn More

Front cover and interior page view of Forrester SMB market study reportch report

Future of Operations 2025

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Download the study

Download Our Partner Value Guide

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.

Download Value Guide