Presentation is loading. Please wait.

Presentation is loading. Please wait.

Volume activation.

Similar presentations


Presentation on theme: "Volume activation."— Presentation transcript:

1 Volume activation

2 Two Activation Models Key Management Service (KMS )
KMS clients must connect with KMS host at least once every 180 days to keep activation current Transparent end user experience Capable of activating hundreds of systems, as long as minimum threshold is established and maintained Eliminates need for individual clients to connect and activate with Microsoft Product key is pre-installed on clients Multiple Activation Key (MAK) Flexible options to install MAK on each PC client Office Customization Tool (OCT) Automated install file (Config.xml) Change key in Backstage Volume Activation Management Tool (VAMT) 2.0 One time activation with Microsoft hosted service Supports online, phone and proxy activation One MAK key per product per organization

3 Key Management Service (KMS) for Office 2010 Lab Licenses
2007 Microsoft Office system and previous versions of Microsoft Office, you had to enter a product key when you deployed Office. If you use Key Management Service (KMS), you do not have to do this for Office 2010 because all volume license editions of Office 2010 have a KMS client key preinstalled. Allows Office instances to complete activations on their local network, eliminating the need for to connect to Microsoft for product activation. KMS Host is a lightweight service that does not require a dedicated system and can easily be co-hosted on a system that provides other services. KMS Requires a minimum number of computers (physical or virtual machines) in a network environment (called minimum threshold). Instances activated with KMS contact the KMS host once every 180 days

4 Multiple Activation Key (MAK) for Office 2010 Lab Licenses
MAK is used for one-time activation with Microsoft’s hosted activation services. Different from Windows XP Professional Volume License Key There are two ways to activate computers using MAK. MAK Independent activation, which requires that each computer independently connect and be activated with Microsoft either over the Internet or by telephone. MAK Proxy activation which uses a computer acting as a MAK proxy that gathers activation information from multiple computers on the network, and then sends a centralized activation request on their behalf. MAK Proxy activation is configured using the Volume Activation Management Tool (VAMT). KMS is the default key for Volume Activation clients. Using MAK activation requires installing a MAK key using Script, Volume Activation Toolkit, or Windows Deployment Toolkit. MAK is best for users who cannot connect to Institution network at least every 180 days

5 KMS Host One KMS host for Windows and Office
Highly scalable service (100’s of thousands) Supported KMS host Operating Systems: Operating System Office Windows Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 (Volume License edition) Windows Server 2008 R2

6 VL Activation never prevents an end-user from using Office 2010
Two primary methods of Volume Activation: Key Management Services (KMS): preferred method, self-hosted, self-maintaining, ideal for vast majority of environments Multiple Activation Key (MAK): machine independent, hosted by Microsoft 1 4 Flexible, compatible options Activation Activation establishes a relationship between the software’s product key and software on the device 2 Activation helps ensure you are using genuine Office 2010 software, which gives you access to the latest features It provides protection against the malicious code common in counterfeit software 5 Why it’s important VA is for virtual, too Virtual machines count toward minimum req. 5 connected systems (PCs, laptops) Legal Notice The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. ©2009 Microsoft Corporation. All rights reserved. Microsoft, Office are trademarks of the Microsoft Corporation group of companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 3 6 All information is private and not used by Microsoft or any other party Enhanced data security Familiar but better Volume Activation in Office 2010 builds on Vista and Windows Server 2008 Privacy and Security 7 Microsoft has a variety of tools to help make deployment and management simple and easy Resources

7 User experience when not activated
User experience in MAK asking for activation if VAMT is not used to orchestrate activation User experience in KMS if not activated in 30 days (no UI experience in first 25 days)

8 Topology guidance

9 Tools Volume Activation Management Tool (VAMT) 2.0
Search for Windows and Office in the enterprise network Deploy product keys to clients Proxy MAK activation Trigger MAK online and KMS activations Software licensing management script (slmgr.vbs) Enter KMS host key Activate KMS host Monitor KMS host status Number of client activations

10 Multiple Activation Key (MAK)
Microsoft Hosted Activation Services Volume License Agreement MAK key available to volume license customers on request One Time Install the MAK on the client Directly Provisioned by the IT Pro (Image or Proxy) External Internal VAMT Activate with Microsoft Online (directly or via Proxy) Phone, SMS text messaging Perpetual activation Some conditions may require reactivation Image

11 Key Management Service Process
Microsoft Hosted Activation Service Volume License Agreement KMS key automatically available to customers via normal channels Install KMS key on KMS host machine Activate KMS service with Microsoft - One time activation of KMS host One Time External KMS host registers SRV with DNS KMS client discovers KMS host Internal DNS KMS client activates based on policy - KMS count ≥ activation threshold KMS Host KMS client regularly re-activates - Non-perpetual activation (180 days) - Communication between KMS host and KMS client is never exposed to Microsoft KMS Client Request Count

12 To Install KMS hosts for KMS Activation
Choose and install the desired volume licensed media. No product key is required during setup. Start the computer, log on and launch an elevated Command Prompt. Install your KMS key. Do not use the Windows interface for this. Run the following script: cscript C:\windows\system32\slmgr.vbs /ipk <KMS Key>

13 Command Prompt

14 Successful KMS Activation

15 Activate KMS Host Activate the KMS host with Microsoft, either using online activation or telephone activation: For online activation (You must be able to access the Internet from the computer), run the following script: cscript C:\windows\system32\slmgr.vbs /ato For telephone activation (if you do not have access to the Internet), run the following command and follow the on-screen instructions: slui.exe The KMS host is now ready to be used by KMS clients for activation. Additional configuration is optional and will usually not be required.

16 To verify the activation by using command : Slmgr -dlv

17 Additional Technical Resources
Office Activation Springboard Site IPSEC Server Isolation to protect KMS Hosts: Reference Guide for slmgr, registry, GPO, Event Log, WMI, Error Codes, etc.. Activation Error Codes Office 2010 blog entry for Volume Activation Office 2010 volume activation deployment guide Top activation issues reported to CSS

18 Summary Activation is required for all volume editions of Microsoft Office 2010 client Customers need to decide between MAK, KMS and Token (highly secure disconnected environments) Office and Windows use the same activation technology


Download ppt "Volume activation."

Similar presentations


Ads by Google