Breadth Technical Readiness Volume License Activation for

Download Report

Transcript Breadth Technical Readiness Volume License Activation for

Microsoft
Goals
Customer
Focused
Goals
Engineer a
product less
vulnerable to
piracy and
counterfeit
Enhance ease
of deployment
with minimal
impact to VL
customers
Provide set of
tools to help
ensure a more
managed
installation
environment
Provide
Multiple and
Flexible
options
Help reduce VL
key leakage
Strong and
transparent
Microsoft
privacy policy
around
activations
ACTIVATION
HISTORY
BACKGROUND:
MICROSOFT
OFFICE 2007
Volume Activation
(VA) introduced in
Windows Vista
Enterprises were
given “bypass” volume
license keys
VA is now the
standard for new
Operating systems
and Office Client
products
• These Keys bypassed
Identified nongenuine software
displays permanent
word-mark on screen
Re-activation
required for a copy
determined as nongenuine at a later
date - failure to reactivate results in loss
of functionality
activation as no activation
was required after entering
product key
• Keys were easily
compromised
Pirated/ Counterfeit
Software
• Some Customers
unwillingly deploy
counterfeit software
• Malware in counterfeits
result in higher support costs
• Expensive down time
VA ensures customers
receive and deploy
legitimate software
Activation establishes a
relation between a license
you purchase and product
on which you exercise the
licensing rights
Associates the proof-oflicense (5*5 product keys)
to the device
Applies to Windows and
Microsoft Client products
Activation required for
all VL Office Client
products
• Provisioned and
managed by IT Pros
• Transparent end user
experience
Activation not required
for Office2010 Server
products
Key Management Service (KMS )
•
Eliminates need for individual
clients to connect and activate with
Microsoft
• Product key is pre-installed
on clients
•
KMS clients must connect with KMS
host at least once every 180 days to
keep activation current
• Transparent end user experience
•
Capable of activating hundreds of
systems, as long as minimum
threshold is established and
maintained
Multiple Activation Key (MAK)
•
•
•
One time activation with Microsoft hosted
service
Supports online, phone and proxy
activation
One MAK key per product per
organization
•
Flexible options to install MAK on each
PC client
• Office Customization Tool (OCT)
• Automated install file (Config.xml)
• Change key in Backstage
• Volume Activation Management
Tool (VAMT) 2.0
Multiple Activation Key (MAK) for activating with
Microsoft
• One time activation with Microsoft hosted
activation service
• Supports online, phone or proxy activations
Key Management Service (KMS) for enabling local
activation
• Eliminates the need for individual machines to
connect and activate with Microsoft
• Capable of activating unlimited number of
systems, as long as the minimum threshold is
established and maintained
• Client must connect with KMS host at least once
every 180 days to keep activation current
MAK
KMS
DNS
VAMT
Image
KMS Host
KMS Client
Volume
License
Agreement
Microsoft Hosted
Activation Services
KMS host key automatically available to
customers via normal channels
Install KMS host key on KMS host
Activate KMS service with Microsoft
-One time activation of KMS host
-KMS host registers SRV with DNS
One Time
External
Internal
KMS client discovers KMS host
KMS client activates
- # of Office KMS clients ≥ 5
DNS
KMS client regularly re-activates
- Non-perpetual activation (180 days)
- Communication between KMS host and
KMS client is never exposed to Microsoft
KMS Host
KMS Client
Operating System
Windows Server 2003
Office
√
Windows
√
Windows Vista
√
Windows Server 08
√
Windows 7 VL
√
√
Windows Server 2008 R2
√
√
Volume
License
Agreement
Microsoft Hosted
Activation Services
MAK key available to volume license
customers
One Time
External
Internal
Install the MAK on the client:
OCT, config.xml, Backstage
Activate with Microsoft
Online, Telephone
One-time activation
Hardware changes require
reactivation
Image
Microsoft Hosted
Activation Services
Volume
License
Agreement
MAK key available to volume license
customers
One Time
External
Internal
Enter the MAK key in VAMT 2.0
VAMT 2.0 pushes key to clients,
receives installation ID (IID)
IID sent, confirmation ID received
(unique to each MAK client)
VAMT 2.0
Each MAK client receives unique conf
ID
Perpetual activation:
Hardware changes require
reactivation
As an IT Pro, you must be aware that volume activation is part of your Office 2010 deployment
Activation
Why it’s
important
Familiar but
better
Activation establishes a relationship
between the software’s product key
and software on the device
Activation helps ensure you are using
genuine Office 2010 software,
providing access to the latest features
and protection against the malicious
code common in counterfeit software
Volume Activation in Office 2010
builds on Vista and Windows 2008
Resources
Flexible,
compatible
options
• Key Management Services (KMS):
preferred method, ideal for vast
majority of environments
• Multiple Activation Key (MAK):
machine independent
VA is for
virtual, too
• Virtual machines count toward
minimum req.
• VA makes activation of virtual
systems easy
• 5 connected systems (PCs, servers,
laptops)
Privacy and
security
• All information is private and not
used by Microsoft or any other
party
• Enhanced data security
• Microsoft has a variety of tools to help make
deployment and management simple and easy
• www.microsoft.com/technet/volumeactivation
VL activation never prevents an end-user from using Office 2010
Key Changes
• Significant change in Volume Activation
process for XP customers
• Executed by IT Pros as part of deployment
• Volume Activation has nominal IT impact
• Requires no end-user action
• Microsoft does not collect user data
• No additional hardware is required
KMS
• Recommended default method
• Enables local activation of unlimited
number of systems
• Requires: At least 5 Office systems
connecting to KMS host in any given 30
days & client systems connect with KMS
host at least once every 180 days for all
Microsoft Office Client Products
MAK
• No minimum number of PC’s for activation
• Best for computers rarely connected to
organization’s network
• Is one time activation with Microsoft
hosted activation service
• Supports online, phone or proxy (VAMT)
activations; use VAMT when activating
Volume Activation in Office 2010
• End-user experience
• Customizable user experience for
enterprise
• Notification dialog prompts
Ease of activation in deployment
• Inclusion of virtual systems in
customer hosted activation service
(KMS)
• KMS clients pre-installed with KMS
client key
Assurance
•
•
Helps protect against counterfeit
Delivers all Office 2010 capabilities
Supportability
•
•
Requires low deployment / management effort
Ensures full Microsoft / partner technical
assistance
• Key management & reporting
through Volume License Service
Center (VLSC)
• Tools for better manageability
• One stop Volume Licensing Service
Center portal
Manageability
•
•
Reduces reuse of leaked keys
Integrated into deployment process and tools
License Compliance and Management


Provides access to upgrades and contract options
Helps avoid penalties, reputation damage, and
business interruption
User experience in MAK asking for activation
if VAMT is not used to orchestrate activation
User experience in KMS if not activated in 30
days (no UI experience in first 25 days)
•
Where a sufficient number of systems exist, use KMS
•
Use KMS as much as possible, and minimize the number
of KMS hosts
•
Use MAK only where needed
•
•
Customers will probably need to use both methods
KMS port (1688 by default) should never be exposed
outside the organization
•
Volume Activation Management Tool (VAMT) 2.0
•
Software licensing management script (slmgr.vbs)
Microsoft Confidential
Microsoft Confidential
http://technet.microsoft.com/en-us/office/ee691939.aspx
http://connect.microsoft.com
https://partner.microsoft.com/office2010activation
Microsoft Confidential