Microsoft Volume Activation 2.0

advertisement
Microsoft® Volume Activation 2.0
As part of Microsoft’s Genuine Software Initiative, Microsoft Volume Activation 2.0 is a set of technical
and policy related solutions provided by Microsoft’s Software Protection Platform that gives customers a
more secure and easily deployable solution to protect and manage their volume license keys.
Genuine Software
The Genuine Software Initiative (GSI) focuses the company’s many activities and investments directed
at combating software counterfeiting and other forms of software piracy into a single coordinated
effort. The initiative focuses on increasing investments across three strategic areas: Education,
Engineering and Enforcement.
Experience and research has proven the value proposition for Genuine software is:
 Substantial additional benefits available - updates & enhancements to Windows
 Protection from security and reliability dangers of counterfeit software
 Support from Microsoft and partners for their software
 Peace of mind knowing their copy of Windows is Genuine
 Improved software asset management for corporations
Software Protection Platform
On the engineering side of GSI, several new technology solutions have been created. This
includes the Software Protection (SP) Platform used first by Vista and Longhorn Server, with
plans to include other Microsoft products in the future. The SP Platform has enabled Windows
Vista to improve software security, by including new product activation technologies and policies
for OEM Partner, Retail and Volume Licensing customers.
The SP Platform has been under development for several years, and is made up of an Activation
Server, client services and Application Program Interface (API) that ship in Windows Vista and
Longhorn Server, and tools and technologies designed to better protect software through stronger
security measures. Code protection technologies such as tamper resistance, code obfuscation, and
anti-reverse engineering measures have been considerably strengthened. In addition, the SP Platform
has enabled revenue generation programs such as Windows Genuine Advantage (product
differentiation) and Windows Anytime Upgrade (digital distribution and upgrade).
Volume Activation 2.0
Volume Activation 2.0 is a new requirement in Windows Vista and Longhorn Server requiring activation
of each Enterprise and Volume License Business machine. It is designed to provide increased
protection and management of customer volume license keys in managed and un-managed
environments as well as provide flexible deployment options for customers. The process is transparent
for end users and the VA 2.0 solution works in a variety of customer environments.
The goals of Volume Activation 2.0 are:
 Enhanced volume key protection
o Centralized management and protection of VL keys
o Lower probability of keys leaking
o Less risk of re-keying entire organization
o Activation platform will be made open to the industry

Flexible deployment options
o Comprehensive range of product activation options
o Robust and scaleable solution
o Centralized and controllable infrastructure
o No end user involvement needed

Peace of mind
o Better security checking for Genuine software
o Clear roadmap with better software asset management
o Transparent Microsoft privacy policy on activations
Volume Activation options
Activation is a simple and lightweight part of the deployment process. Selecting the right mix of
activation options depends on the basics of the environment and on user patterns. The IT Pro needs
to determine what activation technologies are to be used and where and then fold the steps into
deployment.
There are two different keys available to activate Volume Activation 2.0:
1. Multiple Activation Key (MAK)
a. MAK Proxy Activation
b. MAK Independent Activation
2. Key Management Services (KMS)
Multiple Activation Key (MAK)
A MAK is a product key with multiple activations allocated to it. It is used for organizations who wish to
activate against Microsoft one time. MAK keys have predetermined number of activations depending
on the agreement type. Activations can be tracked and the limit increased if the organization needs
more activations.
a. MAK Proxy Activation is a highly scalable Enterprise Class solution that enables a centralized
activation request on behalf of multiple desktops with one connection to Microsoft.
b. MAK Independent Activation requires that each desktop individually connects and activates
against Microsoft.
There are two options to get MAK keys:
a. MAKs can be requested by a phone call to the Microsoft call centers (PA Call centre or MVLS /
SAB call center)
b. The customer can submit a request via their licensing portal (EOpen, MVLS, Xena, UPP ect).
The key is provided in real time.
If a customer exceeds their MAK allocation, the IT Pro can contact the PA Call Center to request
additional activations to be added to their MAK.
Key Management Services (KMS)
KMS is for managed environment where more than 25 machines activate against a customer hosted
service. KMS keys do not have limits on the number of machines they can activate. KMS uses very
few system resources and can scale to hundreds of thousands of KMS clients per machine. Systems
activated with KMS periodically renew their actions with the KMS server. If they are unable to connect
to a KMS server for more than six months, they enter Reduced Functionality Mode (RFM) until a
connection can be made with a KMS server or until MAK is used to activate the system. This feature
prevents machines that have been removed from the organization from functioning indefinitely without
adequate license coverage.
Next Generation Software
The next generation of the Software Protection Platform in Windows Vista and Longhorn Server will
include additional enhancements to software asset management. Feedback from our customers will
guide the development of the next edition. We anticipate Volume Activation to be even more flexible
and secure and fully integrate in both Microsoft and ISV management tools.
More information and guidance on Volume Activation 2.0 is available:
 Deployment materials – http://client/deployment
 Technical and marketing materials – http://teamv2/sites/swprotection
 Field training: Drive Time available November 12th, 2006
 Partner training: WW PTR and US PTR available mid October 2006.
 Ask questions – vlkcom@microsoft.com
Download