Microsoft® Volume Activation 2.0 As part of Microsoft’s Genuine Software Initiative, Microsoft Volume Activation 2.0 is a set of technical and policy related solutions provided by Microsoft’s Software Protection Platform that gives customers a more secure and easily deployable solution to protect and manage their volume license keys. Genuine Software The Genuine Software Initiative (GSI) focuses the company’s many activities and investments directed at combating software counterfeiting and other forms of software piracy into a single coordinated effort. The initiative focuses on increasing investments across three strategic areas: Education, Engineering and Enforcement. Experience and research has proven the value proposition for Genuine software is: Substantial additional benefits available - updates & enhancements to Windows Protection from security and reliability dangers of counterfeit software Support from Microsoft and partners for their software Peace of mind knowing their copy of Windows is Genuine Improved software asset management for corporations Software Protection Platform On the engineering side of GSI, several new technology solutions have been created. This includes the Software Protection (SP) Platform used first by Vista and Longhorn Server, with plans to include other Microsoft products in the future. The SP Platform has enabled Windows Vista to improve software security, by including new product activation technologies and policies for OEM Partner, Retail and Volume Licensing customers. The SP Platform has been under development for several years, and is made up of an Activation Server, client services and Application Program Interface (API) that ship in Windows Vista and Longhorn Server, and tools and technologies designed to better protect software through stronger security measures. Code protection technologies such as tamper resistance, code obfuscation, and anti-reverse engineering measures have been considerably strengthened. In addition, the SP Platform has enabled revenue generation programs such as Windows Genuine Advantage (product differentiation) and Windows Anytime Upgrade (digital distribution and upgrade). Volume Activation 2.0 Volume Activation 2.0 is a new requirement in Windows Vista and Longhorn Server requiring activation of each Enterprise and Volume License Business machine. It is designed to provide increased protection and management of customer volume license keys in managed and un-managed environments as well as provide flexible deployment options for customers. The process is transparent for end users and the VA 2.0 solution works in a variety of customer environments. The goals of Volume Activation 2.0 are: Enhanced volume key protection o Centralized management and protection of VL keys o Lower probability of keys leaking o Less risk of re-keying entire organization o Activation platform will be made open to the industry Flexible deployment options o Comprehensive range of product activation options o Robust and scaleable solution o Centralized and controllable infrastructure o No end user involvement needed Peace of mind o Better security checking for Genuine software o Clear roadmap with better software asset management o Transparent Microsoft privacy policy on activations Volume Activation options Activation is a simple and lightweight part of the deployment process. Selecting the right mix of activation options depends on the basics of the environment and on user patterns. The IT Pro needs to determine what activation technologies are to be used and where and then fold the steps into deployment. There are two different keys available to activate Volume Activation 2.0: 1. Multiple Activation Key (MAK) a. MAK Proxy Activation b. MAK Independent Activation 2. Key Management Services (KMS) Multiple Activation Key (MAK) A MAK is a product key with multiple activations allocated to it. It is used for organizations who wish to activate against Microsoft one time. MAK keys have predetermined number of activations depending on the agreement type. Activations can be tracked and the limit increased if the organization needs more activations. a. MAK Proxy Activation is a highly scalable Enterprise Class solution that enables a centralized activation request on behalf of multiple desktops with one connection to Microsoft. b. MAK Independent Activation requires that each desktop individually connects and activates against Microsoft. There are two options to get MAK keys: a. MAKs can be requested by a phone call to the Microsoft call centers (PA Call centre or MVLS / SAB call center) b. The customer can submit a request via their licensing portal (EOpen, MVLS, Xena, UPP ect). The key is provided in real time. If a customer exceeds their MAK allocation, the IT Pro can contact the PA Call Center to request additional activations to be added to their MAK. Key Management Services (KMS) KMS is for managed environment where more than 25 machines activate against a customer hosted service. KMS keys do not have limits on the number of machines they can activate. KMS uses very few system resources and can scale to hundreds of thousands of KMS clients per machine. Systems activated with KMS periodically renew their actions with the KMS server. If they are unable to connect to a KMS server for more than six months, they enter Reduced Functionality Mode (RFM) until a connection can be made with a KMS server or until MAK is used to activate the system. This feature prevents machines that have been removed from the organization from functioning indefinitely without adequate license coverage. Next Generation Software The next generation of the Software Protection Platform in Windows Vista and Longhorn Server will include additional enhancements to software asset management. Feedback from our customers will guide the development of the next edition. We anticipate Volume Activation to be even more flexible and secure and fully integrate in both Microsoft and ISV management tools. More information and guidance on Volume Activation 2.0 is available: Deployment materials – http://client/deployment Technical and marketing materials – http://teamv2/sites/swprotection Field training: Drive Time available November 12th, 2006 Partner training: WW PTR and US PTR available mid October 2006. Ask questions – vlkcom@microsoft.com