Microsoft Goals Customer Focused Goals Engineer a product less vulnerable to piracy and counterfeit Enhance ease of deployment with minimal impact to VL customers Provide set of tools to help ensure a more managed installation environment Provide Multiple and Flexible options Help reduce VL key leakage Strong and transparent Microsoft privacy policy around activations ACTIVATION HISTORY BACKGROUND: MICROSOFT OFFICE 2007 Volume Activation (VA) introduced in Windows Vista Enterprises were given “bypass” volume license keys VA is now the standard for new Operating systems and Office Client products • These Keys bypassed Identified nongenuine software displays permanent word-mark on screen Re-activation required for a copy determined as nongenuine at a later date - failure to reactivate results in loss of functionality activation as no activation was required after entering product key • Keys were easily compromised Pirated/ Counterfeit Software • Some Customers unwillingly deploy counterfeit software • Malware in counterfeits result in higher support costs • Expensive down time VA ensures customers receive and deploy legitimate software Activation establishes a relation between a license you purchase and product on which you exercise the licensing rights Associates the proof-oflicense (5*5 product keys) to the device Applies to Windows and Microsoft Client products Activation required for all VL Office Client products • Provisioned and managed by IT Pros • Transparent end user experience Activation not required for Office2010 Server products Key Management Service (KMS ) • Eliminates need for individual clients to connect and activate with Microsoft • Product key is pre-installed on clients • KMS clients must connect with KMS host at least once every 180 days to keep activation current • Transparent end user experience • Capable of activating hundreds of systems, as long as minimum threshold is established and maintained Multiple Activation Key (MAK) • • • One time activation with Microsoft hosted service Supports online, phone and proxy activation One MAK key per product per organization • Flexible options to install MAK on each PC client • Office Customization Tool (OCT) • Automated install file (Config.xml) • Change key in Backstage • Volume Activation Management Tool (VAMT) 2.0 Multiple Activation Key (MAK) for activating with Microsoft • One time activation with Microsoft hosted activation service • Supports online, phone or proxy activations Key Management Service (KMS) for enabling local activation • Eliminates the need for individual machines to connect and activate with Microsoft • Capable of activating unlimited number of systems, as long as the minimum threshold is established and maintained • Client must connect with KMS host at least once every 180 days to keep activation current MAK KMS DNS VAMT Image KMS Host KMS Client Volume License Agreement Microsoft Hosted Activation Services KMS host key automatically available to customers via normal channels Install KMS host key on KMS host Activate KMS service with Microsoft -One time activation of KMS host -KMS host registers SRV with DNS One Time External Internal KMS client discovers KMS host KMS client activates - # of Office KMS clients ≥ 5 DNS KMS client regularly re-activates - Non-perpetual activation (180 days) - Communication between KMS host and KMS client is never exposed to Microsoft KMS Host KMS Client Operating System Windows Server 2003 Office √ Windows √ Windows Vista √ Windows Server 08 √ Windows 7 VL √ √ Windows Server 2008 R2 √ √ Volume License Agreement Microsoft Hosted Activation Services MAK key available to volume license customers One Time External Internal Install the MAK on the client: OCT, config.xml, Backstage Activate with Microsoft Online, Telephone One-time activation Hardware changes require reactivation Image Microsoft Hosted Activation Services Volume License Agreement MAK key available to volume license customers One Time External Internal Enter the MAK key in VAMT 2.0 VAMT 2.0 pushes key to clients, receives installation ID (IID) IID sent, confirmation ID received (unique to each MAK client) VAMT 2.0 Each MAK client receives unique conf ID Perpetual activation: Hardware changes require reactivation As an IT Pro, you must be aware that volume activation is part of your Office 2010 deployment Activation Why it’s important Familiar but better Activation establishes a relationship between the software’s product key and software on the device Activation helps ensure you are using genuine Office 2010 software, providing access to the latest features and protection against the malicious code common in counterfeit software Volume Activation in Office 2010 builds on Vista and Windows 2008 Resources Flexible, compatible options • Key Management Services (KMS): preferred method, ideal for vast majority of environments • Multiple Activation Key (MAK): machine independent VA is for virtual, too • Virtual machines count toward minimum req. • VA makes activation of virtual systems easy • 5 connected systems (PCs, servers, laptops) Privacy and security • All information is private and not used by Microsoft or any other party • Enhanced data security • Microsoft has a variety of tools to help make deployment and management simple and easy • www.microsoft.com/technet/volumeactivation VL activation never prevents an end-user from using Office 2010 Key Changes • Significant change in Volume Activation process for XP customers • Executed by IT Pros as part of deployment • Volume Activation has nominal IT impact • Requires no end-user action • Microsoft does not collect user data • No additional hardware is required KMS • Recommended default method • Enables local activation of unlimited number of systems • Requires: At least 5 Office systems connecting to KMS host in any given 30 days & client systems connect with KMS host at least once every 180 days for all Microsoft Office Client Products MAK • No minimum number of PC’s for activation • Best for computers rarely connected to organization’s network • Is one time activation with Microsoft hosted activation service • Supports online, phone or proxy (VAMT) activations; use VAMT when activating Volume Activation in Office 2010 • End-user experience • Customizable user experience for enterprise • Notification dialog prompts Ease of activation in deployment • Inclusion of virtual systems in customer hosted activation service (KMS) • KMS clients pre-installed with KMS client key Assurance • • Helps protect against counterfeit Delivers all Office 2010 capabilities Supportability • • Requires low deployment / management effort Ensures full Microsoft / partner technical assistance • Key management & reporting through Volume License Service Center (VLSC) • Tools for better manageability • One stop Volume Licensing Service Center portal Manageability • • Reduces reuse of leaked keys Integrated into deployment process and tools License Compliance and Management Provides access to upgrades and contract options Helps avoid penalties, reputation damage, and business interruption User experience in MAK asking for activation if VAMT is not used to orchestrate activation User experience in KMS if not activated in 30 days (no UI experience in first 25 days) • Where a sufficient number of systems exist, use KMS • Use KMS as much as possible, and minimize the number of KMS hosts • Use MAK only where needed • • Customers will probably need to use both methods KMS port (1688 by default) should never be exposed outside the organization • Volume Activation Management Tool (VAMT) 2.0 • Software licensing management script (slmgr.vbs) Microsoft Confidential Microsoft Confidential http://technet.microsoft.com/en-us/office/ee691939.aspx http://connect.microsoft.com https://partner.microsoft.com/office2010activation Microsoft Confidential