Microsoft Office 2010 Volume Activation
Microsoft Office 2010 Volume Activation
Methods for optimizing manageability
Typical network scenarios
Use KMS
Connected LAN
(Corporate headquarters) More than 50 client computers
KMS Host
One time phone or online activation with
Hosted Activation Services
For 50 or more computers, use KMS: ? Medium organization (50 ? 99 computers): 1 KMS host ? Medium organization (100 - 249 computers): 1 or 2 KMS hosts ? Enterprise (250+ computers): 2 or more KMS hosts
The number of KMS hosts required depends on the computer hardware for the KMS hosts, network infrastructure, and products requiring activation. Lab and pilot testing is highly recommended.
Use MAK
Secure Network Segment
(Branch Office) Fewer than 50 client computers
Use MAK
Limited Internet and Network Access
(Roaming or disconnected computers)
Use MAK Proxy
Isolated Network
(Test or development Lab)
Locked Down
Government or military with no access to Internet
MAK
Microsoft Activation Server
Each client computer connects individually to
Microsoft's activation servers
For fewer than 50 computers: ? MAK (phone or Internet) ? MAK Proxy
If you can open firewalls between clients and existing KMS host, use KMS hosts within the core network
If policy prevents firewall modification: ? If the network segment contains 50 or more computers, use a local KMS host ? If the network segment contains fewer than 50 computers, use MAK or MAK Proxy
Activates by phone
VAMT
MAK Proxy connects to Microsoft's activation servers
For client computers that connect periodically to the core network, use the KMS host(s) in the core network. For client computers that never connect to the core network or have no Internet access, use MAK (phone).
If the environment contains 50 or more computers, use a KMS host. If the environment contains fewer than 50 computers:
? No activation - rearm (reset the grace period) ? MAK (phone) ? MAK Proxy
Customers who are in a high-security installation, such as government or military organizations, may use Token Activation. For more information, contact your Microsoft Technical Account Manager.
Hosted Activation Services (one time, phone or online)
B
KMS
DNS
KMS
C
A
Install key
1
Key Management Service (KMS)
2
3
KMS Host
4
CMID/Date Stamp
5
KMS Host setup
A Install KMS key on KMS Host using SLMGR command.
B KMS host is activated with the KMS key using Microsoft's Hosted Activation Services.
C KMS Service registers SRV resource records in DNS each time it starts.
KMS Client interaction with KMS Host
1 Discover KMS Host using registry entry. If no entry, then query DNS for KMS SRV record.
2 Send RPC request to KMS Host: ? Generate client machine ID (CMID). ? Assemble and sign request (AES encryption. ? On failure, retry--2 hours for computer in Grace, 7 days for KMS activated computer.
3 KMS host adds CMID to table.
4 KMS host returns activation count to client.
5 KMS client evaluates count vs. license policy and activates itself if the activation threshold is met: ? Store KMS Host product ID, intervals, and client hardware ID in license store. ? On success, automatically renew activation every 7 days (default).
KMS Reference
? Default activation method for volume builds of Windows 7, Windows Server 2003, Windows Server 2008 R2, and Office 2010.
? Each KMS key can activate 6 KMS hosts up to 10 times each.
? Each KMS host enables unlimited number of activations.
? KMS clients are activated for 180 days.
? Configurable parameters for the KMS host include Renewal Interval (default 7 days), Retry Interval (2 hours), and Port (1688).
? KMS is autonomous (no replication of data between hosts).
? KMS activation threshold is cumulative between OS types.
MAK Proxy
1
Active Directory or network discovery APIs
3
CIL
4
VAMT
2
MAK
5
1 Find computers through Active Directory or network discovery APIs.
2 Apply MAK and collect installation ID (IID) using WMI. 3 Optionally export computer information to a Computer
Information List (CIL) XML file. 4 Connect to Microsoft through the Internet or by phone and
obtain corresponding Confirmation ID (CID). Optionally update CIL XML file with CIDs. 5 Activate MAK Proxy clients by applying CID.
MAK Independent Activation
VAMT
1
MAK
2
Multiple Activation Key (MAK)
MAK Reference
? The Multiple Activation Key (MAK) is used for one-time perpetual activation with Microsoft's hosted activation services. MAK independent activation is via phone or online.
? Each MAK has a predetermined number of allowed activations, based on an organization's volume license agreement.
1 Distribute MAK using VAMT, as part of an image, using change product key wizard, or using a WMI script.
2 Each MAK client connects once to Microsoft through the Internet or use the telephone for activation.
? 2010 Microsoft Corporation. All rights reserved. To send feedback about this documentation, please write to us at FeedORK@.
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- dd form 261 report of investigation line of duty and
- federal resume tips and examples
- operation c major information theft campaign targets
- ombudsman registry instruction guide for commanders
- home use program
- vendor marketing discounts to government
- ombudsman registry instruction guide for ombudsmen april
- microsoft office professional home use program
- ombudsman registry instruction guide for ombudsmen
- microsoft office 2010 volume activation
Related searches
- microsoft office 2010 for windows 10
- microsoft office 2010 download windows 10
- microsoft office 2010 free download and install
- microsoft office 2010 free download windows10
- microsoft office 2010 download canada
- microsoft office 2010 free download with key
- download microsoft office 2010 full crack
- microsoft office 2010 user manual
- download microsoft office 2010 64 bit free
- microsoft office 2010 instruction manual
- microsoft office 2010 free download
- microsoft office 2010 manual pdf