Microsoft Goals Engineer a product less vulnerable to piracy and counterfeit Provide set of tools to help ensure a more managed installation environment.

Slides:



Advertisements
Similar presentations
Volume activation.
Advertisements

Speaker Name, Title Windows 8 Pro: For Small Business.
Selecting the Right Network Access Protection (NAP) Architecture Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Agenda Why are we doing this? What are we talking about? Whats similar to what you know? Whats different from what you know? Lets see it in action! Parting.
A Large Account Reseller’s Guide to the Get Genuine Windows Agreement for Large Organizations (GGWA-LO)
Which would you choose? Filled with air. Possibly filled with air.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Ted Way Program Manager Microsoft Corporation SESSION CODE: OSP04-INT Ramesh Yerramsetti Senior Product Manager Microsoft Corporation Darryl Mondrow Writer.
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
The future of Desktops Transform Your Desktop with Virtualization.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Kim Griffiths Sr. Product Manager Microsoft Corporation
Vista Volume Activation Overview VLK 2.0 Anders Björling Senior Consultant Microsoft.
Benefits, Risks and Service Desk Impact. Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Kalpesh Patel Ramprabhu Rathnam
ProSupport Plus for PCs and Tablets
Windows Server 2008 SPLA Product Lineup. Windows Server 2008 Launch January SPUR / March Price List Removed: –External Connectors –Anonymous Standard/Enterprise.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Windows Vista Product Activation And The Fashionable LSP
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Virtual techdays INDIA │ November 2010 Windows Virtual PC & Windows XP Mode Aviraj Ajgekar │ Regional Site Manager │ Microsoft Corporation Blog:
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
Volume Licensing Service Center Overview Presentation V1.0 August 2007.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Windows Vista: Volume Activation 2.0
Get More from Your Software The Genuine Windows Vista™ Experience.
PlanningMigrationConfigurationDeploymentOperations.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Installing Microsoft Windows Server 2008 Lesson 2.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Introduction to Windows XP Professional Chapter 2 powered by dj.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Module 1: Server Roles and Initial Configuration Tasks
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Nicholas A. Hay Technology Director Jefferson Schools KEY MANAGEMENT SERVICES.
Module 1 Planning Windows Server ® 2008 Deployment.
Introduction to Cloud Computing
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
MICROSOFT CONFIDENTIAL Windows Server 2008 SPLA Product Lineup and Licensing Changes.
“How can I reduce costs and take advantage of new technologies like virtualization?” “My users are becoming more savvy and have more diverse needs. How.
Vista Licensing Information University of Pennsylvania Office of Software Licensing Mary A. Griffin November 13, 2006.
Which would you choose? It seems obvious, right? With something so important, you need to know what you are getting. Surprisingly, many of your customers.
WCL320: Activating Windows in Enterprise Environment Kalpesh Patel Ramprabhu Rathnam Software Protection Platform Microsoft Corporation.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Setting up Remote Access Brent Reeser Technical Product Manager Windows Server Marketing.
Office 365 is cloud-based productivity, hosted by Microsoft.
InGenius Connector Enterprise Microsoft Dynamics CRM
Customized Solutions to your needs
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Microsoft SharePoint Server 2016
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
SQL Server 2012 Licensing Overview.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Deploying and Managing Windows To Go
Preparing for the Windows 8.1 MCSA
Presentation transcript:

Microsoft Goals Engineer a product less vulnerable to piracy and counterfeit Provide set of tools to help ensure a more managed installation environment Help reduce VL key leakag e Customer Focused Goals Enhance ease of deployment with minimal impact to VL customers Provide Multiple and Flexible options Strong and transparent Microsoft privacy policy around activations

ACTIVATION HISTORY BACKGROUND: MICROSOFT OFFICE 2007 Volume Activation (VA) introduced in Windows Vista VA is now the standard for new Operating systems and Office Client products Identified non- genuine software displays permanent word-mark on screen Re-activation required for a copy determined as non- genuine at a later date - failure to re- activate results in loss of functionality VA ensures customers receive and deploy legitimate software Activation required for all VL Office Client products Provisioned and managed by IT Pros Transparent end user experience Pirated/ Counterfeit Software Some Customers unwillingly deploy counterfeit software Malware in counterfeits result in higher support costs Expensive down time Associates the proof-of- license (5*5 product keys) to the device Activation establishes a relation between a license you purchase and product on which you exercise the licensing rights Activation not required for Office2010 Server products Applies to Windows and Microsoft Client products Enterprises were given “bypass” volume license keys These Keys bypassed activation as no activation was required after entering product key Keys were easily compromised

Eliminates need for individual clients to connect and activate with Microsoft Eliminates need for individual clients to connect and activate with Microsoft Product key is pre-installed on clients Product key is pre-installed on clients Eliminates need for individual clients to connect and activate with Microsoft Eliminates need for individual clients to connect and activate with Microsoft Product key is pre-installed on clients Product key is pre-installed on clients KMS clients must connect with KMS host at least once every 180 days to keep activation current KMS clients must connect with KMS host at least once every 180 days to keep activation current Transparent end user experience Transparent end user experience Capable of activating hundreds of systems, as long as minimum threshold is established and maintained Capable of activating hundreds of systems, as long as minimum threshold is established and maintained One time activation with Microsoft hosted serviceOne time activation with Microsoft hosted service Supports online, phone and proxy activationSupports online, phone and proxy activation One MAK key per product per organizationOne MAK key per product per organization Flexible options to install MAK on each PC clientFlexible options to install MAK on each PC client Office Customization Tool (OCT)Office Customization Tool (OCT) Automated install file (Config.xml)Automated install file (Config.xml) Change key in BackstageChange key in Backstage Volume Activation Management Tool (VAMT) 2.0Volume Activation Management Tool (VAMT) 2.0 Key Management Service (KMS ) Multiple Activation Key (MAK)

Multiple Activation Key (MAK) for activating with Microsoft One time activation with Microsoft hosted activation service Supports online, phone or proxy activations Multiple Activation Key (MAK) for activating with Microsoft One time activation with Microsoft hosted activation service Supports online, phone or proxy activations Key Management Service (KMS) for enabling local activation Eliminates the need for individual machines to connect and activate with Microsoft Capable of activating unlimited number of systems, as long as the minimum threshold is established and maintained Client must connect with KMS host at least once every 180 days to keep activation current Key Management Service (KMS) for enabling local activation Eliminates the need for individual machines to connect and activate with Microsoft Capable of activating unlimited number of systems, as long as the minimum threshold is established and maintained Client must connect with KMS host at least once every 180 days to keep activation current MAK VAMT Image KMS Host KMS Client KMS DNS

Internal External KMS host key automatically available to customers via normal channels Install KMS host key on KMS host Activate KMS service with Microsoft -One time activation of KMS host -KMS host registers SRV with DNS Activate KMS service with Microsoft -One time activation of KMS host -KMS host registers SRV with DNS KMS client discovers KMS host KMS client activates - # of Office KMS clients ≥ 5 KMS client activates - # of Office KMS clients ≥ 5 KMS client regularly re-activates - Non-perpetual activation (180 days) - Communication between KMS host and KMS client is never exposed to Microsoft KMS client regularly re-activates - Non-perpetual activation (180 days) - Communication between KMS host and KMS client is never exposed to Microsoft KMS Host KMS Client Microsoft Hosted Activation Services One Time DNS Volume License Agreement

Operating SystemOfficeWindows Windows Server 2003√√ Windows Vista√ Windows Server 08√ Windows 7 VL√√ Windows Server 2008 R2√√

Microsoft Hosted Activation Services One Time Internal External Volume License Agreement MAK key available to volume license customers Install the MAK on the client: OCT, config.xml, Backstage Install the MAK on the client: OCT, config.xml, Backstage Activate with Microsoft Online, Telephone Activate with Microsoft Online, Telephone One-time activation Hardware changes require reactivation One-time activation Hardware changes require reactivation Image

Internal External MAK key available to volume license customers Enter the MAK key in VAMT 2.0 IID sent, confirmation ID received (unique to each MAK client) IID sent, confirmation ID received (unique to each MAK client) Perpetual activation: Hardware changes require reactivation Perpetual activation: Hardware changes require reactivation VAMT 2.0 pushes key to clients, receives installation ID (IID) Each MAK client receives unique conf ID Microsoft Hosted Activation Services One Time Volume License Agreement VAMT 2.0

As an IT Pro, you must be aware that volume activation is part of your Office 2010 deployment Why it’s important Familiar but better Flexible, compatible options VA is for virtual, too Resources Privacy and security VL activation never prevents an end-user from using Office 2010 Activation Activation establishes a relationship between the software’s product key and software on the device Activation helps ensure you are using genuine Office 2010 software, providing access to the latest features and protection against the malicious code common in counterfeit software Volume Activation in Office 2010 builds on Vista and Windows 2008 Microsoft has a variety of tools to help make deployment and management simple and easy Key Management Services (KMS): preferred method, ideal for vast majority of environments Multiple Activation Key (MAK): machine independent Virtual machines count toward minimum req. VA makes activation of virtual systems easy 5 connected systems (PCs, servers, laptops) All information is private and not used by Microsoft or any other party Enhanced data security

End-user experience Customizable user experience for enterprise Notification dialog prompts Supportability Requires low deployment / management effort Ensures full Microsoft / partner technical assistance Manageability Reduces reuse of leaked keys Integrated into deployment process and tools License Compliance and Management  Provides access to upgrades and contract options  Helps avoid penalties, reputation damage, and business interruption Assurance Helps protect against counterfeit Delivers all Office 2010 capabilities Significant change in Volume Activation process for XP customers Executed by IT Pros as part of deployment Volume Activation has nominal IT impact Requires no end-user action Microsoft does not collect user data No additional hardware is required KMS Recommended default method Enables local activation of unlimited number of systems Requires: At least 5 Office systems connecting to KMS host in any given 30 days & client systems connect with KMS host at least once every 180 days for all Microsoft Office Client Products MAK No minimum number of PC’s for activation Best for computers rarely connected to organization’s network Is one time activation with Microsoft hosted activation service Supports online, phone or proxy (VAMT) activations; use VAMT when activating Volume Activation in Office 2010 Ease of activation in deployment Inclusion of virtual systems in customer hosted activation service (KMS) KMS clients pre-installed with KMS client key Key management & reporting through Volume License Service Center (VLSC) Tools for better manageability One stop Volume Licensing Service Center portal Key Changes

User experience in KMS if not activated in 30 days (no UI experience in first 25 days) User experience in MAK asking for activation if VAMT is not used to orchestrate activation

Microsoft Confidential