Vista Volume Activation Overview VLK 2.0 Anders Björling Senior Consultant Microsoft.

Slides:



Advertisements
Similar presentations
Volume activation.
Advertisements

Microsoft Goals Engineer a product less vulnerable to piracy and counterfeit Provide set of tools to help ensure a more managed installation environment.
Planning Server Deployments
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Module 5: Creating and Configuring Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Kalpesh Patel Ramprabhu Rathnam
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Windows Vista Product Activation And The Fashionable LSP
Wally Mead Senior Program Manager Microsoft Corporation Session Code: MGT303.
Richard Smith Senior Consultant – Management, Operations and Deployment Microsoft UK Simple Deployments with Windows AIK and Windows DS.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Windows Vista: Volume Activation 2.0
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
GROUP POLICY An overview of Microsoft Windows Group Policy.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Brian Shiers January 6 th, Publisher Word Excel PowerPoint OneNote Outlook Access InfoPath SharePoint Workspace Excel OneNote PowerPoint Word.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Chapter 7: Using Windows Servers to Share Information.
Software Licensing, Made Simple SELECT Server XM Edition
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Nicholas A. Hay Technology Director Jefferson Schools KEY MANAGEMENT SERVICES.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
Week #7 Objectives: Secure Windows 7 Desktop
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Troubleshooting Windows Vista Security Chapter 4.
Module 7: Fundamentals of Administering Windows Server 2008.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Microsoft Management Seminar Series SMS 2003 Change Management.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Vista Licensing Information University of Pennsylvania Office of Software Licensing Mary A. Griffin November 13, 2006.
Module 9 Planning and Implementing Monitoring and Maintenance.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
WCL320: Activating Windows in Enterprise Environment Kalpesh Patel Ramprabhu Rathnam Software Protection Platform Microsoft Corporation.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Fermilab KMS Experiences with Microsoft’s Key Management Server 1 HEPiX Nov 5, 2007 Fermilab KMS Experiences.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Presentation transcript:

Vista Volume Activation Overview VLK 2.0 Anders Björling Senior Consultant Microsoft

Agenda Activation in Vista and Longhorn OEM Key Management Service (KMS) Multiple Activation Keys (MAKs) Supported Scenarios Script for administrative purposes

Activation in Vista and Longhorn There are three activation options for Vista and Longhorn Server. OEM pre-activated machines These machines do not need VLK 2.0 activation KMS (Key Management Service) For managed environments where users are connected to the corporate network MAK (Multiple Activation Key) For decentralized networks where users are rarely or never connected to the corporate network

Vista Volume Activation Scenarios We provide our media to the OEM and get our machines pre-installed from an OEM partner Use OEM (No need for KMS or MAK) Our users are on a managed network and they connect regularly to the domain Use KMS We have a multiple domain, multi-national environment with 100,000 connected PCs Use KMS We have a traveling sales force who are connected to the network less than twice per year Use MAK We have a remote office with it’s own network that has fewer than 25 users Use MAK We send soldiers into the field who may need to re-install and re-activate Vista without access to the internet or phone Use MAK (with Conf ID) We have a completely disconnected lab with 1000 machines that don’t connect to the internet Use MAK (with bulk activation) We have users in a remote area that only has a very slow and potentially expensive link to the internet Use MAK or KMS (modify interval)

Key Management Service Intro Key Management Service (KMS) is the central service in VLK 2.0 that handles volume activation of all clients and servers in an enterprise network. Target: Larger networks (at least 25 machines) that clients machines can regularly connect to. Benefits: Secure and centralized key administration Easy OS roll-out with automatic activation of clients Improved ongoing security Better accounting and trouble shooting Runs on Vista client or Longhorn Server WS2K3 support is planned post Vista RTM

Key Management Service Setup Deploying the KMS service is easy and straight forward Acquire VL Keys and media (same as today via online portal) 2. 2.Install Vista or Longhorn on any machine that will host KMS 3. 3.Install VLK to enable Key Management Service KMS encrypts and stores the VLK in its trusted store for security No other steps required 4. 4.Configure KMS so that clients will be able to communicate with KMS periodically KMS activated machines automatically re-activate, but will go out of tolerance after 180 days if disconnected Configure TCP port and firewall (optional) Configure DNS as needed for KMS discovery

Vista/LH Server Client Setup After the KMS is running, deploy the clients Roll out Vista or Longhorn Server “clients” (using the same methods used to roll-out Windows XP: DVD, Disk Imaging, Remote Imaging - WDS) 2. 2.Optionally configure clients to locate KMS if not using auto- discovery (see next slide) 3. 3.Each client has a 30 day grace period after installation to contact the KMS The first 25 clients to reach KMS are only counted, and kept in KMS list for 30 days Any subsequent client can automatically activate The first 25 automatically retry every 2 hours, and can then activate

KMS Deployment Details KMS Discovery KMS attempts self-registration with DNS (via SRV resource records) DNS may require setting of permissions for KMS depending on network Client query obtains list of all KMS computers in the DNS domain and selects KMS at random KMS Communication Uses anonymous RPC over TCP (must open firewall port) TCP port (default 1688) configurable via WMI (registry key) Requests are asynchronous and lightweight (200 bytes) A single KMS on a desktop machine can handle 20,000 requests / hour Support for users that connect intermittently by automatic sensing when a machine comes online KMS Management WMI support for remote management of clients and KMS service All activity is logged in application event log of clients and KMS Sample reporting utilities and MOM pack will be provided (Not available now)

Multiple Activation Keys (MAKs) If you are not sure if a user will be regularly on the corporate network, issue them a MAK. MAKs can be used multiple times (e.g. 100 activations), but have an upper limit MAK usage can be viewed via Microsoft online portals, and additional activations can be requested at no charge MAKS are protected in the trusted store, but have less ongoing security, and no centralized accounting (like KMS)

Multiple Activation Keys Cont MAKs require key roll-out to each machine. This can be scripted or a MAK can be included in the Vista image. MAKs must activate against MS once per machine either online automatically, or offline using a confirmation ID received via telephone. This confirmation ID can be used multiple times to re- activate the same hardware. Auto-activation of MAKs can be setup by an admin. Bulk MAK activation using the telephone activation system is supported, so that the confirmation ID’s for multiple machines can be received with a single transaction MAK activations do not have any expiration associated with them, but they can go out of tolerance if enough hardware has been changed. Users can change from a KMS activation to a MAK by installing the key

Activation Scenarios & Timeline GraceActivatedRFMGrace Automatic Activation Requests (2 hrs by def) Automatic Activation Renewal Requests (7 days by def) 30 days Re-activation after expiration 180 days (Each renewal extends this to the full 180 days) 30 days User Unable to Log On Automatic Activation Requests (2 hrs by def) 1. 1.Machine automatically activates and re-activates within grace or expiration period 2. 2.Machine goes out of 30 day grace period (or tolerance period) and into reduced functionality mode (RFM, which disables interactive log-on) 3. 3.Admin user installs MAK key and activates within 30 day grace (activation does not expire)

Reduced Functionality Mode “Activate today or some features will no longer work” notifications come up frequently near the end of the grace period before RFM. To fix RFM mode: Connect machine to the corporate network with KMS User with admin privilege can manually change to a MAK key (when attempting to log on – this can also be scripted by IT Pro)

VLK 1.0 Activation VLK 2.0 KMS Activation VLK 2.0 MAK Activation Getting your Keys  Locate Licensing Site or phone the call center  Provide credentials  Acquire VLK  Locate Licensing Site or phone the call center  Provide credentials  Acquire VLK  Locate Licensing Site or phone the call center  Provide credentials  Request / receive MAK Configuration Include VLK in unattend.txt file for deployment Install VLK on KMS machine and configure discovery and communication for KMS service NA OS Installation Install/Deploy Image Grace period NA 30 days to activate ActivationNA Activation happens automatically on the network User with admin privileges enters MAK key (UI or script) and activates online or calls MS for telephone activation Expiration & Re-activationNA Expiration is 180 days. Re-activation against KMS automatically NA Hardware Tolerance NA Hard drive changes will force a need for re-activation within 30 days. Certain hardware changes will force a need for re-activation within 30 days VLK Customer Experience Comparison

Common Questions How does this affect my TCO? The impact on total cost of ownership will vary depending on customer corporate network configuration. In most cases the impact will be very small, requiring no new infrastructure or management. For many customers the additional asset management capabilities built on VLK2.0 will offset any additional IT management costs. New hardware is not required. KMS is lightweight and can co-exist with other services. What are the volume editions that support KMS? Client Business, Client Enterprise, Server Enterprise The client versions are upgrade versions only. Why is the value of “n” set at 25 machines? Extensive research and customer feedback has shown that a network size of 25 machines will balance out a positive customer experience against creation of illegal networks. Customers with networks less than 25 machines will use Multiple Activation keys. Isn’t this just about Microsoft trying to make more money? While decreasing software theft of Windows benefits Microsoft, no enterprise wants to be responsible for illegal use of their volume keys. Improved security and accounting of volume licensing keys and software benefits Microsoft customers.

Built-in Scripting Support cscript C:\windows\system32\slmgr.vbs [ComputerName UserName Password] cscript C:\windows\system32\slmgr.vbs [ComputerName UserName Password] cscript \windows\system32\slmgr.vbs –ato Activate manually cscript \windows\system32\slmgr.vbs –ipk Activate machine and turn it into KMS Server cscript \windows\system32\slmgr.vbs –dbi Display KMS and client license info

Questions?

VLK 2.0 Activation Policies KMS Activation N-Policy (min. # machines per KMS): 25 Expiration period until reactivation: 180 days (30 days for Beta 2 testing) Hardware tolerance: bound to system hard drive Out-of-box grace period: 30 days Out-of-tolerance: 30 days If user has gone beyond expiration or changed their hard drive MAK Activation No N-Policy No expiration Hardware tolerance: Certain hardware changes will require a re- activation, and will count against MAK total. Out-of-box grace period: 30 days Out-of-tolerance: 30 days For changed hardware only