Documente online.
Zona de administrare documente. Fisierele tale
Am uitat parola x Creaza cont nou
 HomeExploreaza
upload
Upload




Volume Activation Management Tool - Step by Step Guide

software


Volume Activation Management Tool

Step-By-Step Guide

Microsoft® Corporation



Published: February 2007

Purpose

This guide provides an overview of various features of the Volume Activation Management Tool (VAMT) and provides prescriptive guidance on how to perform MAK Independent and MAK Proxy activation of Windows Vista and Windows Server codename "Longhorn" computers using a Multiple Activation Key (MAK).

Who Should Use the Volume Activation Management Tool?

This guide is targeted at IT professionals who are responsible for deploying and managing MAK activations for Windows VistaT or Windows Server codename "Longhorn" computers.

Information in this document, including URL and other Internet Web site references, is subject to change without notice.

Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.

Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

© 2007 Microsoft Corporation. All rights reserved.

Microsoft, Active Directory, ActiveX, Windows, Windows 2000, Windows Server, Windows Vista, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Contents

Volume Activation Management Tool

Step-By-Step Guide

Introduction

Problem

Volume Activation 2.0 Solution

Benefits of Volume Activation 2.0

Volume Activation Management Tool Overview

VAMT Processes

VAMT Known Issues

Volume Activation Management Tool Scenarios

MAK Independent Activation

MAK Proxy Activation

Client Configuration

Volume Activation Management Tool Privacy Statement

Additional Resources

Introduction

Problem

Software asset and license management pose continual challenges for both enterprise customers as well as software developers.   The issue of genuine software (running legitimately licensed operating systems and applications as opposed to illegitimate software) not only impacts the software vendors but the consumers, corporate users and partners. Yankee group (sponsored by Microsoft) in its research concluded that consumers and businesses that deploy counterfeit software put themselves, their end users, business partners and suppliers at serious risk for:

Network downtime and lost data increases when the counterfeit software malfunctions.

Technical service and support and interoperability issues involving counterfeit software typically take longer to resolve because either the gray market source is long gone or the legitimate software vendor will spend more time trying to troubleshoot.

Businesses that knowingly or unwittingly use counterfeit software are at increased risk of litigation from business partners, suppliers and customers in the event their network operations are adversely affected when something goes awry with the pirated software.

Non-genuine software also raises the risk of incompatibility with legitimate Windows and Office patches, fixes and updates.

Research by IDC (sponsored by Microsoft) shows that acquiring and using counterfeit software can pose real risks.  The research examined websites that offer counterfeit software as well as hacks, cracks and 'keygen' tools available on websites and P2P networks that enable the illegal use of software. The research found there is a significant amount of malicious or unwanted code present in key generators and crac 14114v2121o k tools, and on websites that offer counterfeit software. Specifically, malicious or unwanted software was found in:

25% of the Web sites (25 of 98 sites) offering counterfeit product keys, pirated software, key generators or crack tools

11% of key generators and crac 14114v2121o k tools (13 out of 116) downloaded from websites

59% of key generators and crac 14114v2121o k tools (55 of 94) downloaded from P2P networks

Finally the previous versions of Microsoft Windows didn't provide tools and solutions to enterprise customers that are necessary to protect and manage the software and the associated license keys. Enterprise customers had no ability to track the key usage or control its use within as well as outside of their managed environment.

For these reasons, Microsoft continually invests in technologies and programs to help protect consumers and businesses from the risks and hidden costs of counterfeit and unlicensed software while enabling the enterprise customers in their software asset and license management efforts.

Volume Activation 2.0 Solution

Volume Activation 2.0 is a new requirement in the Windows VistaT and Windows Server® Code Name "Longhorn", which requires activation of each Windows Vista license acquired under a Volume License agreement. When designing and building the new volume activation technologies, Microsoft focused on the following goals:

Close significant piracy loopholes (Volume License keys represent the majority of the keys that are involved in Windows piracy.)

Enable protection and management of volume license keys with minimal impact to deployment and management of the infrastructure

Improve the customer experience

Volume Activation 2.0 is designed to help increase protection and to help better manage the Volume License keys in managed and non-managed environments as well as provide flexible deployment options for customers. The process is transparent for end users, and the Volume Activation 2.0 solution works in a variety of customer environments.

Benefits of Volume Activation 2.0

Volume Activation 2.0 supports centrally managed Volume License keys. The Key Management Service (KMS) key used for KMS activation is only installed on the KMS host and never on individual computers. The Multiple Activation Key (MAK), although resident on the individual computer, is encrypted and kept in a trusted store so that users are not exposed to the key and are not able to obtain the key once it has been installed on the computer.

Volume Activation 2.0 supports a simplified setup and is generally invisible to the customer. By default, Volume editions do not require a product key to be entered during setup. The computer must be activated during an automatic 30-day grace period.

System Administrators can count KMS activations using standard system management software including the Microsoft Operations Manager (MOM), as well as the Volume Activation Management Tool (VAMT). Windows Management Infrastructure (WMI), extensive event logging, and built-in Application Programming Interfaces (APIs) may provide a wealth of detail about installed licenses and about the license state and current grace or expiration period of MAK and KMS-activated computers.

Volume Activation 2.0 may provide enhanced security through frequent background validations for genuine modules. This is currently limited to critical software, but may be expanded over time.

Volume Activation Management Tool Overview

The Volume Activation Management Tool (VAMT) enables organizations to optimize their desktop deployment infrastructure with features such as performing MAK proxy activation, reporting on the activation status of all machines in the environment, and returning current MAK activation count(s). This tool is designed to run as a stand-alone application on any Windows machine (Windows XP, Windows Server 2003, or Windows Vista). VAMT enables IT pros to automate and centrally manage the volume activation process using MAK Key:

MAK independent activation - Many enterprises maintain a single system image for deployment across the enterprise. MAK independent activation enables enterprise customers to distribute a MAK key to one or more connected computers within their network and to optionally instruct those computers to activate over the Internet immediately.

MAK proxy activation - This activation method is designed for environments that preclude direct access to the Internet- where the only current method of activation is phone activation. MAK proxy activation enables enterprise customers to acquire and send a list of installation IDs to the Microsoft activation clearinghouse. The proxy retrieves the corresponding confirmation IDs and distributes them to the client computers. Additionally, export/import functionality enables activation in a disconnected environment.

VAMT is designed to manage MAK activation for computers running Microsoft Windows Vista or Windows Server codename "Longhorn". Computers running volume editions of Microsoft Windows XP or Windows Server 2003 cannot be managed using VAMT.

VAMT Processes

VAMT features are detailed in the VAMT.CHM and listed below.

Adding Computers - Discovering and grouping computers from the local environment. VAMT can discover computers by querying Active Directory, Workgroups, or by individual computer name or IP address.

Status Collection and Reporting - VAMT collects information on listed computers including the product key being used, the current license state (Licensed, Grace, and Unlicensed), the Operating System and the edition of Windows being run.

MAK Management - VAMT stores one or more MAKs in the Computer Information List (CIL) file. This allows the user to query the Activation database to determine the number of activations remaining for their organizations MAKs. The CIL is a XML file, and readable with any TEXT editor such as Notepad. Administrators should ensure that CIL files are stored securely.

MAK Independent Activation - This process applies a MAK to selected computers and allows them to self-activate via the Internet. Selected computers can also be instructed to activate immediately.

MAK Proxy Activation - The MAK Proxy Activation extracts the IID from selected computers. That IID is transmitted to Microsoft's activation servers. The VAMT host receives a CID - the Confirmation ID - for each IID submitted. These CIDs are matched up with the IIDs and other information on the VAMT host, and the CIDs are installed to the proper client computers, activating them.

Importing and Exporting Data - VAMT stores data in a CIL (Computer Information List) file, in XML format. VAMT can export this data for transport to other VAMT hosts or for archival. The Exported CIL contains all the data necessary for MAK Proxy Activation. The CIL can be imported on a separate VAMT host, allowing systems to be Proxy activated in bulk without direct connection to the Internet. A primary use for this technology is support for isolated, high-security networks. For cases in which security is paramount, the Export can be restricted to only non-PII (Personally Identifiable Information). Likewise, VAMT can import CIL files: the computer records in the CIL can be presented to Microsoft for a corresponding CID, or the data can be merged with existing computer groups. This is useful for archiving the Computer groups and status, as well as recording the CIDs for reuse, and is a necessary step in MAK Proxy Activation. A secure export containing non-PII data must be merged into a full saved CIL file in order for VAMT to correctly match IID/CID to computer names.

VAMT v1.0 is only available in an EN-US (x86) version and includes a CHM file which provides details on various VAMT features.

VAMT Known Issues

Step 14: Reimaging Scenario for Isolated Labs (OPTIONAL) in the VAMT.CHM is incorrect. Specifically, Installing a MAK on a computer will write an IID in the CIL file and also delete the CID, if it exists. The solution in the Reimaging Scenario is to reopen the existing CIL file before selecting Apply Confirmation ID as documented below

Volume Activation Management Tool Scenarios

This section illustrates the use of MAK activation and the Volume Activation Management Tool (VAMT) in two scenarios:

MAK Independent Activation

MAK Proxy Activation

The following diagram depicts several environments common to large organizations. This guide details the use of VAMT to activate Vista Volume Edition computers in the Core Network and Isolated Lab environments shown below.

Figure1: Sample Network

MAK Independent Activation

In this scenario VAMT is deployed in the Core Network environment shown in the diagram above. In the Core Network environment, all computers are on a common network managed by Active Directory. VAMT is installed on a central computer with network access to all client computers. Both the VAMT host and client computers have access to the Internet.

Step 1: Install and launch VAMT

  1. Download VAMTInstall.msi to the host computer. This may be Windows XP SP2, Windows Server 2003, Windows Vista or Windows Server codename "Longhorn".
  2. Double click on VAMTInstall.msi to start the installation wizard. Follow the prompts to complete the installation.
  3. The installation will place an icon for the Volume Activation Management Tool (32 bit) in the start menu.
  4. Click the Volume Activation Management Tool to launch the VAMT Console.

Step 2: Configure WMI Firewall Exception on Target Computers

  1. For all target computers, ensure that the WMI firewall exception has been enabled. For more information, see Client Configuration

Step 3: Add computers to the Computer Information List (CIL)

  1. Launch VAMT
  2. Click on Action -> Add Computers to view the Add Computers dialog.
  3. Enter a Group name to identify a group of computers such as "Core Network Group".
  4. Click on the dropdown to select a discovery option. The 3 options are: Computer name or IP address, Active Directory, or Workgroup. Since this is an Active Directory environment, select "Search for computers in the Active Directory."
  5. In the Domain Filter criteria box select a domain name from the dropdown.
  6. Click OK.
  7. VAMT will query Active Directory via LDAP and will add the computers it finds to the CIL.

Step 4: Collect Status for the Discovered Computers

  1. VAMT requires the license status of the computers it operates on.  Collect status on individual computers by directly selecting one or more in the right pane computer list. To perform operations for an entire group, in the left pane, select the node "Status Unknown," or the node "User Defined Groups - > Core Network Group".
  2. Right click the group or the desired computers to display the context Action menu.
  3. On the Action menu click Refresh Computer Status
    1. Select Current Credentials if VAMT is being run by a user is a member of the Domain Administrators group.
    2. Use Alternate Credentials (if current user is not a Domain Administrator) and click OK. Provide a Domain Administrator account (to collect status from all computers in the domain) and password when prompted.
  1. VAMT will display the "Collecting computer information" dialog while it collects the status of all selected computers. 

Note:   To retrieve the licensing status on the selected computers, VAMT must have administrative permissions on the remote computers, WMI must be accessible through the Windows firewall, and for workgroup computers a registry key must be created to enable remote administrative actions under User Account Control (UAC). See Client Configuration for more details.

Step 5: Enter a MAK Key and Determine its Activation Capacity

  1. Select Options -> Manage MAKs to bring up the Manage MAK dialog.
  2. Click on Add to enter a MAK. Enter your MAK product key. Click Validate. Once validated, the Edition field will automatically populate.
  3. Provide a meaningful description and click Add. The MAK should be listed in the Manage MAK Keys dialog.
  4. Click Refresh remaining count to retrieve the number of remaining activations for the listed MAK keys from Microsoft. This step requires Internet connectivity.
  5. Click Exit to close the dialog.

Step 6: MAK Independent Activation

  1. Select computers to activate directly from the right pane or a group from the VAMT left pane.
  2. Right click on the selected group to display the context Action Menu.
  3. On the Action menu click MAK Independent Activate to display the MAK Independent Activate dialog.
  4. Select an appropriate MAK from the Install MAK dropdown list.
  5. Click the Install MAK (overwrite existing) and Activate Now checkbox to tell the selected computers to activate immediately.
  6. Click OK.
  7. VAMT will display the "Assigning Product Keys" dialog.
  8. VAMT will display the "Activating Computers" dialog until it completes the requested action.

The computers in the Core Network group should all be activated as MAK clients.

Note:   Selecting the Install MAK (overwrite existing) checkbox will force installation of the MAK.  This must be done with care.  If the computer has run for more than 30 days, then its Initial Grace period has expired and it will be put into Reduced Functionality Mode (RFM) if MAK Independent Activation is not completed successfully before the next logon. VAMT can be used to recover properly configured remote computers from RFM as long as they are accessible on the network.

MAK Proxy Activation

MAK proxy is usually performed in environments that have more constraints than the core network, above. Use MAK Proxy Activation for Isolated Lab environments that do not have direct access to the Internet. In this scenario VAMT is deployed to the Isolated Lab environment shown in the diagram above. This environment is physically separate from the rest of the network and the computers are members of a workgroup. The Network Security Policy states that no information can be transferred out of the Isolated Lab that could identify a specific computer or user.

Step 1: Install and launch VAMT on a computer in the Isolated Lab

  1. Copy the VAMTInstall.msi to a computer - this may be Windows XP SP2, Windows Server 2003, Windows Vista or Windows Server codename "Longhorn" - in the isolated lab.
  2. Double click on VAMTInstall.msi to start the installation wizard. Follow the prompts to complete the installation.
  3. The installation will place an icon for the Volume Activation Management Tool (32 bit) in the start menu.
  4. Click the Volume Activation Management Tool to launch the VAMT Console.

Note: This scenario assumes that a second VAMT host with Internet access exists outside of the Isolated Lab.

Step 2: Configure WMI Firewall Exception on Target Computers

  1. For all target computers, ensure that the WMI firewall exception has been enabled. For more information, see Client Configuration

Step 3: Add computers to the Computer Information List (CIL)

  1. Launch VAMT
  2. Click on Action -> Add Computers to view the Add Computers dialog.
  3. Enter a Group name to identify a group of computers such as "Isolated Lab Group".
  4. Select the "Workgroup" discovery option and specify the name of the Workgroup.
  5. Click OK.
  6. VAMT will search the workgroup for computers.

Note:   For VAMT to discover client computers in a workgroup, the Windows firewall exception "Network Discovery" must be enabled.

Step 4: Collect Status for the Discovered Computers

  1. VAMT requires the license status on the computers it operates on.  Collect status on individual computers by directly selecting one or more in the right pane computer list. To perform operations for an entire group, in the left pane, select the node "Status Unknown," or the node "User Defined Groups - > Isolated Lab Group".
  2. Right click on Isolated Lab Group to display the context Action menu.
  3. Click Refresh Computer Status.
  4. Select Use Alternate Credentials (if required) and press OK. Provide an account and password that has local administrator credentials on the selected computers. VAMT will display the Collecting computer information dialog while it collects the licensing status. 

Note:   To retrieve the licensing status on the selected computers, VAMT must have administrative permissions on the remote computers, WMI must be accessible through the Windows firewall, and for workgroup computers a registry key must be created to enable remote administrative actions under User Account Control (UAC). See Client Configuration for more details.

Step 5: Enter a MAK Key

  1. Select Options -> Manage MAKs to bring up the Manage MAK dialog.
  2. Click on Add to enter a MAK.
  3. Enter your MAK product key. Click Validate. Once validated, the Edition field will automatically populate.
  4. Provide a meaningful description and click Add. The MAK should be listed in the Manage MAK Keys dialog.
  5. Click Exit to close the dialog.

Note: Since VAMT is not being run from a computer with internet access, clicking on Refresh Remaining Count will not operate. This function can only be performed using VAMT on a computer with Internet access.

Step 6: Use MAK Proxy Activation to install a MAK on computers in the Isolated LAB

  1. Select the Isolated Lab Group in the Tree view.
  2. Right click to display the context Action menu.
  3. On the Action menu click MAK Proxy Activate.
  4. Select a MAK from the Install MAK dropdown list.
  5. Check the Install MAK (overwrite existing) checkbox.
  6. Un-select the Get Confirmation ID from Microsoft checkbox as this computer does not have Internet access.
  7. Un-select the Apply Confirmation ID and Activate checkbox. Confirmation IDs have not yet been requested.
  8. Click OK.
  9. VAMT will display the "Assigning Product Keys" dialog while it applies the MAK to the Isolated Lab Group.

Note:   Selecting the Install MAK (overwrite existing) checkbox will force installation of the MAK.  This must be done with care.  If the computer has run for more than 30 days, then its Initial Grace period has expired and it will be put into Reduced Functionality Mode (RFM) if MAK Independent Activation is not completed successfully before the next logon. VAMT can be used to recover properly configured remote computers from RFM as long as they are accessible on the network.

Step 7: Save the CIL

In this step, the full CIL is saved on the local VAMT host. In MAK Proxy Activation, it is critical to retain this file. VAMT uses this information to apply the CIDs to the proper computers in Step 10, below

  1. Select computers directly from the Computer List or via the Tree view that successfully received a MAK in the last step.
  2. Click Save on the File Menu to display the "Save the Computer Information List" dialog
  3. Enter a directory and filename (e.g. IsolatedLabGroup.CIL )
  4. Click Save.

Step 8: Export the CIL

As stated above, the Security Policy for this Isolated Lab requires that no PII (Personally Identifiable Information) can be transferred from the Isolated Lab. A secure export should be performed to ensure that only product activation related information is stored in the CIL file to be transferred to the Core Network.

  1. Select computers directly from the Computer List or via the Tree view that successfully received a MAK in Step 4.
  2. Right click on the selected group to display the context Action menu.
  3. Click Export Computers to display the "Save the Computer Information List" dialog. Check Exclude any sensitive environment data checkbox.
  4. Click Browse to display the "Save Computer Information List" dialog.
  5. Select a directory and enter a filename e.g. IsolatedLabGroupSecureExport.CIL.
  6. Click Save, and click Save.
  7. Copy the file IsolatedLabGroupSecureExport.CIL to removable media (disk drive, CD/DVD, or USB drive).

Note: Checking the Exclude any sensitive environment data checkbox excludes all Personally Identifiable Information (PII) from being saved in the CIL. Because of this, the CIL must be re-imported in this VAMT host and into the Full Save CIL file, so the CIDs requested from Microsoft (below) can be correctly assigned to the computers in the Isolated Lab Group. For more information on which fields are preserved in a secure export see Contents of the CIL (Computer Information List) in the VAMT.CHM file.

Step 9: Import the CIL on a VAMT Host with Internet Access

  1. Copy IsolatedLabGroupSecureExport.CIL from the removable media to a drive on the VAMT host with Internet access. In this example, use the VAMT host in the Core Network from Scenario 1.
  2. Launch VAMT.
  3. Select File -> Import to launch the "Open Computer Information List" dialog.
  4. Locate and select IsolatedLabGroupSecureExport.CIL and click Open to load the CIL into VAMT.
  5. Note that the Computer, Group and Workgroup names are not visible. 

Step 10: Use MAK Proxy Activation to request CIDs (Confirmation IDs) from Microsoft

  1. Select the imported computers and right click to display the context Action Menu.
  2. Click MAK Proxy Activate.
  3. Un-check the Install MAK (overwrite existing) checkbox.
  4. Select the Get Confirmation ID from Microsoft checkbox.
  5. Un-select Apply Confirmation ID and Activate. This VAMT host is not on the same network as the selected computers.
  6. Click OK.
  7. VAMT displays the "Getting a confirmation ID online" while it contacts Microsoft and collects the CIDs.

Step 11: Save the CIL from the Internet Connected VAMT Host

  1. Once the confirmation IDs have been retrieved for all computers, save the CIL. Scroll to the right in the VAMT console and ensure the Pending Confirmation ID column has values.
  2. Click Save As on the File Menu and provide a new name for the file IsolatedLabGroupSecureExportwithCID.CIL
  3. Copy the updated file IsolatedLabGroupSecureExportwithCID.CIL to removable media (disk drive, CD/DVD, or USB drive).

Step 12: Import the CIL on the original VAMT host within the Isolated Lab

  1. Copy IsolatedLabGroupSecureExportwithCID.CIL from the removable media onto a drive on the VAMT host in the Isolated Lab.
  2. Launch VAMT.
  3. Select File -> Open to launch the "Open Computer Information List" dialog.
  4. Locate and select IsolatedLabGroup.CIL (saved in Step 7) and click Open to load the CIL into VAMT.
  5. The previously discovered computers and their license state should be displayed in the right pane.
  6. Select File -> Import and browse to the file with the CIDs: IsolatedLabGroupSecureExportwithCID.CIL
  7. The merging process will match up the Confirmation ID's for each computer's Installation ID.
  8. Select File -> Save and enter in a file name IsolatedLabGroupwithCID.CIL to save this file with the IID and CID.

Note: Saving a file that combined IID and CID is important in reimaging scenarios as described in Step 14.

Step 13: Use MAK Proxy Activation to Apply the CIDs and Activate the Isolated Computers

  1. Select the Isolated Lab Group in the Tree view.
  2. Right click to display the context Action Menu.
  3. Click MAK Proxy Activate to open the Proxy Activation window.
  4. Uncheck the Install MAK (overwrite existing) checkbox. The selected computers already have a MAK installed.
  5. Uncheck the Get Confirmation ID from Microsoft checkbox.
  6. Select the Apply Confirmation ID and Activate checkbox. This instructs VAMT to activate the selected computers by installing the corresponding CID.
  7. Check "Use Alternate Credentials" (if required) and press OK. Provide an account and password that has local admin rights on the selected computers.
  8. VAMT will display the "Applying a Confirmation ID" window while it installs the CIDs to the selected computers. The computers in the Isolated Lab should now all be active.

Step 14: Reimaging Scenario for Isolated Labs (OPTIONAL)

If the computers in the Isolated Lab have been reimaged and the underlying hardware has remained the same, the computers can use the existing IsolatedLabGroupwithCID.CIL file for activation. It is strongly recommended to back up this file and to protect it from being overwritten.

  1. Redeploy the operating system to each computer.
  2. Start VAMT and select File -> Open and choose IsolatedLabGroupwithCID.CIL
  3. Select the Isolated Lab Group in the left pane, right click to show the context Action menu and choose MAK Proxy Activate.
  4. Check only Install MAK (overwrite existing) and ensure that the previously used MAK is selected.
  5. Uncheck the Get Confirmation ID from Microsoft checkbox.
  6. Uncheck the Apply Confirmation ID and Activate checkbox.
  7. Click OK.
  8. VAMT will display the Assigning Product Keys dialog while it applies the MAK to the Isolated Lab Group.
  9. Once the MAK has been reinstalled on all computers, Close VAMT without saving changes.
  10. Re-open IsolatedLabGroupwithCID.CIL.
  11. Select the desired computers or group and choose MAK Proxy Activate from the context Action menu.
  12. Uncheck the Install MAK (overwrite existing) checkbox. The selected computers already have a MAK installed.
  13. Uncheck the Get Confirmation ID from Microsoft checkbox.
  14. Select the Apply Confirmation ID and Activate checkbox. This instructs VAMT to install the CIDs to the corresponding computers, which will activate them.
  15. Check Use Alternate Credentials (if required) and press OK. Provide an account and password that has local administrator permissions on the selected computers.
  16. VAMT will display the Applying a Confirmation ID window while it installs the CIDs to the selected computers. The computers in the Isolated Lab should now all be active.

Note:   Selecting the Install MAK (overwrite existing) checkbox will force installation of the MAK.  This must be done with care.  If the computer has run for more than 30 days, then its Initial Grace period has expired and it will be put into Reduced Functionality Mode (RFM) if the system is not activated successfully before the next logon. VAMT can be used to recover properly configured remote computers from RFM as long as they are accessible on the network.

Client Configuration

This section describes the configuration changes required on all client computers to enable the VAMT tool to function correctly. An exception must be set in the client firewall. For computers in a workgroup, a registry key must be created and set properly or User Access Control (UAC) will not allow remote administrative operations.

In organizations where VAMT will be widely used may benefit from having these changes inside the master client image for Windows Vista or Windows Server codename "Longhorn".

Configure Windows Firewall to allow VAMT Access

  1. In Control Panel, double-click Security, Windows Firewall Settings
  2. Click the Exceptions tab.
  3. Select the Windows Management Instrumentation (WMI) check box.
  4. Click OK.

Figure 2: WMI firewall exception

Note: By default Windows Firewall Exceptions only apply to traffic originating on the local subnet. To expand the exception to apply to multiple subnets, you need to change the exception settings in the Windows Firewall with Advanced Security as shown below.

Figure 3: Windows Firewall with Advanced Security

Configure Windows Firewall to allow VAMT Access across Multiple Subnets

In Control Panel, double-click System and Maintenance, then Administrative Tools, and then Windows Firewall with Advanced Security.

Select "Inbound Rules" on the Left Pane

For each of the following three WMI items, for the applicable Network Profile (Domain, Public, Private), make the changes (A-C) :

A)     Windows Management Instrumentation (ASync-In)

B)      Windows Management Instrumentation (DCOM-In)

C)      Windows Management Instrumentation (WMI-In)

On the General tab, select the "Allow the connections" checkbox.

On the Scope tab, change the Remote IP Address setting from "Local Subnet" (default) to allow the specific access you need.

On the Advanced tab, verify selection of all profiles that are applicable to the network. (Domain or Private/Public).

In certain scenarios, only a limited set of TCPIP ports are allowed through a hardware firewall. Administrators need to ensure that WMI (which relies on RPC over TCPIP) is allowed through these types of firewalls. By default the WMI port is a dynamically allocated random port above 1024. The following Microsoft knowledge article discusses how administrators can limit the range of dynamically allocated ports. This is useful if for example, the hardware firewall only allows traffic in a certain range of ports.

How to configure RPC dynamic port allocation to work with firewalls:   https://support.microsoft.com/kb/154596

Create a Registry Value for VAMT to Operate against Workgroup Computers

  1. On the client computer, create the following registry key using regedit.exe.
  2. Navigate to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system
  3. Enter the following details:

Value Name: LocalAccountTokenFilterPolicy

Type: DWORD

Value Data: 1

Important: This section contains information about how to modify the registry. Make sure to back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base: Description of the Microsoft Windows registry.

Note: To discover Windows Vista computers in workgroups you must enable network discovery on the client.

Client Configuration Deployment Options

There are several options for organizations to easily configure the WMI firewall exception for computers:

  • Image - Add the configurations to master image deployed out to all clients in the enterprise
  • Group Policy - If the clients are part of a domain, then all clients can be configured using a Group Policy. The Group Policy Setting for the WMI firewall exception are found in GPMC.MSC at: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Inbound Rules
  • Scripted - A script could be executed via SMS (Systems Management Server) or a third-party remote script execution facility.
  • Manual - Performed on each client (steps above)

Administrators need to be aware that the above configurations will open an additional port through the Windows Firewall on target computers and should be performed on computers that are protected by a network firewall. The WMI exception can be disabled (recommended) once each computer has been activated successfully.

Volume Activation Management Tool Privacy Statement

Last updated: February 2007

Microsoft is committed to protecting customer privacy. This privacy statement explains the data collection and use practices of the Microsoft Volume Activation Management Tool. This statement does not apply to other online or offline Microsoft sites, products, or services.

Activation is aimed at reducing software counterfeiting, thereby helping to ensure that Microsoft customers receive the software quality they expect. Once the software is activated, a specific product key becomes associated with the computer (the hardware) on which the software is installed. This association prevents the product key from being used to activate the same copy of the software on multiple computers.  Changes to computer components or the software may require reactivation of the software

The Volume Activation Management Tool (VAMT) activates network-connected volume licensed computers. VAMT also supports scenarios in which client computers are isolated from the Internet as well as providing centralized management for MAK activation.

 Collection of Information

During activation, product key information is sent to Microsoft along with a hardware hash, which is a non-unique number generated from the computer's hardware configuration. The hardware hash does not represent any personal information or information about the software. The hardware hash cannot be used to determine the make or model of the computer and it cannot be backward calculated to determine any additional information about the computer.

In addition, some standard information about the VAMT host will also be sent during activation. Standard computer information generally includes certain information about the computer software and hardware including IP address, operating system version, browser version, a code that identifies the computer's manufacturer and the regional and language settings.

 Use of Information

Microsoft uses the information to confirm that a licensed copy of the software is being activated, and then it is aggregated for statistical analysis. Microsoft does not use the information to identify or contact any customer.

Information that is collected by or sent to Microsoft may be stored and processed in the United States or any other country in which Microsoft or its affiliates, subsidiaries or agents maintain facilities.  Microsoft may disclose this information if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on Microsoft or the site; (b) protect and defend the rights or property of Microsoft and its family of Web sites, or (c) act in urgent circumstances to protect the personal safety of Microsoft employees, users of Microsoft software or services, or members of the public.  Microsoft occasionally hires other companies to provide limited services on its behalf, such as providing customer support, processing transactions, or performing statistical analysis of Setup Reports. Microsoft will provide those companies only the information they need to deliver the service. They are required to maintain the confidentiality of this information and are prohibited from using it for any other purpose.

 Choice and Control

Activation is mandatory and must be completed within a predefined grace period. If you choose not to activate the software, you cannot use it after the grace period expires. If the software is not correctly licensed, you will not be able to activate it.

Changes to this Statement

Microsoft may occasionally update this privacy statement. When we do, we will also revise the "last updated" date at the top of the privacy statement. We encourage you to periodically review this privacy statement to stay informed about how we are helping to protect the information we collect.

 Contact Information

Microsoft welcomes your comments regarding this privacy statement. If you believe that Microsoft has not adhered to this statement, please contact us electronically by clicking here , and we will use commercially reasonable efforts to promptly determine and remedy the problem.

Microsoft Privacy

Microsoft Corporation

One Microsoft Way

Redmond, WA 98052

Additional Resources

The Windows Vista Volume Activation 2.0 Step-By-Step Guide is essential reading and a prerequisite for understanding the Volume Activation Management Tool Step-By-Step Guide. It is available at https://www.microsoft.com/technet/windowsvista/plan/volact1.mspx

Download Technical Documentation and Other Supporting Materials https://go.microsoft.com/fwlink/?LinkID=75674

For answers to frequently asked questions about Windows Vista Volume Activation 2.0, refer to the "Volume Activation 2.0 FAQ" in https://www.microsoft.com/technet/windowsvista/plan/faq.mspx

For information about the Microsoft Solution Accelerator for Business Desktop Deployment (BDD): https://www.microsoft.com/technet/desktopdeployment/bdd/2007/default.mspx

For a list of Volume License products available, go to:

https://www.microsoft.com/licensing/default.mspx


Document Info


Accesari: 18650
Apreciat: hand-up

Comenteaza documentul:

Nu esti inregistrat
Trebuie sa fii utilizator inregistrat pentru a putea comenta


Creaza cont nou

A fost util?

Daca documentul a fost util si crezi ca merita
sa adaugi un link catre el la tine in site


in pagina web a site-ului tau.




eCoduri.com - coduri postale, contabile, CAEN sau bancare

Politica de confidentialitate | Termenii si conditii de utilizare




Copyright © Contact (SCRIGROUP Int. 2024 )