Volume Activation Scenarios
Each Volume Activation method is best suited to a particular network configuration. To select the best activation method or methods for the organization, assess the network environment to identify how different groups of computers connect to the network. Connectivity to the corporate network, Internet access, and the number of computers that regularly connect to the corporate network are some of the important characteristics to identify. Most mediumsized to large organizations use a combination of activation methods because of the varied ways their client computers connect to their networks.
KMS is the recommended activation method for computers that are well connected to the organization's core network or that have periodic connectivity, such as computers that are offsite. MAK activation is the recommended activation method for computers that are offsite with limited connectivity or that cannot connect to the core network because of security restrictions. These include computers in lab and development environments that are isolated from the core network.
Table below lists common network configurations and the best practice recommendations for each type. Each solution factors in the number of computers and network connectivity of the activation clients.
Volume Activation Recommendations by ScenarioNetwork Infrastructure | Recommendations | Considerations |
Core network Well-connected LAN Most common scenario | If total computers > KMS activation threshold:
| Minimize the number of KMS hosts Each KMS host must consistently maintain a count of total machines > KMS activation threshold KMS hosts are autonomous KMS host is activated by telephone or Internet |
Isolated network Branch office, highsecurity network segments, perimeter networks Well-connected zoned LAN |
If ports on firewalls can be opened between KMS clients and hosts:
| Firewall configuration
|
Test or development lab Isolated network | If total computers > KMS
activation threshold:
| Variable configuration Limited number of computers KMS host and MAK activation through telephone; MAK Proxy performed manually |
Individual disconnected computer No connectivity to the Internet or core network Roaming computers that periodically connect to the core network or connect through a virtual private network (VPN) Roaming computers with Internet access but no connection to the core network | For clients that connect periodically to the core network:
| Restricted environments or
networks that cannot connect to other networks KMS host can be activated and then moved to disconnected network KMS host and MAK activation by telephone; MAK Proxy performed manually |
The following sections describe examples of Volume Activation solutions in heterogeneous corporate environments that require more than one activation method. Each scenario has a recommended activation solution, but some environments may have infrastructure or policy requirements that are best suited to a different solution.
In this tutorial:
- Using Volume Activation
- Introduction Volume Activation
- Activation Options
- Volume Licensing
- Key Management Service
- How KMS Works
- Client Discovery of the KMS
- Planning a KMS Deployment
- Planning DNS Server Configuration
- Upgrading Existing KMS Hosts
- Multiple Activation Key
- Volume Activation Management Tool
- Volume Activation Scenarios
- Core Network
- Isolated Networks
- Branch Office Locations
- Individual Disconnected Computers
- Test/Development Labs
- What If Systems Are Not Activated?