Docstoc

Customizing WinPE 20ppt.ppt

Document Sample
Customizing WinPE 20ppt.ppt Powered By Docstoc
					Vista Volume Activation Overview
VLK 2.0

Anders Björling
Senior Consultant
Microsoft
Agenda
 Activation in Vista and Longhorn
   OEM
   Key Management Service (KMS)
   Multiple Activation Keys (MAKs)
 Supported Scenarios
 Script for administrative purposes
Activation in Vista and Longhorn
There are three activation options for Vista and
  Longhorn Server.

  OEM pre-activated machines
     These machines do not need VLK 2.0 activation


  KMS (Key Management Service)
     For managed environments where users are connected to the
     corporate network


  MAK (Multiple Activation Key)
     For decentralized networks where users are rarely or never
     connected to the corporate network
Vista Volume Activation Scenarios
We provide our media to the OEM and get our machines pre-installed from      Use OEM (No need
an OEM partner                                                               for KMS or MAK)

Our users are on a managed network and they connect regularly to the         Use KMS
domain

We have a multiple domain, multi-national environment with 100,000           Use KMS
connected PCs

We have a traveling sales force who are connected to the network less than   Use MAK
twice per year

We have a remote office with it’s own network that has fewer than 25 users   Use MAK


We send soldiers into the field who may need to re-install and re-activate   Use MAK (with Conf
Vista without access to the internet or phone                                ID)

We have a completely disconnected lab with 1000 machines that don’t          Use MAK (with bulk
connect to the internet                                                      activation)

We have users in a remote area that only has a very slow and potentially     Use MAK or KMS
expensive link to the internet                                               (modify interval)
Key Management Service Intro
 Key Management Service (KMS) is the central service in VLK
 2.0 that handles volume activation of all clients and servers in
 an enterprise network.

 Target: Larger networks (at least 25 machines) that clients
 machines can regularly connect to.

 Benefits:
       Secure and centralized key administration
       Easy OS roll-out with automatic activation of clients
       Improved ongoing security
       Better accounting and trouble shooting
       Runs on Vista client or Longhorn Server
             WS2K3 support is planned post Vista RTM
Key Management Service Setup
 Deploying the KMS service is easy and
  straight forward.

1. Acquire VL Keys and media (same as today via online portal)
2. Install Vista or Longhorn on any machine that will host KMS
3. Install VLK to enable Key Management Service
   • KMS encrypts and stores the VLK in its trusted store for security
   • No other steps required
4. Configure KMS so that clients will be able to communicate
   with KMS periodically
   • KMS activated machines automatically re-activate, but will go
     out of tolerance after 180 days if disconnected
   • Configure TCP port and firewall (optional)
   • Configure DNS as needed for KMS discovery
Vista/LH Server Client Setup
 After the KMS is running, deploy the clients.

1. Roll out Vista or Longhorn Server “clients” (using the same
   methods used to roll-out Windows XP: DVD, Disk Imaging,
   Remote Imaging - WDS)
2. Optionally configure clients to locate KMS if not using auto-
   discovery (see next slide)
3. Each client has a 30 day grace period after installation to
   contact the KMS.
4. The first 25 clients to reach KMS are only counted, and kept
   in KMS list for 30 days
   • Any subsequent client can automatically activate
   • The first 25 automatically retry every 2 hours, and can
     then activate
KMS Deployment Details
KMS Discovery
  KMS attempts self-registration with DNS (via SRV resource records)
     DNS may require setting of permissions for KMS depending on network
     Client query obtains list of all KMS computers in the DNS domain and selects KMS
     at random


KMS Communication
  Uses anonymous RPC over TCP (must open firewall port)
     TCP port (default 1688) configurable via WMI (registry key)
     Requests are asynchronous and lightweight (200 bytes)
     A single KMS on a desktop machine can handle 20,000 requests / hour
  Support for users that connect intermittently by automatic sensing when a
  machine comes online


KMS Management
  WMI support for remote management of clients and KMS service
  All activity is logged in application event log of clients and KMS
  Sample reporting utilities and MOM pack will be provided (Not available now)
Multiple Activation Keys (MAKs)
If you are not sure if a user will be regularly on the
    corporate network, issue them a MAK.

   MAKs can be used multiple times (e.g. 100
   activations), but have an upper limit

   MAK usage can be viewed via Microsoft online
   portals, and additional activations can be
   requested at no charge

   MAKS are protected in the trusted store, but
   have less ongoing security, and no centralized
   accounting (like KMS)
Multiple Activation Keys Cont
  MAKs require key roll-out to each machine. This can be scripted or
  a MAK can be included in the Vista image.
  MAKs must activate against MS once per machine either online
  automatically, or offline using a confirmation ID received via
  telephone. This confirmation ID can be used multiple times to re-
  activate the same hardware.
  Auto-activation of MAKs can be setup by an admin.

  Bulk MAK activation using the telephone activation system is
  supported, so that the confirmation ID’s for multiple machines can be
  received with a single transaction
  MAK activations do not have any expiration associated with them,
  but they can go out of tolerance if enough hardware has been
  changed.
  Users can change from a KMS activation to a MAK by installing the
  key
   Activation Scenarios & Timeline

1. Machine automatically activates and re-activates within grace or expiration period
2. Machine goes out of 30 day grace period (or tolerance period) and into reduced
   functionality mode (RFM, which disables interactive log-on)
3. Admin user installs MAK key and activates within 30 day grace (activation does
   not expire)



    Automatic                Automatic Activation                Automatic
    Activation                    Renewal                        Activation
     Requests                     Requests                        Requests
  (2 hrs by def)               (7 days by def)                 (2 hrs by def)



    Grace                        Activated                        Grace     RFM

                       Re-activation after expiration            30 days         User
  30 days
                                 180 days                                       Unable
                        (Each renewal extends this                                to
                           to the full 180 days)                                Log On
Reduced Functionality Mode
 “Activate today or some features will no longer work” notifications come up
 frequently near the end of the grace period before RFM.
 To fix RFM mode:
    Connect machine to the corporate network with KMS
    User with admin privilege can manually change to a MAK key (when attempting to log
    on – this can also be scripted by IT Pro)
VLK Customer Experience
Comparison
                  VLK 1.0 Activation         VLK 2.0 KMS Activation                  VLK 2.0 MAK Activation

 Getting your     1. Locate Licensing Site   1. Locate Licensing Site or phone the   1. Locate Licensing Site or
    Keys             or phone the call          call center                             phone the call center
                     center                  2. Provide credentials                  2. Provide credentials
                  2. Provide credentials     3. Acquire VLK                          3. Request / receive MAK
                  3. Acquire VLK

Configuration     Include VLK in             Install VLK on KMS machine and          NA
                  unattend.txt file for      configure discovery and
                  deployment                 communication for KMS service

OS Installation   Install/Deploy Image       Install/Deploy Image                    Install/Deploy Image

Grace period      NA                         30 days to activate                     30 days to activate

  Activation      NA                         Activation happens automatically on     User with admin privileges enters
                                             the network                             MAK key (UI or script) and
                                                                                     activates online or calls MS for
                                                                                     telephone activation
Expiration &      NA                         Expiration is 180 days. Re-activation   NA
Re-activation                                against KMS automatically


  Hardware        NA                         Hard drive changes will force a need    Certain hardware changes will
  Tolerance                                  for re-activation within 30 days.       force a need for re-activation
                                                                                     within 30 days
 Common Questions
   How does this affect my TCO?
      The impact on total cost of ownership will vary depending on customer
      corporate network configuration. In most cases the impact will be very small,
      requiring no new infrastructure or management.
      For many customers the additional asset management capabilities built on
      VLK2.0 will offset any additional IT management costs.
      New hardware is not required. KMS is lightweight and can co-exist with other
      services.
What are the volume editions that support KMS?
      Client Business, Client Enterprise, Server Enterprise
      The client versions are upgrade versions only.
   Why is the value of “n” set at 25 machines?
      Extensive research and customer feedback has shown that a network size of
      25 machines will balance out a positive customer experience against creation
      of illegal networks. Customers with networks less than 25 machines will use
      Multiple Activation keys.
   Isn’t this just about Microsoft trying to make more money?
      While decreasing software theft of Windows benefits Microsoft, no enterprise
      wants to be responsible for illegal use of their volume keys. Improved security
      and accounting of volume licensing keys and software benefits Microsoft
      customers.
Built-in Scripting Support
 cscript C:\windows\system32\slmgr.vbs [ComputerName
 UserName Password] <Option>
 cscript \windows\system32\slmgr.vbs –ato
   Activate manually

 cscript \windows\system32\slmgr.vbs –ipk
   Activate machine and turn it into KMS Server

 cscript \windows\system32\slmgr.vbs –dbi
   Display KMS and client license info
Questions?

				
DOCUMENT INFO