Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Vista

Managing Windows Licensing and Activation : Managing Volume License Activation (part 2) - Leveraging MAK activation, Comparing KMS and MAK activation

4/7/2013 6:36:46 PM

2. Leveraging MAK activation

When KMS activation doesn't meet your needs, Multiple Activation Key (MAK) activation can be used. MAK activation is similar to retail product activation in that each workstation must be activated against the Microsoft activation server. This process may be performed over the Internet or the phone.

The primary advantage to MAK activation is that it is relatively permanent. After a computer is activated using a MAK, clients are not required to reactivate at regular intervals. In fact, the only time reactivation should be necessary is after significant hardware or driver updates or after reinstallation of Windows.

With permanent activations, users can create images of the workstations after activating Windows, which bypasses any activation or validation procedures. To prevent this, Windows keeps track of the hardware on which it is installed. If a significant number of components change, then reactivation is required. Although the intent is to identify when the hardware has been changed, updating drivers can also cause a change to be detected. Each hardware component is assigned a weight. If the total weight of changed components reaches 25, then the computer must be reactivated. Table 1 shows the indexed hardware components along with their corresponding weights.

Table 1. Understanding Weight Values for Triggering Reactivation
Hardware ComponentWeight
Physical System Hard Disk Drive Serial Number11
BIOS Identifier9
Processor3
IDE Adapter3
SCSI Adapter2
MAC Address2
Audio Adapter2
RAM Amount (i.e. 0-512 MB, 512 MB-1 GB, etc.)1
Display Adapter1
CD/DVD Drive1

Reviewing the limitations of MAK

Using MAK activation has its disadvantages as well. The primary disadvantage of MAK activation is that it uses an activation pool for each MAK issued.

When you purchase volume licenses and receive a MAK, Microsoft creates a pool of activations associated with your MAK. Although this number is loosely based on the number of volume licenses you purchase, it also is related to the licensing agreement you purchase them under. After the pool has been created on Microsoft's activation servers, you may activate computers with the corresponding MAK. Each activation decreases the pool count by one. The most notable implication here is that even reactivations will decrease the count by one. Therefore, if you frequently reload your computers, which will in turn require them to be reactivated, your activation pool may quickly become depleted.

However, there is not a one-to-one relationship between your activation pool and the number of licenses you purchased. In addition, the activation pool may be increased at any time by simply contacting Microsoft Activation. MAK activation is not intended to ensure that each activation represents a legal copy of Windows. Instead, it ensures that businesses and organizations are aware of the number of activations they are performing. In turn, it would be much more apparent if a key were to be leaked to the outside world or if it were being used inappropriately by unscrupulous staff members. If you legitimately reactivate computers very frequently, this can become quite a hassle, however. In this case, it is usually best to implement KMS activation.

The actual activation process for MAK activation can be performed by two methods, depending upon your network design. Figure 3 shows an example of independent MAK activation. Independent activation will be performed automatically if a MAK is used for installation and an Internet connection can be established. Otherwise, independent activation may be performed over the telephone. As the size of the network grows, phone activation becomes increasingly unpopular and ineffective.

Figure 3. Independent activation of MAK

In some environments, Internet access may not be directly available and phone activation may not be practical. If the environment contains at least 25 workstations, KMS activation is typically preferred. If, however, there are not at least 25 workstations or MAK must be used for other reasons, proxy activation may be performed for MAK clients, as shown in Figure 4.

Figure 4. Proxy activation of MAK

To perform MAK proxy activation, the Volume Activation Management Tool (VAMT) is used. In proxy activation, the computer requiring activation generates a request that can then be passed on to Microsoft as a completely separate process. This feature eliminates the need for direct Internet access by the clients and eliminates the need to place a phone call for each workstation to be activated.

3. Comparing KMS and MAK activation

Licensing can be confusing, and there are several pros and cons to both the KMS and MAK approaches to activation. To help you make a decision, we've included Table 2, which highlights the differences between MAK activation and KMS activation.

Table 2. Comparing KMS and MAK Activation Methods
KMS ActivationMAK Activation
Clients use the default installation keyClients must use a MAK installation key
Only the KMS server is activated with MicrosoftEach client is activated directly with Microsoft unless the VAMT is used
25 physical client minimum to implement for Vista, and 5 for Windows Server 2008No minimum number required
No activation pool to manage allowing unlimited reactivationsActivation pool managed by Microsoft
Each activation is valid for 180 daysActivations are not time limited
DNS or manual client configuration is used to locate the KMS serverInternet access, a phone call or the VAMT is used for activation
Other -----------------
- Managing Windows Licensing and Activation : Licensing Windows
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 6) - Using Reliability Monitor
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 5)
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 4)
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 3)
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 2)
- Maintaining Desktop Health : Monitoring Reliability and Performance (part 1) - Component Binaries, Opening the Reliability and Performance Monitor, Using Resource Overview
- Preparing Windows PE : Automating Windows PE, Using Windows PE with BDD
- Using Voice and Sounds : Customizing Speech Recognition, Talking to the Mouse
- Using Voice and Sounds : Directing Your Computer with Voice Commands, Dictating Text
- Using Voice and Sounds : Controlling the Volume
- Preparing Windows PE : Working with Windows PE (part 3) - Customizing Windows PE
- Preparing Windows PE : Working with Windows PE (part 2)
- Preparing Windows PE : Working with Windows PE (part 1) - Adding Optional Components
- Maintaining Security : Restricting Content in Windows Media Center, Creating Trusted Contacts, Installing Critical Fixes
- Maintaining Security : Restricting Content in Windows Media Center, Creating Trusted Contacts
- Maintaining Security : Restricting DVD Movies in Windows Media Player, Preventing Access While Using Windows Media Player
- Maintaining Security : Maintaining High Security, Setting Internet Explorer Security
- Maintaining Security : Restricting Access on the Computer
- Preparing Windows PE : Setting up the Environment
 
 
Most view of day
- Using the Windows 7 Libraries : CONSIDERING USER-DEFINED COLLECTIONS
- Maintaining Desktop Health : Understanding Windows Error Reporting (part 1) - Error Reporting Cycle, Report Data Overview
- Editing Digital Video with Windows Live Movie Maker (part 5) - Editing Your Video - Using Titles
- Microsoft Visio 2010 : Modifying a Graphic (part 2) - Wrapping Text Around a Graphic
- Windows Server 2012 : Installing and Managing Hyper-V in Full or Server Core Mode - Installing Windows Server 2012 and Microsoft Hyper-V Server 2012
- Windows Phone 8 : Orientation and the PhoneApplicationPage Class (part 4) - Animating Page Elements When the Page Orientation Changes
- Windows Server 2012 : Deploying Storage Spaces (part 5) - Implementing Storage Spaces, Using Windows PowerShell
- Windows Phone 8 : Orientation and the PhoneApplicationPage Class (part 1) - OrientationChanged Event
- Developing Disk Images : Manually Preparing Images, Customizing BDD 2007
- Microsoft Systems Management Server 2003 : Patch Management - The Need for Effective Patch Management, Introduction to the Patch Management Process
Top 10
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
- Microsoft Project 2010 : Linking Tasks (part 5) - Creating Links by Using the Task Information Dialog Box
- Microsoft Project 2010 : Linking Tasks (part 4) - Entering Leads and Lags, Creating Links by Using the Menu or Toolbar
- Microsoft Project 2010 : Linking Tasks (part 3) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 2) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 1) - Defining Dependency Links
- Microsoft Project 2010 : Defining Task Logic - Manipulating Your Schedule
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro