Windows’
recent operating systems, particularly Windows Vista, Windows Server 2008, 2008
R2, Windows 7 and Office 2010 use an activation technology called Volume
Activation which allows for activation automation that is transparent both to Volume
Licensing customers and end users. Volume Activation can use either Key
Management Service (KMS) model or Multiple Activation Key (MAK) model to
activate the said systems. Customers can use both or either of the models. The
main difference is in the type of key employed in the activation process. Add
to that some practical considerations like organization type, network size, OS
versions among others.
Activation with MAK is made possible by a unique alphanumeric
key capable of activating a specific number of computers. As far as
installation is concerned, KMS proves more convenient as it allows the computer to
automatically detect it via DNS. A pre-requisite is a dynamic DNS with SRV
record support. Without it, it may require manual and individual access to the
clients’ registry to locate the local KMS. With met pre-requisites, no further client configuration for activation is required upon installation,
even with newly-installed PCs, for as long as they are within the network.
MAK activation needs keen supervision during the installation
and activation process. Every PC that is being added for activation is equal to
individual configuration. However, MAK doesn’t need internet
access to complete activation. Similarly, KMS is also capable of completion
without further change on the firewall. Base requirement is for it to secure
that the KMS host can connect to Microsoft’s volume licensing servers.
In terms of
activation capacity and expiration, MAK is more advantageous than KMS. The
former has a one-time, non-expiring activation. It doesn’t require frequent
updates with product keys, thus better security from activation failure. The
only downside would be its limited number of activation, wherein the quantity
of clients that can be catered is dependent on the number of licenses
purchased; thus, increasing the need to repurchase licenses over time.
Conversely, KMS has to maintain two levels of reactivation every 6 months.
First level comprises of every client within the network and second, the KMS
host. This entails an extra task of regularly monitoring the KMS server, DNS,
the clients and their connection status.
What’s good about it though is that it can activate an infinite
number of clients regardless of license. Another important factor to consider is the organization’s IT structure
(i.e. the number of computers, the type of machines ‘“ laptop or desktop, the
number of sub-branches/ departments). KMS works best with more than 50
computers, mostly desktops, and with a centralized set-up. This is due to the fact that it is highly dependent to a KMS host. Even though a customer has the option to use several hosts, it is still ideal to
maintain a single server; otherwise, it increases the risk on the integrity of
the client-DNS-server connection, and not to mention, more maintenance and
probable troubleshooting work. Unlike KMS, MAK works more flexibly even with
less than 25 computers, both laptop and desktops, with decentralized IT
structures. It poses not much limitation no matter how your IT infrastructure is
organized- regardless if it has multiple branches, high security networks and
uses a good mix of desktops and field computers.
Summary:
1. KMS
requires activation but lets users do this within the network. Meanwhile, MAK
entails one-time activation only.
2. To
complete activation, MAK does not need internet connection. For KMS, you have
to connect to Microsoft’s licensing servers.
3. MAK’s
activation does not have to be renewed. For KMS, it has to be reactivated every
six months.
4. KMS can
even work very well with more than 50 computers. MAK can only function
optimally with less than 25 computers.
No comments:
Post a Comment