Solved

KMS Server and old keys

Posted on 2011-03-10
1
829 Views
Last Modified: 2012-06-21
Hi there

I have XP Mak keys and now im going to implement a KMS server to serve those MAK keys and also KMS keys for Windows 7 and windows server 2008.

Do I need one KMS key for every version of windows?
How can I handle the XP MAK keys I have to use with the KMS server?

Thanks so much
0
Comment
Question by:M7K
1 Comment
 
LVL 7

Accepted Solution

by:
PowerToTheUsers earned 500 total points
Comment Utility
Volume licensing in XP didn't use KMS or MAK as with Vista/7. An XP volume key can be used unlimited times, so you don't have to worry about that: you can stil use your old keys.

Vista and 7 however had a new volume activation model, using MAK and KMS.
With MAK you can use the same key a certain amount of times (500, 5000,... you can find this on the volume licensing website). Each computer activates to the Microsoft-servers, so MS keeps count of how many times you have used your MAK-key. (Contrary to XP, where one multivol-key could be stolen/leaked and used illegally on millions of computers worldwide).
With KMS you have some kind of a local activation server. You set up the KMS-server, activate it with microsoft (using the KMS key). Microsoft activates that KMS-functionality and from then on the KMS-server can activate your local clients which are installed from a volume licensing media. But that's only for Vista/7-clients.

You can use a KMS for Windows 7 clients to activate Vista's too.
More information can be found at http://www.microsoft.com/licensing/existing-customers/product-activation-faq.aspx http://technet.microsoft.com/en-us/library/dd979803.aspx and http://download.microsoft.com/download/2/D/F/2DF30F9F-829C-4F14-AF1B-DC20AB8CA84C/Windows_Volume_Activation_Reference_Guide_October_2009.pdf
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This is my first article in EE and english is not my mother tongue so any comments you have or any corrections you would like to make, please feel free to speak up :) For those of you working with AD, you already are very familiar with the classi…
As network administrators; we know how hard it is to track user’s login/logout using security event log (BTW it is harder now in windows 2008 because user name is always “N/A” in the grid), and most of us either get 3rd party tools, or just make our…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now