An administrator can create a registry key that allows a standard user that is, a user who isn't an administrator to activate Office by using MAK. By default, volume licensed versions of Office disable this behavior. For more information about the Config. Even though this article is for an earlier version of Office, the information also applies to Office In some organizations, different groups have different MAK keys for their volume licensed versions of Office, Project, or Visio.
Unfortunately, you can't include multiple MAK keys in the same configuration. If you don't want to create separate XML files for each group, you could use one of these other methods:. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Volume license keys may not be transferred with the computer if the computer changes ownership.
This form of licensing typically applies for business, government and educational institutions, with prices for volume licensing varying depending on the type, quantity and applicable subscription-term.
A volume license key VLK denotes the product key used when installing software licensed in bulk, which allows a single product key to be used for multiple installations. For example, the Windows Enterprise edition is activated with a volume license key. Network traffic can pass privately between the two networks through a firewalled wide area network WAN link.
This link has limited bandwidth, so resources including DNS are replicated on both sides of the WAN link to reduce traffic when possible. Contoso uses image-based deployment. Its client systems are standardized on Windows Vista, but the Windows Vista systems are being replaced by Windows 7 clients. Users regularly travel geographically, and their network connection changes from one domain to the other. Two KMS hosts are configured in east. The IT administrator accomplishes this by making the following configuration changes see Table 5 :.
DHCP servers are configured to add east. Configure east. Configure west. Then, the administrator confirms that the Windows Firewall exceptions are set to allow KMS client traffic and configures client computers, as Table 6 describes. The following sections describe scenarios for MAK activation.
This section involves network and workgroup environments that are typical within large enterprises. The Secure Zone represents higher-security Core Network computers that have addition firewall protection.
The Isolated Lab environment is a workgroup that is physically separate from the Core Network, and its computers do not have Internet access. The network security policy states that no information that could identify a specific computer or user may be transferred out of the Isolated Lab.
This count is a snapshot in time, not a real-time count. VAMT version 3. The VAMT is installed on a central computer with network access to all client computers. The following instructions describe how to perform independent activation:.
Ensure that the WMI firewall exception has been enabled for all target computers. Enter a Computer Group name such as Core Network Group to identify the group of computers you are activating.
Click the drop-down list to select a search option. If you are searching by individual computer name or IP address, enter that information in the text box below the drop-down list. If you are searching a domain or a workgroup, select the domain or workgroup from the additional drop-down list displayed for those options. Use the Filter by computer name field to search for a specific computer within the domain or workgroup. For the VAMT to perform an action on a computer, it must have current license status data for that computer.
Collect status from individual computers by directly selecting one or more computers in the computer list view pane. Right-click the group or the desired computers, and then click Refresh Computer Status. If you are activating computers that require administrator credentials different from the ones you are currently using, select Use Alternate Credentials.
0コメント