Professional Documents
Culture Documents
2003
Supplemental Step-By-Step Guide
Microsoft Corporation
Published: February, 2007 (last updated 2/08/07)
Purpose
This supplemental guide provides planning, deployment, and operational
guidance for activating Key Management Service for Windows Server 2003.
The Windows Vista Volume Activation 2.0 Step-By-Step Guide is essential
reading and a prerequisite for understanding this document.
ii
Activation 2.0
Information in this document, including URL and other Internet Web site references, is subject to
change without notice.
Unless otherwise noted, the companies, organizations, products, domain names, e-mail
addresses, logos, people, places, and events depicted in examples herein are fictitious. No
association with any real company, organization, product, domain name, e-mail address, logo,
person, place, or event is intended or should be inferred.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
rights under copyright, no part of this document may be reproduced, stored in or introduced into
a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written
permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
2006 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, ActiveX, Windows, Windows 2000, Windows Server, Windows Vista,
and Windows XP are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
Contents
Key Management Service for Windows Server 2003...................................................
Supplemental Step-By-Step Guide...........................................................................
Introduction.........................................................................................................
Problem.........................................................................................................
Volume Activation 2.0 Solution..........................................................................
Benefits of Volume Activation 2.0......................................................................
Key Management Service for Windows 2003 Server Overview....................................
Differences between Windows 2003 Server and Windows Vista KMS
Versions.........................................................................................................
Package Installation....................................................................................
No Graphical User Interface (GUI)................................................................
KMS Keys and Activation.............................................................................
No Out-of-Box Grace Period.........................................................................
KMS for Windows 2003 Release Notes................................................................
Available Versions.......................................................................................
KMS and OS Language Versions Must Match..................................................
KMS for Windows Server 2003 Will Not Run in a Virtual Machine......................
Known Issues............................................................................................
Obtaining Volume License Keys.........................................................................
Activation Limits.........................................................................................
Important Note..........................................................................................
Deployment Guidance...........................................................................................
General Considerations....................................................................................
KMS Activation Technical Overview...............................................................
Prerequisites for KMS Activation...................................................................
KMS Host Sizing.........................................................................................
Administrative Credentials...........................................................................
Steps for Installing the KMS package on Windows Server 2003.............................
Install a KMS Package.................................................................................
Remove a KMS Package..............................................................................
Steps for Configuring a KMS Activation..............................................................
Configuring KMS Hosts................................................................................
Operational Guidance..........................................................................................
Built-in Scripting Support...............................................................................
Microsoft Key Management Service MOM Pack...................................................
Known Issues with the MOM Pack...............................................................
KMS Health Monitoring..............................................................................
Introduction
Problem
Software asset and license management pose continual challenges for both
enterprise customers as well as software developers. The issue of genuine
software (running legitimately licensed operating systems and applications as
opposed to illegitimate software) not only impacts the software vendors but the
consumers, corporate users and partners. Yankee group (sponsored by Microsoft)
in its research concluded that consumers and businesses that deploy counterfeit
software put themselves, their end users, business partners and suppliers at
serious risk for:
Network downtime and lost data increases when the counterfeit software
malfunctions.
25% of the Web sites (25 of 98 sites) offering counterfeit product keys,
pirated software, key generators or crack tools
11% of key generators and crack tools (13 out of 116) from websites
59% of key generators and crack tools (55 of 94) downloaded from P2P
networks
Finally the previous versions of Microsoft Windows didnt provide tools and
solutions to enterprise customers that are necessary to protect and manage the
software and the associated license keys. Enterprise customers had no ability to
track the key usage or control its use within as well as outside of their managed
environment.
Package Installation
The KMS for Windows Server 2003 service (sppsvc) is installed as a package over
the existing operating system. Installation is based on the familiar Software Update
Installer and is fast and easy. KMS can be removed using Add or Remove Programs
in the Control Panel.
Although both online (Internet) and offline (telephone) activation of the KMS
service are supported, offline activation of KMS for Windows Server 2003 can only
be done using the slmgr.vbs script.
Known Issues
On installing or using KMS activation, you may encounter the following known
issues:
The KMS installer reports that installation was successful, even if the
installation was cancelled.
Uninstalling the KMS host service (sppsvc) while it is running indicates that
the service should be stopped. Clicking Abort instead of Continue leaves
the system in a confused state, necessitating a reboot of the system.
Sysprep on Windows Server 2003 does not reset the KMS service state.
Remove the package before running sysprep and then reinstall and
reconfigure it.
eOpen (https://eopen.microsoft.com/EN/default.asp)
Activation Limits
By default, a KMS key can be used on up to 6 different KMS hosts, with up to 10
activations on the same hardware. The KMS key can be used on any combination
of Windows Vista KMS or KMS for Windows Server 2003 KMS hosts. Customers can
request an override or special exception to extend the activation limit by calling
their Microsoft Activation Call Center.
Important Note
You are responsible for both the use of keys assigned to you and the activation of
products using your KMS hosts.
You may not provide unsecured access to your KMS hosts over an
uncontrolled network such as the Internet.
Deployment Guidance
The Deployment Guidance section provides step-by-step instructions for installing,
configuring and activating the Key Management Service for Windows Sever 2003.
For general considerations, read the following sections:
Administrative Credentials
For installing and configuring the KMS package, read the following
sections:
General Considerations
This section provides general considerations on implementing and deploying the
Key Management Service for Windows Server 2003.
You must download the Key Management Service for Windows Server
2003 package from the Microsoft Download Center.
You may need to configure the Key Management Service event log, which is
under the Applications log, to ensure it is large enough to accommodate the
volume expected in your organization. Each 12290 event, which occurs every
time a KMS client connects to the KMS host, requires approximately 1,000
bytes. You can set the log options and size in the Log Properties dialog box.
Network overhead is minimal. Fewer than 250 bytes are sent in each direction
for a complete client-KMS exchange, plus TCP session setup and teardown. The
only additional network traffic is for auto-discovery, which usually occurs only
once per client computer, as long as the same KMS continues to be available for
subsequent renewals.
Large organizations may want to configure multiple KMS hosts for loadbalancing and redundancy, or to satisfy organizational needs.
Co-Hosting KMS
To minimize cost, many organizations prefer to co-host KMS along with other
functions. KMS is designed to support co-hosting. KMS can easily coexist with
common server roles, including domain controllers. It has a small resource
footprint during normal operation, although it can become compute-bound as
noted in the previous section. This is most likely to occur after a large deployment
of KMS clients or if most users start their computers in a short period. If CPU
consumption is an issue, KMS supports a low priority option.
Administrative Credentials
To complete any of the following procedures, you must be a member of the
Administrators group. All script functions must be run from a command prompt as
a local administrator.
To configure KMS publishing to DNS, see the KMS Publishing to DNS section
in Windows Vista Volume Activation 2.0 Step-By-Step Guide
To install, configure, deploy, and activate KMS clients, refer to the KMS
Clients section in Windows Vista Volume Activation 2.0 Step-By-Step
Guide.
10
11
You must restart the KMS service for most changes to take effect.
12
Operational Guidance
This section of the Step-by-Step guide provides operational guidance on
implementing Volume Activation 2.0.
Even for the display-only options, all script functions must be run from a
command prompt using administrator permissions.
Slmgr.vbs will display a privacy statement the first time it is used. An
administrator must agree to its terms in order to continue.
Note For more information about the Windows Vista Privacy Statement, see
http://go.microsoft.com/fwlink/?LinkId=52526.
To run the script remotely, the name of the target computer and credentials
with appropriate privileges are required. Services and ports to support remote
use must be configured, along with appropriate firewall exceptions. Refer to the
Remote Scripting Support section in Windows Vista Volume Activation 2.0
Step-By-Step Guide for instructions on using the script on remote Windows
Vista clients.
13
Activation Count Summary: Shows the number of KMS activations for each
Windows edition and for several historical time ranges.
KMS Activity Summary: Shows daily new KMS activations for each Windows
edition. The Total Requests chart shows daily KMS request activity, which
includes both activations and renewals, for each Windows edition. Additionally,
a list of all contributing KMS hosts is displayed, and the reports can be filtered
to display only the traffic from specified KMS hosts.
Licensing Status Summary: Shows the number of days left to expiration for
computers that have connected to a KMS for each of the license states.
14
Machine Expiration Chart: Shows the number of computers that are in OOB,
OOT/Exp, or non-Genuine grace, whose users could be locked out (Unlicensed)
in the next 30 days.
Machine Expiration Detail: Lists the computers that are in OOB, OOT/Exp or
non-Genuine grace whose users could fall into Reduced Functionality Mode
(Unlicensed) in the next 7 days.
Backup Requirements
Back up is not required for KMS hosts. However, if you need to track the KMS
activations, you can periodically export the Key Management Service Event log
data under Applications for activation history.
Troubleshooting
This section provides guidance on troubleshooting issues that are specific to KMS
on Windows Server 2003. Refer to the Troubleshooting section in Windows Vista
Volume Activation 2.0 Step-By-Step Guide to diagnose Windows Vista
activation issues.
Resolution
15
16
Regardless of the workaround chosen, it is critical that all KMS hosts running the
64-bit version of the operating system have the same workaround applied.
Important note: This section contains information about how to modify the registry. Make sure to back
up the registry before you modify it. Make sure that you know how to restore the registry if a problem
occurs. For more information about how to back up, restore, and modify the registry, click the following
article number to view the article in the Microsoft Knowledge Base: 256986 Description of the Microsoft
Windows registry.
17
Additional Resources
A management pack is available for the Key Management Service for Microsoft
Operations Manager 2005. It is available at
http://www.microsoft.com/technet/prodtechnol/mom/mom2005/catalog.aspx
For a list of WMI methods, KMS registry keys, KMS events, KMS error codes,
and KMS RPC messages, refer to the Volume Activation 2.0 Technical
Attributes.xls in
http://www.microsoft.com/technet/windowsvista/plan/volact2.mspx
For information about the Microsoft Solution Accelerator for Business Desktop
Deployment (BDD):
http://www.microsoft.com/technet/desktopdeployment/bdd/2007/default.mspx