Datasheet
50
Chapter 1
Planning for the Installation of Windows 7
Microsoft licensing site, presents the data from the secure computers, and receives acti-
vation data. This activation data is then copied to the instance of VAMT in the secure
environment.
A MAK proxy is used to activate clients in a secure network when KMS is
not being used. This would be common in secure networks with fewer than
5 servers or fewer than 25 clients.
The following steps outline the process of using VAMT as a MAK proxy:
1. Install VAMT on a computer in the secure network and in a network that has access to
the Internet.
2. Perform the following steps on the computer hosting VAMT in the secure network:
a. Collect the status of the computers in the secure network using VAMT. This data
is referred to as a Computer Information List (CIL) and can be exported as a file.
b. Copy the CIL to removable media such as a CD.
3. Transfer the removable media to the computer hosting VAMT with access to the Inter-
net and complete the following steps:
a. Import the CIL using VAMT.
b. Use VAMT to connect to Microsoft and request Computer Identification numbers
(CIDs) using this CIL.
c. Export the CIL with the CIDs from Microsoft. Copy the new CIL to removable
media.
4. Transfer the removable media holding the new CIL to the computer hosting the VAMT
in the secure network and complete the following steps:
a. Import the new CIL.
b. Apply the new CIDs using MAK Proxy Activate.
While this process will work for networks of any size, there is an easier and more auto-
mated method for larger networks. In any isolated network with more than 5 servers, more
than 25 clients, or a combination of more than 25 clients and servers, you can use the Key
Management Service. MAK keys cannot be used with the Key Management Service, but
instead KMS keys are used.
Key Management Service and Licensing Infrastructure
The Key Management Service is used for enterprises with a large number of clients in
secure networks. Clients will access the KMS server for temporary activation instead of
connecting to Microsoft’s activation servers for permanent activation.
597095c01.indd 50 6/2/10 4:13:03 PM