Dear Team,
- Does MAK activation rely on the backup or CMOS battery?
No, the activation process does not directly check the battery itself. However, a failing or replaced CMOS battery can cause system instability that leads to deactivation.
Windows activation creates a hardware hash, a unique identifier based on key components like the motherboard, processor, BIOS, and hard drive. When you replace the CMOS battery, the system's BIOS/UEFI settings, including the system clock, can be reset to their defaults. This sudden and significant change in system configuration, especially if it affects how the hardware is reported to the operating system upon boot, can alter the hardware hash enough for Windows to believe it's on a different machine. The event log error, where the licensing service fails to evaluate or find the license, is consistent with this scenario.
- Does deactivation affect Windows IoT Enterprise features like Shell Launcher?
For a period, most features, including Shell Launcher, will likely continue to function. However, you should not rely on this. An unactivated state is not supported for production environments.
While Windows might enter a "notification" period where core functionality remains, continued deactivation will lead to:
Persistent notifications and a watermark on the desktop, which can interfere with custom shell environments.
Loss of personalization settings.
Crucially, the system will stop receiving critical security and feature updates. For an IoT device, this poses a significant security risk.
Eventually, Windows may enter a Reduced Functionality Mode (RFM), which could disable advanced features, although this is less common in modern versions of Windows 10. The primary impact is the loss of updates and the intrusive notifications.
- Can this deactivation be prevented, or is it normal?
This is not normal behavior that should be accepted, but it is a known issue when significant hardware or configuration changes occur. You can take steps to mitigate it.
Preventative & Mitigation Steps:
Standardize BIOS/UEFI Settings: Before replacing a battery, document the exact BIOS/UEFI settings of a properly activated machine. After the replacement, immediately enter the BIOS/UEFI setup and restore these settings before booting into Windows. This consistency can prevent the hardware hash from changing significantly.
Network Connection: Ensure the device has a stable internet connection when it's first booted after the hardware change. This allows it to contact Microsoft's activation servers. If the system was activated via a MAK Proxy, ensure it can reach the proxy server.
Re-Arm the License: For planned maintenance, you can use the Software License Manager (slmgr.vbs
) command-line tool to "re-arm" the license before the hardware change. This command resets the licensing timers, providing a grace period before requiring activation. You can use the command slmgr /rearm
in an elevated command prompt. This can be done a limited number of times.
Accepting random deactivation is not a viable long-term strategy due to the security and potential functionality risks. Proactively managing the hardware replacement process is the recommended approach.
- Does MAK activation rely on the backup or CMOS battery?
No, the activation process does not directly check the battery itself. However, a failing or replaced CMOS battery can cause system instability that leads to deactivation.
Windows activation creates a hardware hash, a unique identifier based on key components like the motherboard, processor, BIOS, and hard drive. When you replace the CMOS battery, the system's BIOS/UEFI settings, including the system clock, can be reset to their defaults. This sudden and significant change in system configuration, especially if it affects how the hardware is reported to the operating system upon boot, can alter the hardware hash enough for Windows to believe it's on a different machine. The event log error, where the licensing service fails to evaluate or find the license, is consistent with this scenario.
- Does deactivation affect Windows IoT Enterprise features like Shell Launcher?
For a period, most features, including Shell Launcher, will likely continue to function. However, you should not rely on this. An unactivated state is not supported for production environments.
While Windows might enter a "notification" period where core functionality remains, continued deactivation will lead to:
Persistent notifications and a watermark on the desktop, which can interfere with custom shell environments.
Loss of personalization settings.
Crucially, the system will stop receiving critical security and feature updates. For an IoT device, this poses a significant security risk.
Eventually, Windows may enter a Reduced Functionality Mode (RFM), which could disable advanced features, although this is less common in modern versions of Windows 10. The primary impact is the loss of updates and the intrusive notifications.
- Can this deactivation be prevented, or is it normal?
This is not normal behavior that should be accepted, but it is a known issue when significant hardware or configuration changes occur. You can take steps to mitigate it.
Preventative & Mitigation Steps:
Standardize BIOS/UEFI Settings: Before replacing a battery, document the exact BIOS/UEFI settings of a properly activated machine. After the replacement, immediately enter the BIOS/UEFI setup and restore these settings before booting into Windows. This consistency can prevent the hardware hash from changing significantly.
Network Connection: Ensure the device has a stable internet connection when it's first booted after the hardware change. This allows it to contact Microsoft's activation servers. If the system was activated via a MAK Proxy, ensure it can reach the proxy server.
Re-Arm the License: For planned maintenance, you can use the Software License Manager (slmgr.vbs
) command-line tool to "re-arm" the license before the hardware change. This command resets the licensing timers, providing a grace period before requiring activation. You can use the command slmgr /rearm
in an elevated command prompt. This can be done a limited number of times.
Accepting random deactivation is not a viable long-term strategy due to the security and potential functionality risks. Proactively managing the hardware replacement process is the recommended approach.