Map Computers to an Activation Method
After evaluating the recommended activation scenarios, the next step is using Volume Activation to map computers to activation methods. The goal is to ensure that all computers are associated with an activation option. Table 2 provides a simple job aid that ensures that all computers are mapped to an activation method. When completing this job aid, ensure that all computers using KMS are on networks that meet KMS activation thresholds.
Table 2. Activation Method Worksheet
Criterion |
Activation method |
Number of computers |
---|---|---|
Total number of computers to be activated |
|
|
Number of computers that will connect to the network at least once every 180 days (directly or by VPN) and where the KMS activation threshold is met |
KMS |
|
Number of computers that do not connect to network at least once every 180 days |
MAK |
|
Number of computers in isolated networks where the KMS activation threshold is met |
KMS |
|
Number of computers in isolated networks where the KMS activation threshold is not met |
MAK |
|
Number of computers in test/development labs that will not be activated |
None |
|
Remaining computer count should be zero |
|
|