Share via


Map Computers to an Activation Method

After evaluating the recommended activation scenarios, the next step is using Volume Activation to map computers to activation methods. The goal is to ensure that all computers are associated with an activation option. Table 2 provides a simple job aid that ensures that all computers are mapped to an activation method. When completing this job aid, ensure that all computers using KMS are on networks that meet KMS activation thresholds.

Table 2. Activation Method Worksheet

Criterion

Activation method

Number of computers

Total number of computers to be activated

 

 

Number of computers that will connect to the network at least once every 180 days (directly or by VPN) and where the KMS activation threshold is met

KMS

 

Number of computers that do not connect to network at least once every 180 days

MAK

 

Number of computers in isolated networks where the KMS activation threshold is met

KMS

 

Number of computers in isolated networks where the KMS activation threshold is not met

MAK

 

Number of computers in test/development labs that will not be activated

None

 

Remaining computer count should be zero