Course Details

Previous Page

Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation

Target Audience
Expected Duration
Lesson Objectives
Course Number

Microsoft Windows 8.1 and Office applications need to be activated before they can be used by users within a network. Organizations are required to purchase volume licenses which can be deployed to devices automatically using various methods, including Key Management Service, Multiple Activation Keys, and Active Directory-based activation. Office 2013 and Office 365 are to applications that are commonly used throughout organizations. These can also have their deployments automated to make deployment to hundreds of computers an easier administrative task. This course will describe the various volume activation methods and how they are each used. It will also discuss and demonstrate how to deploy Office 2013 using MSI and deploy Office 365 using C2R. This course is one in a series of Skillsoft courses to help prepare for the 70-695 Deploying Windows Devices and Enterprise Apps certification exam.

Target Audience
IT professionals who deploy, manage, and maintain client computers, devices, and applications in a network infrastructure


Expected Duration (hours)

Lesson Objectives

Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation

  • start the course
  • describe product activation and the three main activation methods: Retail, OEM, volume activation
  • describe the three activation models: Active Directory-based, KMS, MAK
  • describe the Active Directory-based activation process and planning considerations
  • describe the process and planning considerations for using KMS and MAK for volume activation, including how to choose a KMS host
  • describe VAMT and Volume Activation Services, including the benefits and features
  • identify the type of activate that may be required depending on the type of infrastructure implemented: core, isolated, disconnected, development labs
  • install the Volume Activation Services role, add a KMS host, and activate the KMS key
  • install, configure, and verify Active Directory-Based activation
  • describe how computers get activated using KMS
  • describe two ways MAK can activate computers: independent activation and proxy activation
  • describe how to use VAMT to manage activation and licensing status of computers and products, as well as key usage
  • describe the two Office 2013 versions available for installation: MSI and C2R
  • describe the six deployment methods for Office 2013 installations: local, network, group policy, software distribution, virtualization and standard image
  • describe the advantages, disadvantages, and compatibility issues of Office 2013 64-bit versus 32-bit
  • explain how Office 2013 can be activated using the various methods
  • explain what re-arming is and how to complete it
  • describe how the Office Customization Tool, OCT can be used to customize Office 2013 for deployment
  • use OCT to customize the setup before installing Office 2013, this includes customizing the installation and creating the network installation point
  • create a silent installation of Office 2013 using the Config.xml file or OCT
  • slipstream updates in the Office 2013 deployment
  • add Office to an image for deployment through MDT for a LTI
  • use the C2R Administration tool to prepare for a C2R installation of Office 365
  • deploy C2R for Office 365 products using the Office Deployment Tool
  • identify the ways Office 365 can be updated
  • apply an update to Office 365 using the Office Deployment Tool
  • monitor the usage for Office 365 using the Telemetry Dashboard
  • activate Windows deployments using various methods and deploy Office 2013 and Office 365 using MSI and C2R
  • Course Number: