Overview/Description
Microsoft Windows 8.1 and Office applications need to be activated before they can be used by users within a network. Organizations are required to purchase volume licenses which can be deployed to devices automatically using various methods, including Key Management Service, Multiple Activation Keys, and Active Directory-based activation. Office 2013 and Office 365 are to applications that are commonly used throughout organizations. These can also have their deployments automated to make deployment to hundreds of computers an easier administrative task. This course will describe the various volume activation methods and how they are each used. It will also discuss and demonstrate how to deploy Office 2013 using MSI and deploy Office 365 using C2R. This course is one in a series of Skillsoft courses to help prepare for the 70-695 Deploying Windows Devices and Enterprise Apps certification exam.
Target Audience
IT professionals who deploy, manage, and maintain client computers, devices, and applications in a network infrastructure
Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation
start the course
describe product activation and the three main activation methods: Retail, OEM, volume activation
describe the three activation models: Active Directory-based, KMS, MAK
describe the Active Directory-based activation process and planning considerations
describe the process and planning considerations for using KMS and MAK for volume activation, including how to choose a KMS host
describe VAMT and Volume Activation Services, including the benefits and features
identify the type of activate that may be required depending on the type of infrastructure implemented: core, isolated, disconnected, development labs
install the Volume Activation Services role, add a KMS host, and activate the KMS key
install, configure, and verify Active Directory-Based activation
describe how computers get activated using KMS
describe two ways MAK can activate computers: independent activation and proxy activation
describe how to use VAMT to manage activation and licensing status of computers and products, as well as key usage
describe the two Office 2013 versions available for installation: MSI and C2R
describe the six deployment methods for Office 2013 installations: local, network, group policy, software distribution, virtualization and standard image
describe the advantages, disadvantages, and compatibility issues of Office 2013 64-bit versus 32-bit
explain how Office 2013 can be activated using the various methods
explain what re-arming is and how to complete it
describe how the Office Customization Tool, OCT can be used to customize Office 2013 for deployment
use OCT to customize the setup before installing Office 2013, this includes customizing the installation and creating the network installation point
create a silent installation of Office 2013 using the Config.xml file or OCT
slipstream updates in the Office 2013 deployment
add Office to an image for deployment through MDT for a LTI
use the C2R Administration tool to prepare for a C2R installation of Office 365
deploy C2R for Office 365 products using the Office Deployment Tool
identify the ways Office 365 can be updated
apply an update to Office 365 using the Office Deployment Tool
monitor the usage for Office 365 using the Telemetry Dashboard
activate Windows deployments using various methods and deploy Office 2013 and Office 365 using MSI and C2R