Unlimited archive and mail storage Enterprise app management Enterprise plans are only available when purchased as a one-year commitment. However, Business plans are available month to month for a slightly higher per-user price and in yearly subscriptions. Office Business Plans Office Business plans were created for small businesses with fewer than employees that might not need all the bells and whistles Office offers. Office Business Essentials Looking to get basic Office functionality? Office Business Essentials offers business email with 50 GB mailbox storage, custom email domain and web versions of essential Office applications like Outlook, Word, Excel and PowerPoint.
An Introduction to Microsoft Server and Client Licensing - Understanding and choosing the right licenses for your Microsoft server products. Microsoft volume licensing of software makes it easier and more affordable to run software By acquiring software licenses through Microsoft Volume Licensing. Microsoft volume licensing explained. Having the correct type and number of Microsoft licenses in place is not only important to ensure your users can access.
Overview[ edit ] Traditionally, a product key has been supplied with computer programs. It acts analogously to a password: The computer programs of the old ask the user to prove their entitlement; in response, the user provides this key. This key, however, must only be used once, i. A volume licensing key VLK , however, can be used on several computers. Vendors can take additional steps to ensure that their products' key are only used in the intended number. These efforts are called product activation.
Volume licenses are not always transferable. For example, only some types of Microsoft volume license can be transferred, provided a formal transfer process is completed, which enables Microsoft to register the new owner.
A very small number of software vendors specialize in brokering such transfers in order to allow the selling of volume licenses and keys. The most notable of these, Discount-Licensing , pioneered the sale of Microsoft volume licenses in this way. With the release of Windows XP in , Microsoft introduced Microsoft Product Activation , a digital rights management DRM scheme to curb software piracy among consumers by verifying the user's entitlement to the product license.
At the time, however, the volume-licensed versions of Windows XP were exempt from this measure. Starting with Windows Vista , Microsoft introduced two volume licensing methods for IT professionals in charge of installing Windows in organizations, both of which are covered by Microsoft Product Activation: Hosts activated via a KMS have to report back to a software license server once every days.
A large group of Microsoft customers are OEMs that assemble and sell computers, such as desktops, laptops, tablet computers and mobile device.
Starting with Windows 8, however, everything needed to authorize the device is stored with SLIC data. In , Microsoft introduced the Office licensing program. In exchange for a monthly subscription fee, software, its updates, support for them, provisioning, administration, licensing and additional services are all provided through an online web-based dashboard.
In this scheme, licensed apps communicate recurrently with Microsoft over the Internet; as such, a product key needs not be issued to the user. Instead the administrator needs to sign up for Microsoft account , which holds details such as licensed apps, their number, and payment methods. This account is protected by credentials such as a username and a password. Main article: Adobe Creative Cloud Introduced in , Adobe Creative Cloud is a SaaS offering in which software produced by Adobe, their updates, support for them, provisioning, administration, licensing and additional services are all provided over the Internet, in exchange for a monthly subscription fee.
As with the Office , a user account registered with Adobe is all that is required to authorize software and store payment information. Unauthorized use[ edit ] Microsoft has blocked several volume license keys that have been abused in service packs, starting with Windows XP Service Pack 1. Microsoft even developed a new key verification engine for Windows XP Service Pack 2 that could detect illicit keys, even those that had never been used before.
Several security consultants have condemned the move by Microsoft, saying that leaving a large install base unpatched from various security holes is irresponsible because this unpatched install base can be leveraged in large scale Internet attacks, such as Trojan horses used to send spam e-mail. Others have come to Microsoft's defense, arguing that Microsoft should not have to provide support for illegal users.
After much public outcry, Microsoft elected to disable the new key verification engine. Service Pack 2 only checks for the same small list of commonly used keys as Service Pack 1.
Users of existing installations of Windows XP can also change their product key by following instructions from Microsoft. In the image, the key is written on a CD-R containing the leaked operating system and held in front of a digital Microsoft sign counting down the days until the release of Windows XP. KMS client keys are well known and documented publicly by Microsoft. Businesses operating KMS servers are required to properly shield the KMS server behind firewalls so that it cannot be reached from the Internet, and be used to authorize illegal use of KMS client keys by the general public.
Public exposure of a KMS server can result in Microsoft revoking the server key, thereby disabling all attaching clients. External KMS server access is desirable for devices on long-term leave away from the corporate network, as KMS client activation will expire after six months of not being able to contact a KMS server.
For this situation, a business can make it accessible through a virtual private network VPN known only to the devices outside the corporate network. KMS server and client emulators[ edit ] An unofficial KMS server emulator exists that will activate Windows or Office even if the software was not licensed or paid for, regardless of whether or not there are 25 or more computers on the network, and regardless of whether or not a previous version of Windows was installed.
Microsoft considers both of these exploits to be a violation of the Terms and Conditions.