Topics Map > Communication and Collaboration > Office 365
Office 365, ProPlus, Device Based Activation
Office 365 ProPlus Device Based Activation project started May 2018. It allows IT Pros to deploy Office 365 ProPlus to University-owned machines, activates Office agianst the machine instead of to individual Office 365 accounts. Specific instructions and resources can be found on WebStore offers for campus IT Pros and as an available packages in Tech Services SCCM End-Point Management Service.
* Up to 80% reduction in the number of Windows Updates
* Reduce image size by up to 20GB – reducing imaging time by up to 50%
* No KMS or MAK key management required – Office 365 acts as your “Cloud KMS”
* Teachers and students can continue to use Office while it updates
Where to find Office 365 ProPlus Device Based Activation files:
SCCM console path:
“\Software Library\Overview\Application Management\Applications\MANAGED APPLICATIONS\Microsoft\Office 365”
Microsoft Office 365 ProPlus Device Based Activation for UI IT Pros
Instructions for using Office 365 ProPlus Device Based Activation:
General Information from Microsoft:
Note: some portions have already been completed: enabling the service, getting the key, downloading the package from Microsoft.
Configuration information for Office Deployment Tool:
Here is a MS tool to build them via GUI:
Video from Microsoft MVP about Device Based Activation Configurations:
Does Device Based Activation work for Mac machines?
No. At this time Microsoft does not offer a device registration method of Office 365 ProPlus. Individuals are encouraged to use the Office 365 ProPlus option from the Office 365 portal. See Office 365 Installation instructions in the following knowledge article: 62766
What happens when the University of Illinois Office 365, Device Based Activation (DBA) Key changes?
-Older keys will continue to function
-New DBA installs will require the new key
-Tech Services retains the right to create a new key for any reason but will announce changes to TechSupport and update the key information through the deployment methods