How To Find Product Key For Windows Server 2008 R2 Using Powershell

-->

Need help to find and locate Windows Server 2008 R2 volume license keys from the system registry, to document what keys are with which server. I have tried Magic Jelly Bean and Produkey, but both will not display 'volume license keys', but instead either display nothing, or all BBBB-BBBBB.' If anyone knows of a way to retrieve the product. Sep 01, 2020 You can find a time machine and go back to anytime between 2008 and 2015? Then you can find out if the product key on your CD pack was re-sold by your staff as only your staff could see it. Else were you using a pirated copy? The only real option is to move on towards server 2019.

Applies to: Windows Server 2008 and Windows Server 2008 R2

Windows Server 2008 and Windows Server 2008 R2 reached the end of their support lifecycle on January 14, 2020. Windows Server Long Term Servicing Channel (LTSC) has a minimum of ten years of support—five years for mainstream support and five years for extended support. This support includes regular security updates.

End of support also means the end of security updates. This scenario can cause security or compliance issues and put business applications at risk. Microsoft recommends that you upgrade to the current version of Windows Server for the most advanced security, performance, and innovation.

If you haven't already upgraded your servers, the following options will help protect your apps and data during the transition:

  • Migrate existing Windows Server 2008 and 2008 R2 workloads as-is to Azure Virtual Machines (VMs).
    • This migration to Azure automatically provides an additional three years of extended security updates (ESU). There's no additional charge for extended security updates on top of Azure VM's cost, and there's no additional configuration required.
  • Purchase an extended security update subscription for your servers and remain protected until you're ready to upgrade to a newer Windows Server version.
    • These updates are provided for up to three years after the end of support lifecycle date.

After the three year period of extended updates, we'll stop updating for Windows Server 2008 and 2008 R2. We recommend you update your version of Windows Server to a more recent version as soon as possible.

What are extended security updates for Windows Server?

Extended security updates (ESUs) for Windows Server include security updates and bulletins rated critical and important, for a maximum of three years after January 14, 2020. Extended security updates don't include the following:

  • New features
  • Customer-requested non-security hotfixes
  • Design change requests

For more information, see the Extended Security Updates frequently asked questions.

How to use Extended Security Updates

If you run Windows Server 2008 or 2008 R2 VMs in Azure, they're automatically enabled for Extended Security Updates. You don't need to configure anything, and there's no additional charge for using Extended Security Updates with Azure VMs. Extended Security Updates are automatically delivered to Azure VMs if they're configured to receive updates.

Note

Microsoft.ClassicCompute VMs require additional configuration for Extended Security Updates deployment since they don't have access to the Azure Instance Metadata Service that determines Extended Security Updates eligibility. Please contact Microsoft support for more help.

For other environments, such as on-premises VMs or physical servers, you need to manually request and configure Extended Security Updates. You can purchase Extended Security Updates through Volume Licensing Programs such as Enterprise Agreement (EA), Enterprise Agreement Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud Enrollment (SCE).

When you've purchased Extended Security Updates, you can use one of the following methods to get your keys:

  • If you want to get Extended Security Update keys from the Azure Portal, you can register for Extended Security Updates in the Azure Portal.
  • You can also sign in to the Microsoft Volume Licensing Service Center to get your keys without using the Azure Portal.
Product

Register for Extended Security Updates on Azure Portal

To use Extended Security Updates on non-Azure VMs, create a multiple activation key (MAK) and apply it to Windows Server 2008 and 2008 R2 computers. The MAK key lets the Windows Update servers know that you can continue to receive security updates. You register for Extended Security Updates and manage these keys using the Azure portal, even if you only use on-premises computers.

Note

You don't need to register for Extended Security Updates if you're running Windows Server 2008 and 2008 R2 on Azure VMs. For other environments, such as on-premises VMs or physical servers, purchase Extended Security Updates before you try to register and use them.

To register your VM for Extended Security Updates and create a key, open the Azure Portal and follow these instructions:

  1. Sign in to the Azure Portal.

  2. In the search box at the top of the Azure Portal, search for and select Extended Security Updates.

    If you haven't use extended security updates before, select + Create to create an Extended Security Updates resource first. Otherwise, select your resource from the list.

  3. Under Register for Extended Service Updates, select Get started.

  4. To create your first key, select Get key.

    You need an Azure subscription associated with your account to create the Extended Security Update resource and key. If you don't have an Azure subscription associated with your account, sign in with a different user account or create an Azure subscription in the Azure Portal.

    Your Azure subscription must also be assigned the Contributor role for the security update to work. To check your role, enter 'Subscriptions' into the search box. You'll see a table that will show you your role next to your subscription ID and name.

    If you aren't a Contributor, you can ask the subscription owner to change your role. To find out who owns your subscription, go to the role table described in the previous paragraph and select your subscription's name. Next, go to the menu on the left side of the page and select Access control (IAM) > Role assignments and look for the 'Owners' section in the table.

  5. If you see a page that says 'Register to get a Multiple Activation Key,' that means you need to request access to the private preview before you can use Extended Security Updates. If you don't see this page, skip ahead to step 6.

    To request access, select join the private preview. An email message window will open. This email is your access request to the product team.

    Include the following information in your request:

    • Customer name
    • Azure subscription ID
    • Agreement number (for ESU)
    • Number of ESU servers

    When you're done, send the email.

    The team will review the information you provide in your request email. If everything looks okay, they'll add you to the approved list.

    If the team doesn't approve your request, you'll see the following error:

  6. Under Azure details, select your Azure subscription, a resource group, and location for your key.

    Under Registration details, enter the following information:

    SettingValue
    Key nameA display name for your key, such Agreement01.
    Agreement numberYour agreement number generated by the volume licensing contract management system, or MSLicense for Enterprise Agreement programs.
    Number of computersChoose the number of computers on which you want to install Extended Security Updates with this key.
    Operating systemChoose the operating system to use this key with, such as Windows Server 2008 or Windows Server 2008 R2.

    When ready, select Review + register.

    Note

    Make sure you've selected the Azure subscription that you joined the private preview with in your global filter. Select the Filter button in the Azure Portal ribbon to check your global subscription filter.

  7. After successful validation, a summary of your choices for the new registry resource is shown. If needed, correct any validation errors or update your configuration choice. The Azure Terms of Use and Privacy Policy are available.

    Check the box to confirm that you have eligible computers and the key is only to be used within your organization:

    When ready, select Create to generate the MAK.

Extended Security Updates registration is now available for use with your computers. The key created should be applied to Windows Server 2008 and 2008 R2 computers that you wish to remain eligible for security updates.

Sign in to the Microsoft Volume Licensing Service Center

If you don't have access to the Azure Portal, then you can use the Volume Licensing Service Center to view and download your activation keys.

To get your keys from the Volume Licensing Service Center:

  1. Go to the Volume Licensing Service Center page and sign in with your Azure credentials.

  2. Select Licenses > Relationship Summary > Licensing ID > Product Keys.

To learn more about how to get Extended Security Updates for eligible Windows devices, see our Tech Community post.

Download and apply Extended Security Updates

Delivery, download and application of Extended Security Updates for Windows Server is no different than existing deployment processes. The updates provided through Extended Security Updates are only for Security, and are released every Patch Tuesday.

You can install the updates using whatever tools and processes already in place. The only difference is that the system must be registered using the key generated in the previous section for the updates to download and install.

For Azure VMs, the process of enabling the computer for Extended Security Updates is automatically completed for you. Updates should download and install without additional configuration.

-->

Syntax

Description

The Set-WindowsProductKey cmdlet sets the product key for the current Windows Edition in the specified image.

Examples

Example 1: Set the product key on a mounted image

How To Find Product Key For Windows Server 2008 R2 Using Powershell

This command sets the product key on the Windows image that is mounted to c:offline.

How To Find Product Key For Windows Server 2008 R2 Using Powershell Key

Parameters

-LogLevel

Specifies the maximum output level shown in the logs.The default log level is 3.The accepted values are as follows:

  • 1 = Errors only
  • 2 = Errors and warnings
  • 3 = Errors, warnings, and information
  • 4 = All of the information listed previously, plus debug output
Type:LogLevel
Aliases:LL
Accepted values:Errors, Warnings, WarningsInfo
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

Specifies the full path and file name to log to.If not set, the default is %WINDIR%LogsDismdism.log.In Windows PE, the default directory is the RAMDISK scratch space which can be as low as 32 MB.The log file will automatically be archived.The archived log file will be saved with .bak appended to the file name and a new log file will be generated.Each time the log file is archived the .bak file will be overwritten.When using a network share that is not joined to a domain, use the net use command together with domain credentials to set access permissions before you set the log path for the DISM log.

Type:String
Aliases:LP
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

Specifies the full path to the root directory of the offline Windows image that you will service.If the directory named Windows is not a subdirectory of the root directory, WindowsDirectory must be specified.

Product
Type:String
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

Specifies the product key to use for the Windows image.

Type:String
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

How To Find Product Key For Windows Server 2008 R2 Using Powershell Reset

Specifies a temporary directory that will be used when extracting files for use during servicing.The directory must exist locally.If not specified, the Windows%Temp% directory will be used, with a subdirectory name of a randomly generated hexadecimal value for each run of DISM.Items in the scratch directory are deleted after each operation.You should not use a network share location as a scratch directory to expand a package (.cab or .msu file) for installation.The directory used for extracting files for temporary usage during servicing should be a local directory.

Type:String
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

How To Find Product Key For Windows Server 2008 R2 Using Powershell Command

Specifies the path to the location of the BootMgr files.This is necessary only when the BootMgr files are located on a partition other than the one that you are running the command from.Use -SystemDrive to service an installed Windows image from a Windows PE environment.

Type:String
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

Specifies the path to the Windows directory relative to the image path.This cannot be the full path to the Windows directory; it should be a relative path.If not specified, the default is the Windows directory in the root of the offline image directory.

Type:String
Position:Named
Default value:None
Accept pipeline input:True
Accept wildcard characters:False

Inputs

String[]

Microsoft.Dism.Commands.ImageObject

Outputs

Microsoft.Dism.Commands.ImageObject

Related Links