Avoiding Microsoft Software Piracy

Apr 14, 2016

How can you avoid Microsoft software piracy? Why is this important?


With the increase in cybercrime being directly linked to malware impacting pirated software, it is no surprise that Microsoft is upping the ante in places like Australia in an effort to catch the offenders.

To ensure that you do not fall prey to pirated Microsoft software, they issued an overview of the different types of piracy and how to avoid them, which we have summarized below.


Hard Disk Loading (installation piracy)

This occurs when a system builder installs (and typically activates) one license onto multiple devices, then sells the devices without accompanying software licenses. The system builder avoids the license costs, but typically charges the customer for the illegitimate software. Customers may remain unaware of any pirating until they encounter issues.

To avoid this if you are a system builder, ensure you are providing your customers with a genuine, fully licensed version of software to accompany software you have installed on a new PC. Microsoft OEM Software is designed specifically for this purpose, and can be purchased from Microsoft Authorized OEM Distributors.


Online Downloads of Microsoft Software

This is software distributed illegally via peer-to-peer networks or downloaded through unauthorized sites. This software often contains harmful malware and viruses that can put users at risk.

To avoid this, only download Microsoft software from sites you know are legitimate, such as the Microsoft Store. Never download from any peer-to-peer networks, BitTorrent index sites, or one-click file hosting sites.


Standalone Certificates of Authenticity (COAs)

Standalone COAs are COAs that are sold by themselves, without the accompanying software they authenticate. They are often branded as “excess inventory” or “unused labels” and are often counterfeit versions of COAs. Purchasing standalone COAs and passing them off to unsuspecting customers is a form of piracy.

COAs should never be sold, shipped, or purchased on their own, without being affixed to a PC or sold with related Microsoft software (either full packaged product or Microsoft OEM software acquired by system builders).


Leaked Volume License Keys (VLKs)

Microsoft Volume Licensing Agreements for large organizations provide Volume License Keys (VLKs) for Microsoft product activation in certain scenarios. The unauthorized distribution of these VLKs, outside of the organization to which they are tied, is a form of piracy.

Only those devices that are a part of the organization with the Volume Licensing Agreement may use their assigned VLKs. VLKs are never legitimate when sold or distributed outside of the organization to which they are tied. Never purchase or illegally use or download a VLK.


Online Auction Sites

Pirated or unauthorized software is often distributed via online auction sites, where sellers take advantage of unsuspecting buyers. Sellers may be offering second-hand product, previously activated product, stolen or used COAs, illegally copied DVDs, etc. Buyers are often left without recourse once they discover they have been a victim of piracy.

Be careful when buying from online auction sites. Ask important questions. Does the software come in its original packaging? Does it include all necessary components? Is the price too good to be true? Is it being sold by a reseller you know and trust?

If you have any questions on your Microsoft licensing please get in touch.

Follow us on Linkedin for more Cloud


Read more like this from

Ready to Speak to the Team that Makes Our Customers So Happy?

Certero's [software-as-a-service] Solution

Certero help organizations transform their outdated operations and technologies in days and weeks not years. All of Certero’s solutions can be delivered as SaaS with no loss of functionality. 

Certero Unified Platform
Learn more about Certero’s truly unique ‘unified’ platform.

Digital Transformation Edition
Transform in days and weeks, not months and years, start your journey now.

Verified Oracle LMS/GLAS Solution
Verified LMS (License Management Services), now GLAS (Global Licensing & Advisory Services) solution.

Cloud Management
Manage Visibility, Cost and Governance of your Cloud Resources 

Enterprise Standard Edition - ITAM / SAM for Wintel
Default solution to manage ITAM/SAM for a Wintel environment. 

Enterprise Premium Edition - ITAM / SAM for Wintel
All you need in one place to manage your ITAM/SAM for a Wintel & Citrix environment. 

Stand-a-lone or holistic solutions for IBM, SAP and Oracle.

Software License Compliance
One Stop Shop, products and services for any solution – all in one

Business Intelligence Solution
See how to turn DATA into INFORMATION then transform into KNOWLEDGE, all in a few clicks. 

IT Asset Visibility
Find out: What do I own? Where is it located? Who is using it?

ITSM & CMDB Integration 
Populating the CMDB with ‘Quality’ asset information is more critical than ever

SaaS Subscription Management
Discover, manage and optimize your SaaS investments.

Everything in One place, True Unification

IT Hardware, Software, SaaS and Cloud Asset Management products that can run ‘stand-a-lone’ or ‘holistically’ and optimally together as a single solution, no dependencies. True unification across all asset and platforms and all delivered as SaaS. All of Certero’s products have the best TTV (Time to Value) by some distance.

Certero for Enterprise ITAM
Networks, printers, routers, Wintel, Mac, Linux, zLinux, Unix, all virtualizations and much more....

Certero for Enterprise SAM
Focused on Wintel software vendors, including automated solutions for Microsoft, Adobe and much more...

Certero App Centre 
Enterprise ‘Application Portal’ for Self-Service application provisioning.

Certero for Mobile
Go beyond standard MDM and deliver full management and security for your mobile workforce.

Certero SRDB (Software Recognition)
Transform raw software inventory data into actionable intelligence about application usage and licensing.

Certero for Oracle 
Optimize your Oracle Database, Middleware and E-Business Suite applications.

Certero for IBM
Discover and manage all IBM software & entitlements across the network. Dual Inventory, ILMT and Certero.

Certero for SAP Applications
Managing and automating the analysis of complex SAP named user and engine licenses across your estate. 

An intuitive self-service password reset solution that can reduce service desk calls by 30%. 

PC Power Management solution. Save money and reduce your carbon footprint. 

Gartner Peer Insights Customers’ Choice

Rated #1 for SAM Customer Satisfaction year after year, after year

For the latest in ITAM, SAM, Cloud and SaaS Asset Management

White Papers and eBooks 
Download the latest white papers and eBooks for key insights and guides.

Read the latest news from Certero and the industry.

Events and Webinars
Keep up to date with Certero's latest webinars and events.


View our range of product videos, webinars and customer case studies. 

Data Sheets
Download our datasheets which highlight the key benefits and features of our world class products and services. 

Case Studies 
See how organization around the globe change they way they [Do IT].

We think [and do] IT Differently

We don’t believe in claiming to be something we’re not. We will not do mediocre, average, indifferent, or outdated. We are different and will do it differently.

About Us
Get to know us more

Our Story
See how our approach is different

Our Journey
A timeline of events

Our Vision, Mission and Purpose
Mission, Purpose and Values

Browse our current roles

Find our nearest location