Skip navigation
All Places > Snow Product Hub > General Licensing Forums > Blog > Author: peter.verwulgen2

Microsoft Visual Studio Subscriptions are the most comprehensive set of resources for you to create, deploy, and manage great applications on your preferred platforms and devices, including Windows, iOS, Android, and Linux.

Visual Studio subscriptions are offered monthly, annually, or on multi-year contracts. You can purchase through a reseller, through the Microsoft Store online, and directly through the Visual Studio Marketplace which is billed through Azure (along with any other Azure services you may be using).
There are options to buy just the Visual Studio IDE, or to also get a comprehensive set of subscriber benefits including cloud services, software for development and testing, extensions, support and training, and much more. Below you can find a short overview of the subscriber benefits.


Developer tools

Get access to the latest versions of Visual Studio: full featured IDE for Android, iOS, Windows, macOS, web and cloud app development, and other cross-platform tooling, on PC or Mac.

  • Visual Studio Professional or Visual Studio Enterprise
  • Visual Studio Professional for Mac or Visual Studio Enterprise for Mac
  • Team Foundation Server and TFS CAL


Cloud services

Receive free access to Azure services, plus discounted development and test rates, and exclusive access to a subscriber only image gallery with preconfigured virtual machines. Share code, track work, and ship software – for any language, all in a single package.

  • Azure developer services, with monthly cloud credits
  • Visual Studio Team Services – access to unlimited number of accounts
  • Visual Studio App Center
  • Office 365 Developer Subscription, PowerBI Pro



Access core Microsoft software with simple per-user licensing, enables you to install and use software as much as you need for your development projects.

  • Windows and Windows Server
  • SQL, SharePoint and Exchange
  • Office Professional Plus


Support and training

Take your skills to the next level with world-class technical and professional training on all and the latest trends, technologies, across platforms. Rely on technical experts to help you solve issues and answer questions.

  • LinkedIn Premium (business, tech and creative)
  • Pluralsight (cloud, design, security, mobile and data)
  • Data Camp (data-science and AI)
  • Xamarin University (mobile development)
  • Opsgility training (cloud-focused)
  • Microsoft Professional Technical Support incidents
  • Azure Advisory Chat1
  • Azure Community



When it comes to Visual Studio subscriptions, there are 2 important licensing basics to keep in mind:


Visual Studio Subscriptions have a user based licensing model.

All Visual Studio subscriptions and Visual Studio Professional are licensed on a per-user basis. Each licensed user may install and use the software on any number of devices to design, develop, test, and demonstrate their programs. Visual Studio subscriptions also allow the licensed user to evaluate the software and to simulate customer environments in order to diagnose issues related to your programs. Each additional person who uses the software in this way must also have a license.

Visual Studio Subscriptions are not licensed to run in production environments.

The licensed user can install and use the software on any number of devices. The software can be installed and used on your devices at work, at home, at school, and even on devices at a customer’s office or on dedicated hardware hosted by a 3rd party. Most subscriber software can also be run in Microsoft Azure VMs. However, the software is otherwise not licensed for use in production environments.

You can find all additional info on licensing Visual Studio Subscriptions in the licensing whitepaper.

A basic overview on how to register your Visual Studio Subscriptions in Snow License Manager is available here.

To safeguard valuable information assets from unauthorized use, IT departments use methods like partitioning, authentication, and firewalling. To access these assets, the workforce of the 21st century use a range of techniques on devices such as laptops, desktops, tablets, phones, and watches. Many of these devices are mobile, facilitating access to valuable information from anywhere, at any time, over networks that may not be secure. And often, devices are being used to access information without being authorized to do so. Such behavior presents risk. IT departments however, need to shift from the position of restricting access for the sake of security, to providing access while maintaining security. SAM can provide the visibility required for the IT department to become the technology enabler and support the organization’s needs, without compromising security.

Getting the right balance between protection and availability is a classic security conundrum – a problem made more complex by technology, device proliferation, and tech-savvy users. To unravel some of that complexity, I believe that insight is critical. You can’t protect something if you don’t know it exists. Modern user behaviour undermines IT in their efforts to ensure that there are no blind spots in the network. So, let’s dig a little deeper into the behaviours and challenges that impact the ability to achieve full visibility of the IT estate.


Technology evolution has enabled information assets to be accessed, modified, shared, and deleted through any device, from anywhere. The mass adoption of mobile technology, cloud computing, and constant connectivity has effectively shifted the responsibility to protect assets from the IT department down to the individual user – each with their own experiences and level of security awareness.


Tech savvy employees don’t care to wait. Mobile devices have empowered people to download software as they need it, make use of it, and then forget about it. Waiting for approval, paying for licenses, and understanding the impact of licensing terms and conditions (T&Cs) tend to be low on the list of priorities when deadlines need to be met. People work from anywhere and use their own devices and applications (BYOD/BYOT) as well as those provided by their employers (Company Owned, Personally Enabled: COPE). In response to this shift, software publishers like Adobe and Microsoft have changed the way they license their products, providing users with greater flexibility.


Organizations that enforce tight security measures see their employees moving on, or circumventing set procedures in the name of digital expediency. The spread of the wannacry worm is just one example that highlights the risk faced by organizations using out of date technologies. With the GDPR coming into force, many companies are reviewing data security processes to ensure compliance, and are turning to technology to get the right balance between employee flexibility and overly-tight security.


I, for example, use a cloud-based app to share photos and files with my family and friends. The license terms state that the app is free for personal use. So, what happens when I share information from my private cloud space with one of my colleagues using a public Wi-Fi hotspot? Not only am I exposing my employer to the risk of data leaks by using an insecure network, I am breaching the T&Cs of the software agreement. A deeper investigation of the T&Cs reveals that if more than a dozen people within my organisation start using the app to share information, my employer is liable for a business license for each user. But neither my CFO, nor the IT department will be aware of this liability until an audit is a fact (read more in our blog on Managing mobile device usage agreements).


So, how is it possible to gain a 360-degree insight into the software estate when BYOD, new devices, technology evolution, user behaviour, and lack of awareness work to undermine IT and security teams and their efforts to keep a grip on the network estate? SAM managers have a key role to play because the solutions they rely on provide them with this insight. Gaining insight starts with Inventory of the software estate – ensuring that the blind spots are picked up, as they are often a source of risk. Enterprise mobility management (EMM) solutions, such as Snow Device Manager, inventory the mobile park, and deliver mobile SAM capabilities. They can, for example, provide a software store of approved applications, delivering sufficient freedom to users while at the same time ensuring license compliance. Security measures, such as remote wipe for lost devices, data encryption, and removal of blacklisted applications, will help organizations to protect information assets and personally identifiable information (PII). Automation tools like Snow Automation Platform enable the IT team to, for example, provision devices automatically with local network settings, improving security through generated passwords that are never shared with users. By controlling settings and automating common processes, human-error is reduced and the power of cloud computing can be unleashed securely into the organization.


BYOD isn’t going away, smartwatches are the next device that corporations will need to address, and the complexity in achieving the balance between protection and ease of information access will continue to rise as technology evolves. Achieving this balance is a constant journey of reassessment that starts with getting to know your unknown unknowns. With a deeper understanding of what is going on in the network, SAM managers visibility provides the insight that is vital to build secure IT environments. Learn more about multiplatform inventory to gain complete visibility of your IT estate by having a read of our eBook: Remove Your IT Blind Spots.