Vpro Technology Reference Guide
Vpro Technology Reference Guide
Vpro Technology Reference Guide
Reference Guide
Updated for Intel AMT 7.0
Revision 3.0
March, 2011
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS
GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR
SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR
IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR
WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT
OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR
INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A
SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers
must not rely on the absence or characteristics of any features or instructions marked "reserved" or
"undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for
conflicts or incompatibilities arising from future changes to them. The information here is subject to change
without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may
cause the product to deviate from published specifications. Current characterized errata are available on
request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing
your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel
literature, may be obtained by calling 1-800-548-4725, or by visiting Intel's Web Site.
Intel® Active Management Technology requires the computer system to have an Intel® AMT-enabled
chipset, network hardware and software, as well as connection with a power source and a corporate network
connection. Setup requires configuration by the purchaser and may require scripting with the management
console or further integration into existing security frameworks to enable certain functionality. It may also
require modifications of implementation of new business processes. With regard to notebooks, Intel® AMT
may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting
wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see
www.intel.com/technology/platform-technology/intel-amt/
Systems using Client Initiated Remote Access require wired LAN connectivity and may not be available in
public hot spots or “click to accept” locations. For more information on Fast Call for Help go to:
http://www.intel.com/products/centrino2/vpro
The original equipment manufacturer must provide TPM functionality, which requires a TPM-supported BIOS.
TPM functionality must be initialized and may not be available in all countries.
Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS,
virtual machine monitor (VMM) and, for some uses, certain computer system software enabled for it.
Functionality, performance or other benefits will vary depending on hardware and software configurations
and may require a BIOS update. Software applications may not be compatible with all operating systems.
Please check with your application vendor.
No computer system can provide absolute security under all conditions. Intel® Trusted Execution
Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-
enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured
launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application.
In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing
Group and specific software for some uses. For more information, see here
Intel® Anti-Theft Technology—PC Protection (Intel® AT-p). No computer system can provide absolute
security under all conditions. Intel® Anti-Theft Technology (Intel® AT-p) requires the computer system to
have an Intel® AT-enabled chipset, BIOS, firmware release, software and an Intel® AT-capable Service
Provider/ISV application and service subscription. The detection (triggers), response (actions), and recovery
mechanisms only work after the Intel® AT functionality has been activated and configured. Certain
functionality may not be offered by some ISVs or service providers and may not be available in all countries.
Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof.
Enabling Execute Disable Bit functionality requires a PC with a processor with Execute Disable Bit capability
and a supporting operating system. Check with your PC manufacturer on whether your system delivers
Execute Disable Bit functionality.
Intel® Identity Protection Technology (Intel® IPT)— No system can provide absolute security under all
conditions. Requires an enabled chipset, BIOS, firmware and software and a website that uses an Intel® IPT
Service Provider’s Intel IPT solution. Consult your system manufacturer and Service Provider for availability
and functionality. Intel assumes no liability for lost or stolen data and/or or any other damages resulting
thereof. For more information, visit http://ipt.intel.com/
Intel, the Intel logo, Intel® Core, Intel® Centrino, and Intel® vPro are trademarks or registered trademarks
of Intel Corporation in the United States and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © 2009, 2010, 2011 Intel Corporation. All rights reserved.
ii
Contents
Introduction ......................................................................................1
What’s New?......................................................................................................... 1
What is Intel® vPro™ Technology? .......................................................................... 2
iii
Intel® vPro™ Technology Reference Guide
iv
Intel® vPro™ Technology Reference Guide
Introduction
This document is intended for Information Technology (IT) professionals who need to
be aware of new features of the Intel® vPro™ Technology platform. This Reference
Guide provides a high-level overview of how this technology can be used, a short
discussion of the key features, and a high level list of tools and software.
This guide provides links to several key web sites for additional information and
support:
• Intel Software Network—this site provides development tools, documentation,
and resources to the community of programmers and developers of
manageability solutions using Intel Active Management Technology and Intel
vPro Technology.
• Intel vPro Expert Center—a community resource for IT professionals focused on
Intel vPro Technology. This site features use case examples that show you how
to unlock the value of Intel vPro Technology. This site also has sub-
communities for embedded manageability, small business users, and users of
manageability software from Microsoft, Symantec, LANDesk, HP, and others.
• Intel vPro Alliance—this site provides contact information so you can get the
help you need to activate your Intel vPro technology.
• Intel vPro Activation—this site will help new users get started with Intel vPro
Technology. The site includes an Activation Wizard that helps users select the
activation methods the best meets their needs.
What’s New?
The 2nd Generation Intel® Core™ processors with vPro™ Technology add the following
new features:
• Intel® Anti-Theft Technology 3.0 with new 3G wireless support and improved
resume from S3 sleep state capabilities
• Host-Based Configuration for easier setup and configuration of Intel AMT
• Intel® Management Engine firmware update roll-back capability to help IT
professionals synchronize firmware versions in their enterprise environment
• Intel Active Management Technology 7.0
• Intel® Identity Protection Technology for two-factor authentication that
eliminates the need for separate one-time password hardware tokens
• Up to 1920 x 1080 screen resolution for KVM Remote Control
• Support for desktop wireless manageability when Intel AMT is used with certain
Intel network cards
• DASH 1.1 capable
1
Intel® vPro™ Technology Reference Guide
2
Intel® vPro™ Technology Reference Guide
3
Intel® vPro™ Technology Reference Guide
Use Cases
Introduction
With Intel vPro technology, IT departments can discover, protect, and heal their
networked PC assets. The following use cases illustrate some of the many ways IT
departments can use Intel vPro technology to save time, save money, and reduce
power consumption. Each use case requires that all the managed PCs are Intel vPro
technology enabled, and, in most cases, that the IT management console is using a
third-party management software application.
For more information:
• Technology Brief: Intel Active Management Technology
• Intel Active Management Technology Use Cases
• Architecture Guide: Intel Active Management Technology
• Fast Facts on Intel Active Management Technology (Intel AMT)
• ROI Analysis - Realizing The Cost Saving Benefits of Activating Intel vPro
Technology
• Intel vPro Technology - Technical Use Cases
4
Intel® vPro™ Technology Reference Guide
AMT’s third-party data store (a secure data storage area in flash memory). The
management software can then be used to access the stored software inventory when
the client systems are powered-off (but connected to the AC power and network), or
when the operating system is down and the system is powered-on.
Because a system is found using Intel AMT, the IT professional is able to gather
information accurately, quickly, and remotely, so the enterprise can more efficiently
and effectively manage its software licenses, as well as optimizing utilization of
maintenance and service contracts.
In addition, accurate and timely inventory information enables the IT department to
better manage software updates.
Software inventory management is supported by all leading management software
packages (Microsoft*, LANDesk*, Semantec*, Hewlett-Packard*, and others).
For more information:
• Intel Active Management Technology Use Case #2: Software Inventory
Management (Discover)
5
Intel® vPro™ Technology Reference Guide
An example of this use case might be an end-user platform that will not boot due to a
missing or corrupt DLL. Intel AMT can be used to facilitate remote diagnosis and
repair of the end-user’s platform.
In another example, an alert could be sent to a management console identifying a
soon-to-fail hardware unit before the fail-to-boot problem occurs. If the system failed
without warning and refuses to boot, then, as in the example above, the end-user
could contact the help desk directly by phone or by using Fast Call for Help (page 12).
The IT technician could use Intel AMT IDE Redirection (IDE-R) to redirect the platform
to a known good boot image and then monitor and control the platform remotely (with
Serial-Over-LAN or KVM remote control). Using these tools, the IT help desk
technician can diagnose the problem and perform remote remediation (utilizing third-
party management software) if hardware replacement is not necessary. Furthermore,
the technician can perform these operations without the end-user being present and
even if the end-user’s platform is powered-off.
For more information:
• Intel Active Management Technology Use Case #4: Remote Diagnosis, Remote
Repair (Heal)
6
Intel® vPro™ Technology Reference Guide
7
Intel® vPro™ Technology Reference Guide
regardless of operating system or virus protection agent state. Scans for suspicious
behavior compare five points of data (source and destination IP addresses and port
numbers, as well as protocol type) against preset rules.
Additionally, heuristics-based network traffic filters monitor the outbound network
traffic for IP scans and port scans. Each node is able to compare a time slice of
network traffic against the heuristics filters defined in the system defense engine.
Based on time and number of occurrences of thresholds set in the filters, suspicious
behavior is detected.
These filters are configurable via third-party console applications, which govern
whether traffic identified as suspicious is dropped, alerted to the IT organization, or
passed through (no action). Depending on the IT policy setup, filters can be
programmed to protect the system from receiving or transmitting malware, resulting
in reduced support calls and increased user productivity.
In order to reduce network exposure, the IT organization can detect suspicious activity
at a node or series of nodes via alerts sent to a central control console. It can send
real-time updates via the out-of-band (OOB) channel to suspected nodes to block the
suspicious traffic (allowing the user to remain connected and active with only the
malware blocked) and update unaffected nodes with additional filter criteria. While a
platform is in quarantine, console software can clean the system of malware, viruses,
etc., using either a specific dedicated port or Serial-over-LAN (SOL)/IDE-R to boot the
system to a known good image for remediation.
For more information:
• Intel Active Management Technology Use Case #7: Hardware-Based Isolation
and Recovery (Protect)
• Intel AMT System Defense Use Cases (video)
8
Intel® vPro™ Technology Reference Guide
that are non-responsive, etc., leading to time-consuming issues that may yield
inaccurate results.
Using Intel AMT to Overcome Limitations
Intel AMT enabled third-party software agents register with the Intel AMT firmware.
Once they are registered, third-party management-console software configures how
often it will poll for agent presence. The polling is performed locally and does not
impact network performance. For example, the Intel AMT firmware can check to see if
the agents are present every 10 seconds. If agents don't respond to the poll, an alert
is sent to the management console.
If configured to do so, the system will take immediate action based on the policy that
was preconfigured, such as isolating the system from network access, while leaving a
port open to allow the console to force a reinstall of the disabled agent. In other
configurations, the management console will determine the action to take upon
receiving an alert from the system. Both mechanisms can reduce the number of
support calls received to remedy the affects of agent removal and reduce the amount
of time the system remains vulnerable.
For more information:
• Intel Active Management Technology Use Case #8: Agent Presence Checking
(Protect)
9
Intel® vPro™ Technology Reference Guide
10
Intel® vPro™ Technology Reference Guide
(PPS) and provisioning ID (PID) pairs for all systems requiring setup from the
configuration server. The configuration server stores the PPS/PID pairs and an
administrator password and other configuration data on the USB storage
device. The IT administrator plugs the USB storage device into the PC and
powers the PC on. As the PC loads, the BIOS and MEBx (Management Engine
BIOS Extension) reads the administrator password, PPS, PID, and other
required information from the USB storage device.
• Manual setup for dynamic IP networks: The IT administrator requests PPS and
PID pairs for all systems requiring setup from the configuration server. The
administrator powers on the PC to be set up, and during the boot, he or she
presses the appropriate key to display the MEBx configuration screen. The IT
administrator logs into the MEBx using the factory default administrator
username and password and changes the username and password when
prompted. The IT administrator ensures that the MEBx manageability mode is
set to Intel AMT, turns on SOL/IDE-R, if desired, verifies that the power policies
are set for sleep state operation as desired, enters the PPS/ PID pair, and exits
the MEBx screen. The BIOS will then continue to load.
• Manual setup for static IP networks: This sequence is the same as for dynamic
IP networks until the step where the PPS/PID pair is entered. At that point, the
IT administrator assigns a name to the PC's operating system for identification
purposes and selects the TCP/IP option. The IT administrator then disables
DHCP and then sets TCP/IP and DNS settings appropriately for the static IP
network. The IT administrator then enters the PPS/PID pair, exits the MEBx,
and allows the system to complete booting.
• Final automated configuration for all setup methods: The PC is connected to
power, and the Intel AMT device automatically initiates the configuration
process over the network by locating the configuration server and establishing
secure communications via the PPS/PID. The configuration server loads the
settings and data required for the environment and reboots the PC.
For more information:
• Intel AMT Use Case #10: One-Touch Configuration
11
Intel® vPro™ Technology Reference Guide
from a server on its network before allowing configuration to occur. Once all of
the proper checks have occurred, the configuration server loads the settings
and data required to enable Intel AMT to reboot the system.
• Bare Metal configuration: The process for bare metal configuration is the same
as for delayed configuration, except that a third-party software agent is not
needed, and the configuration server can configure Intel AMT 5.0 and earlier
without the onetime password. Once the Intel AMT PC is configured, an
operating system can be loaded from the network onto the PC, allowing for a
completely no-touch configuration of the system with an IT-specified operating
system.
With the release of Intel AMT 7.0 and Intel Setup and Configuration Service 7.0, users
can now use Host Based Configuration for all versions of Intel AMT firmware. The
Unified Configuration Process can be used to detect the firmware version and use
Remote Configuration with Intel AMT 6.0 and earlier systems.
For more information:
• Intel AMT Use Case #11: Remote Configuration
• See also: Host Based Configuration
12
Intel® vPro™ Technology Reference Guide
Once a secured TLS tunnel is established between Intel AMT client and Intel vPro
Enabled Gateway, multiple management consoles can then communicate with the
same device and all of the traffic is piped through the same secured tunnel. The Intel
vPro Enabled Gateway is responsible for connecting and disconnecting sessions as
management consoles initiate and complete their actions. The Intel AMT client can
also drop the secure connection after a defined period of inactivity.
With the 2nd generation Intel Core i5 vPro and Intel Core i7 vPro processors, Fast Call
for Help can be used with Intel AMT clients on wireless networks outside the corporate
firewall.
For more information:
• Fast Call for Help Overview
13
Intel® vPro™ Technology Reference Guide
How It Works
Intel AT includes two programmable, interdependent hardware-based timers to help
identify unauthorized access to the system: a disable timer and an unlock timer.
Using these programmable timers, Intel AT can detect potential loss or theft
situations, shift into “theft mode,” and then respond according to configured IT policy.
Local, hardware-based detection and trigger mechanisms include:
• Excessive login attempts—the system is disabled after an IT-determined
number of login failures in the pre-operating system screen.
• Timeframe login requirement—the system is disabled if the software agent does
not log in to central server by a specific time/date.
• Notification from the central server—If IT flags the notebook in the central
server database, the next time that notebook’s software agent logs into the
network, the notebook synchronizes with the central server and, after receiving
the server’s notification, performs IT defined policy based actions.
Poison Pill Responses
14
Intel® vPro™ Technology Reference Guide
There are several poison-pill responses to theft mode. The responses are flexible, and
can be programmed to do the following:
• Disable access to data, by deleting components of software-based encryption
keys or other cryptographic credentials required to access encrypted data on
the hard drive.
• Disable the PC by blocking the boot process, even if the hard drive is replaced
or reformatted.
• Disable both the PC and access to the Intel AT data storage area.
• After the PC is disabled, the PC displays a user-configured message to help
whoever finds the lost PC return it to the owner.
Excessive Login Attempts Can Trigger Poison Pill for PC Disable
Disabling a PC after excessive login attempts can be an effective way to prevent loss
of encrypted data. For example, an engineer’s notebook and wallet might be stolen in
an airport. The thief might try to log in using information from the engineer’s wallet,
but—based on IT policy—after three login attempts, the Intel Anti-Theft trigger is
tripped, and the system locks down.
If an encryption software vendor has provided this feature, encryption keys for
encrypted data (or software components that are needed to access these keys) can be
erased from the hard drive and thereby disabling the PC. In this case, even if the thief
removes the hard drive and installs it in another device, the security credentials that
provide access to encrypted data on the hard drive have been erased or disabled and
the data cannot be stolen. Until reactivated by the authorized user or IT, the PC will
not boot and the encrypted data cannot be accessed.
Server Login Timeout Can Trigger Poison Pill for PC Disable
In another example, a research scientist’s notebook might contain highly sensitive
data about a new invention. In this case, IT has defined the triggers on the scientist’s
notebook to require the notebook to log in daily. During a family event, the scientist
takes time off and does not log in for two days. Based on locally stored policy for the
login timeframe, the notebook enters “theft mode,” disables itself (and erases the
encryption keys for encrypted data on the hard drive, if an encryption software vendor
has provided this feature). Even if the notebook is removed from the lab while the
user is away, the notebook has secured itself until the scientist returns and reactivates
the system.
Reactivation
To recover when a notebook is being returned to service, Intel AT also includes two
reactivation mechanisms:
• Local passphrase, which is a strong password pre-provisioned in the notebook
by the user. To reactivate the system, the user simply enters this passphrase in
a special BIOS login screen.
• Recovery token, which is generated by IT or by the user’s service provider via
the theft management console, upon request by the user. For reactivation, a
one-time recovery token is provided to the user via phone or other means, and
the user enters the token in a special BIOS login screen.
15
Intel® vPro™ Technology Reference Guide
Both passphrase and recovery token return the PC to full functionality. Both methods
offer a simple way to recover the notebook without compromising sensitive data or the
system’s security features.
Reactivation is integrated with existing software vendor pre-boot login process (for
example: Absolute* software or WinMagic* SecureDoc) for simpler reactivation.
For PCs with whole disk encryption, the data disable feature renders the data
inaccessible if the PC is stolen by removing access to the decryption keys. The data
can be easily recovered remotely, or locally, using a pass-phrase or token. This
feature requires support by the whole disk encryption software application and the
remote management console software (for example: WinMagic* SecureDoc).
Wireless 3G support
Intel AT 3.0 now has support for 3G cell phone networks (with the appropriate modem
installed in the PC). Wireless 3G SMS messages can be used to check-in, send a
poison pill to the PC, or to send a recovery token to the PC.
To test the client readiness for Intel AT, use the following tool:
• Intel Anti-Theft Technology—Data Protection Test and Control Console (link).
For more information on Intel AT, see:
• WinMagic* website** (**This URL to a third-party website is provided for the
reader’s convenience. Inclusion of this link should not be construed as a
recommendation by Intel. Intel is not responsible for the content of third-party
websites.)
• Intel Anti-Theft Technology is here!
• Computrace with Intel Anti-Theft Technology Whitepaper
• Success Story: Securing Success for Polycom, Inc.
• Webinars: Learn More About Intel vPro Technology
• Virtual Conference Series: Securing Your Environment with Intel Anti-Theft
Technology
• Protecting Sensitive Data on Laptops is More Important Now than Ever, Intel
Anti-Theft Technology version 3.0
16
Intel® vPro™ Technology Reference Guide
• When the log is about 75% full, events marked “Enabled” are no longer logged.
However, the action that triggers the event still succeeds.
• When the log is 100% full, events marked critical are no longer logged and are
blocked from operation. For example, if SOL is being logged as critical and the
log is full, AMT returns “PT_STATUS_AUDIT_FAIL” the next time SOL is
attempted. This will continue until the Auditor clears the log.
For more information:
• Intel Active Management Technology Access Monitor, available in the Intel AMT
SDK (see: page 32)
17
Intel® vPro™ Technology Reference Guide
This feature requires a third-party software application to schedule a task after the PC
wakes up.
Potential applications of this feature include:
• Scheduling resource intensive applications to run during off-peak hours. For
example, the IT department might schedule a full virus scan or a disk
defragmentation on the remote PC.
• Executing periodic backups.
• Ensuring that PCs pull and apply scheduled updates.
• Turning on PCs in anticipation of the start of work or the scheduled opening of
the business.
NOTE
KVM Remote Control requires an Intel processor with Intel processor graphics.
This feature is not available on some previous generations of Intel vPro
processors. For a list of processors that support the KVM Remote Control
feature, click here.
KVM Remote Control only operates with Intel processor graphics. However, a platform
may also have an external (discrete) graphics system that allows users to switch back
and forth between the graphics interfaces.
Intel AMT 6.0 adds KVM Remote Control to the existing redirection features of Serial
Over LAN (SOL) and Redirected IDE (IDE-R). With KVM Remote Control, a Remote
Console can open a session with an Intel AMT platform and control the platform using
a mouse and keyboard and display at the console what is displayed on the local
monitor. The KVM Remote Control capability is enabled in the same way that SOL/IDE-
R is enabled—with network administration commands. KVM Remote Control first must
be enabled in the Intel Management Engine BIOS Extension (MEBx) and the listener
enabled (as with SOL/IDE-R) before it can be enabled remotely.
18
Intel® vPro™ Technology Reference Guide
KVM Remote Control is based on the RealVNC Limited* Remote Frame Buffer (RFB)
protocol. Off-the-shelf viewers based on the RFB protocol should work in conjunction
with Intel AMT without modification.
Protecting User Privacy
When User Opt-in is enabled in the MEBx, the firmware generates a “sprite” (a pop-up
graphic displayed to the PC user directly, even if the graphics driver is disabled) with a
one-time password (OTP) that the KVM Remote Control client must send to complete
establishment of a session. The PC user has to tell the IT operator what the password
is, for example, by telephone or text message. Note that any sprites displayed to the
local operator are not echoed to the KVM Remote Control client (this is configurable).
If there is no connection activity for a configurable pre-defined period (defined as no
keyboard or mouse activity), the server at the PC will drop the connection.
If there are three consecutive failed login attempts, Intel AMT will delay subsequent
attempts and log the occurrence.
Enabling KVM Remote Control
The KVM capability is enabled in the same way that SOL/IDE-R is enabled--with
network administration commands using WS-Management calls. In most cases,
administrators will use a management console with built-in KVM Remote Control
viewer that sends the appropriate WS-Management calls.
For more information:
• For manual configuration of the KVM Remote Control for use with an off-the-
shelf viewer, refer to the following site for instructions and sample configuration
scripts: Use Case Reference Designs for Intel vPro Technology
• Intel AMT SDK (see page 35)
• For detailed instruction on how to configure KVM Remote Control for secure
communications, refer to the KVM Application Developer’s Guide in the Intel
AMT 6.0 SDK (see page 35).
19
Intel® vPro™ Technology Reference Guide
20
Intel® vPro™ Technology Reference Guide
User Consent For Intel AMT 7.x devices User consent is always
in Admin Control mode, required for setup and
you can define which configuration, KVM Remote
operations require user Control, IDE Redirection,
consent. The choices are: Serial Over LAN, and boot
Not Required; KVM Remote control
Control Only; Required for
All. For Intel AMT 6.x
devices, you can choose to
enable user consent only
for KVM Remote Control.
The following steps outline how the IT administrator can use Host Based Configuration
to setup and configure Intel AMT clients:
1. Install the Intel SCS 7.0 package.
2. From Intel SCS, create an XML file that contains the Intel AMT settings (as in
previous versions of Intel SCS, this collection of settings is referred to as the
profile).
3. Distribute the XML file and the required Intel SCS utility to the Intel AMT client.
Run the package.
4. If the IT administrator has selected Client Control Mode, the user on the Intel
AMT 7.0 client machine will be prompted to consent to running the utility and
configuring the client. For clients with prior versions of Intel AMT, the Intel SCS
utility will contact the Intel SCS 7 provisioning server and use the existing
remote configuration methods.
For more information, refer to the documentation provided with the Intel SCS
package. For more information about Host Based Configuration support in third party
management software packages, refer to the ISV documentation.
21
Intel® vPro™ Technology Reference Guide
when the user is logging on to a web application or VPN. Instead of a separate token
or key fob, the Intel Identity Protection Technology uses the Intel Management Engine
to securely generate the six digit code that is used as the one time password.
Intel Identity Protection Technology (Intel IPT) is available on 2nd generation Intel Core
vPro Processor-based systems with Intel AMT 7.1 or later and the Intel IPT software
stack (provided by the PC manufacturer). Intel IPT works with any website that has
been enabled for Intel IPT by a third-party software vendor.
For more information:
Intel IPT website (http://ipt.intel.com)
22
Intel® vPro™ Technology Reference Guide
WS-MAN Compliance
The new Intel AMT 6.0 release is compliant with the WS-MAN standard. Intel Intel AMT
can be managed using the WS-Management protocol. Starting with Release 3.0, all
Intel AMT features have been supported with WS-Management.
For more information, see the following:
• Intel Active Management Technology Comparison of WS-Management
Capabilities Across Releases (Releases 3.0, 3.2, 4.0, 5.0, and 5.1), provided in
the Intel AMT SDK (see page 35)
• Intel Active Management Technology WS-Management Flows, provided in the
Intel AMT SDK (see page 35)
DASH Compliance
The Intel AMT 7.0 release supports compliance with the DASH 1.1 standard.
(Compliance with the DASH standard is performed at the system level by the OEM.)
As the DASH specification has evolved, Intel AMT has moved toward additional support
for the emerging standards. Prior to the release of Intel AMT 7.0, Intel AMT 6.0 was
23
Intel® vPro™ Technology Reference Guide
DASH 1.0 compliant and Intel AMT 5.1 was released coincident with the establishment
of the DASH 1.0 specification as a standard.
IPv6 Support
IPv6 is the next generation of the Internet Protocol (IP). For background information
on IPv6 and links to the underlying specifications, see More Information at the end of
this section.
IPv6 support exists with Intel AMT as of version 6.0. (While Intel AMT supports IPv6,
there is still very limited Intel AMT software support for IPv6.)
Requirements:
• IPv6 enabled infrastructure
• Routers and switches
• DHCP
• DNS
When deploying Intel AMT into an IPv6 environment, the network infrastructure setup
requires careful consideration. IPv6-enabled systems will have multiple IP addresses.
Since the IP address of Intel Management Engine (ME) will differ from the IP address
of the host operating system, therefore care needs to be taken when working with
DNS. For example, if the IT administrator were to try to connect to a fully-qualified
domain name (FQDN) to resolves to the host IP address then there will be no Intel
AMT functionality for that FQDN. Similarly there could be DNS resolution issues if the
host operating system is using IPv6 and Intel AMT is using IPv4 depending on how the
IT console resolves an FQDN (whether it returns to IPv6 or IPv4 address).
For more information:
• ipv6 home page*
*This URL to an independent third-party website is provided for the convenience of the
reader. The link should not be construed as an endorsement or recommendation by
Intel.
AES-NI Support
All 2nd generation Intel Core i5 and i7 vPro Processors include hardware support for the
Advanced Encryption Standard—New Instructions (AES-NI). AES-NI is a group of
processor instructions used to accelerate encryption and decryption using the AES
standard. These six new instructions are included in selected Intel Core i5 and i7 vPro
processors. (Contact your Intel sales representative for more information on
supported processors.)
What is AES?
AES is an encryption standard adopted by the U.S. government and around the world.
It is used in disk encryption, TLS web transactions, Voice over IP, and other
applications.
For more information:
24
Intel® vPro™ Technology Reference Guide
25
Intel® vPro™ Technology Reference Guide
Intel AMT can be incorporated into a NAP environment. This provides two main
benefits:
• When the operating system is unavailable (non H0 or S0 states), Intel AMT can
authenticate to NAP, thereby gaining access to the network and enabling down
the wire OOB access.
• Intel AMT posture can be sent in H0/S0 states as part of authentication,
ensuring that only properly provisioned Intel AMT systems are granted access.
For more information:
• Intel Active Management Technology System Health Validator Sample, provided
in the Intel AMT SDK (see page 31)
26
Intel® vPro™ Technology Reference Guide
Software Tools
Intel vPro technology is supported by a wide variety of tools for the IT professional,
software developer, evaluators, and validation engineer. This section lists the tools
that are available from Intel Corporation and third-party software vendors that support
Intel vPro Technology.
27
Intel® vPro™ Technology Reference Guide
28
Intel® vPro™ Technology Reference Guide
29
Intel® vPro™ Technology Reference Guide
Intel® IT Director
This is an intuitive, easy-to-use dashboard that delivers Intel vPro technology-based
benefits to your small business customers. This tool can help your small business
customers manage their network PCs, strengthen security and data protection, and
know when to place a call for help before the problem becomes critical.
For more information, or to download the free tool:
• Tools and Utilities for Intel vPro Technology
• Intel IT Director
30
Intel® vPro™ Technology Reference Guide
31
Intel® vPro™ Technology Reference Guide
32
Intel® vPro™ Technology Reference Guide
33
Intel® vPro™ Technology Reference Guide
34
Intel® vPro™ Technology Reference Guide
35
Intel® vPro™ Technology Reference Guide
36
Intel® vPro™ Technology Reference Guide
NOTES
The information displayed in the Intel Management and Security Status is not shown in
real time. The data is refreshed at different intervals.
NOTE
Products, solutions, or services may not be available in all geographical regions.
Consult the vendor for details.
• 30Wish* (China region)
• Absolute* Software
• Agree* (China region)
• Airties Wireless Communications*
37
Intel® vPro™ Technology Reference Guide
• Anlou*
• Artin Dynamics* (India region)
• Avocent* (Taiwan region)
• Big Fix* (an IBM company)
• Bit Defender*
• BMC*
• Brainware* (Japan, EMEA region—Europe, Middle East, Africa)
• CA*
• Citrix*
• Computer Associates*
• Comvigo* (US region)
• Check Point*
• Citrix*
• Credant*
• CORE* (Japan region)
• Crypto++*
• Dell Computers*
• Doctor Soft* (Korea region)
• DragonFlow Networks* (China region)
• Farstone* (China region)
• FAMATECH*
• Forquest* (Taiwan region)
• Fractilia* (EMEA region--Europe, Middle East, Africa)
• Fujitsu* (Japan region)
• GeneralSoft* (China region)
• Green Hills*
• HCL* (India and SE Asia region)
• Hewlett-Packard*
• Hitachi* (Japan region)
• Hitachi Business* (Japan region)
• HSBSoft Technologies* (India region)
• Intel (SCS and development tools)
• JAL Infotec* (Japan region)
• Kapersky* (Europe region)
• Kaseya*
• KingStar Winning (China region)
• LANDesk*
38
Intel® vPro™ Technology Reference Guide
• Lenovo*
• Level Platforms*
• LightStar* (Taiwan region)
• LogMeIn*
• Manage Operations* (US region)
• Maxigent* (Korea region)
• McAfee* (now a subsidiary of Intel Corp.)
• MediaLand* (Korea region)
• Microsoft*
• Motex* (Japan region)
• MTM Software* (US region)
• N-able* Technologies
• N-Central*
• NEC Fielding* (Japan region)
• NetSupport*
• NSS*
• OneBe* (Japan region)
• Parallels*
• PGP* (now Symantec PGP)
• Phoenix Technologies*
• Quality* (Japan region)
• Rsupport* (Korea region)
• Samsung Elec* (Korea region)
• Samsung SDS (Korea region)
• Secuware* (EMEA region—Europe, Middle East, Africa)
• SOE Software (Australia region)
• SoftLumos* (China region)
• SoftTex*
• SpiceWorks*
• StarSoftComm* (China region)
• SyAM* (North America, Europe)
• Symantec*
• Syscom* (Taiwan region)
• Tectona Softsolutions* (India region)
• Tidaldata Solutions* PVT Ltd.
• Triactive (Europe region)
• TruCrypt*
39
Intel® vPro™ Technology Reference Guide
40
Intel® vPro™ Technology Reference Guide
41
Intel® vPro™ Technology Reference Guide
Boot Control X X X X X
Power State X X X X X
Management
Hardware Inventory X X X X X
Software Inventory X X X X X
Hardware Alerting X X X X X
Agent Presence X X X X X
IDE Redirection X X X X X
Remote X X X X X
Configuration
System Defense X X X X X
Filters
Access Monitor X X X X
Wireless X X X
Management in Sleep
States
Microsoft* NAP X X X X
42
Intel® vPro™ Technology Reference Guide
Remote Scheduled X X X X
Maintenance, Remote
Alerts
PC Alarm Clock X X
Intel SCS X X X X X
Intel Management X X X X X
Security and Status
Icon
Intel TXT X X X X X
Intel VT X X X X X
Intel TPM X X
WS-MAN X X X X X
Host Based X
Configuration
Automatic X
Synchronization of
Intel ME and host OS
static IP addresses
Intel ME firmware X
roll-back
43
Intel® vPro™ Technology Reference Guide
1. DASH compliance measured at the OEM system level. OEM platforms based on
Intel vPro Technology, Intel Core vPro processors and Intel Standard Manageability
with AMT 6.2 or later firmware are capable of DASH 1.0 compliance. As with 1.0,
Intel AMT has been developed to conform with the DASH 1.1 specification.
Ultimately, compliance for any platform will be verified once the DMTF launches the
DASH 1.1 Compliance Test Suite.
2. This feature is deprecated in Intel AMT 7.0 and may not be present in future
versions.
3. Cisco* posture support for SDN (NAC) is not supported in v3.1 and later.
4. Version 4.1 and later
5. WiFi is supported but not required on desktop systems. Supported with Intel
Centrino Ultimate-N/Advanced-N 6000 Series network adapters.
6. Version 7.1 and later
7. Mobile PCs only; Intel AT PC protection only
8. Mobile PCs only; Intel AT PC and data protection
44
Intel® vPro™ Technology Reference Guide
Glossary
For the latest version of this glossary, see: Intel vPro Glossary.
45
Intel® vPro™ Technology Reference Guide
46
Intel® vPro™ Technology Reference Guide
47
Intel® vPro™ Technology Reference Guide
48
Intel® vPro™ Technology Reference Guide
Index
802.1x networks, end point access hardware inventory, 5
control, 10 Host Based Configuration, 20
Access Monitor, 16 IMRGUI.exe, 35
Activator tool on LiveCD, 29 IMSS. See Intel Management and
Activator Wizard tool, 28 Security Status Tool
Advanced Encryption Standard—New Intel AMT Embedded Tools Suite, 36
Instructions. See AES-NI Intel AMT Firmware Integration
AES-NI support, 24 Wizard (for embedded
agent presence use case, 8 applications), 36
Alert Standard Format (ASF), 23 Intel AMT Management Express
AMTRedirection.exe, 35 Console, 36
APITestRemote.bat, 35 Intel AMT Reflector, 29
assets, hardware platform auditing, Intel AMT Scan utility, 27
4 Intel AMT SCSDiag Utility, 28
Auditor role, for access monitor log, Intel AMT Software Development
16 Toolkit, 35
certificates, Intel Remote Intel AMT Unprovision Utility, 29
Configuration Certificate Utility for, Intel AMT USB Key Provisioning
27 Utility, 28
Cisco Trusted Agent (CTA), support Intel Anti-Theft Status Utility, 27
for, 25 Intel Anti-Theft Technology, 13
Cisco* SDN (Network Admission Intel Client Manageability Add-on for
Control), 25 Microsoft* SMS 2003, 28
DASH standard, compliance to, 23 Intel IT Director, 30
diagnosis and repair, remote, 5 Intel Manageability Developer’s
diagnosis, remote with local repair, 6 Toolkit (DTK), 32
Discovery.exe, 35 Intel Management and Security
disk encryption management use Status Tool, 36
case, 19 Intel Power Manager (plug-in), 36
Distributed Manageability Task Force Intel processor graphics, use with
(DMTF), compliance with, 23 KVM remote control, 18
DTK, Intel Manageability Developer’s Intel Remote Configuration
Toolkit, 32 Certificate Utility, 27
Embedded Tools Suite, Intel AMT, 36 Intel Remote Configuration Scout, 27
encryption management, use case Intel Remote Encryption
for remote, 19 Management Software
end point access control (EAC), 9 Development Kit (SDK), 31
Fast Call for Help, 12 Intel Remote Power Control Utility,
Firmware Status Debugger, 36 29
full disk encryption, AES-NI support Intel SCS
for, 25 Intel AMT SCSDiag Utility, 28
49
Intel® vPro™ Technology Reference Guide
50
Intel® vPro™ Technology Reference Guide
51
Intel® vPro™ Technology Reference Guide
52