Intel® Active Management Technology SDK

Query, restore, upgrade, and protect devices remotely

  • Out-of-band system access
  • Remote troubleshooting and recovery
  • Hardware-based agent presence checking

Use Case Summary

Intel® Active Management Technology (Intel® AMT) can be utilized by several types of management and security applications such as security and other management agents, firewalls, and hardware and software inventory tracking to help IT improve asset management, reduce downtime, and minimize deskside visits.

Platform Auditing:
Reduce or eliminate manual inventory audits by locating systems regardless of power state or health. Improve asset management.

Software Inventory Management:
Improve the software inventory process and optimize maintenance contracts, licensing, and configuration inventory through firmware-resident software info.

Hardware Inventory Management:
Reduce manual audits and better manage hardware inventories, recalls, and warranties. Efficiently manage hardware inventories.

Remote Diagnosis, Remote Repair:
Remotely diagnose and repair client machines, reducing on-site visits to resolve software problems, even when the OS is down.

Remote Diagnosis, Local Repair:
Reduce visits to resolve hardware problems with improved remote diagnosis and hardware information.

Software Version Compliance:
Ensure up-to-date software versions, virus signatures, etc. Improve accuracy, speed and efficiency of antivirus software updates regardless of OS or power state.

Hardware-based Isolation and Recovery:
Detect and stop malware from propagating. Detect suspicious activity at a node, send alert to console, IT quarantines system and updates policy out of band. Monitor outbound traffic by comparing a timeslice of network traffic to enhanced filters in the system defense engine to obtain data on the time frame and number of occurrences of a particular network traffic event.

Presence Checking of User Partition Agents:
Virtually eliminate the ability of users or malware to circumvent protection. If the user disables agents, that action triggers alerts, quarantines the system, and re-initializes the agent.

Endpoint Access Control (EAC):
Limit network access by visitors, rogue systems, and systems that do not conform to company policies for virus protection, OS patches, etc. Force systems that do not meet corporate policy onto a remediation network.

One-Touch Configuration:
Perform automated setup and configuration of an Intel AMT device, either using credentials stored on a USB key storage device or by keying credential information manually into BIOS.

Remote Configuration:
Automatically set up and configure an Intel AMT device upon connection to the network, either using a third-party management software agent resident on the client OS or from a 'bare-metal' state, without requiring a host OS.

Fast Call for Help:
Allow Intel AMT platforms to initiate a secured connection to Intel® vPro™ technology-enabled gateway residing in the enterprise De-Militarized Zone (DMZ). Using Fast Call for Help, Intel AMT clients can be managed remotely by the IT Administrator when the system is located outside the corporate network.


Intel AMT Alarm Clock

Intel AMT and Java*

Intel AMT SOL Device IDs

Wireless Networking in Intel AMT

Intel AMT Support for InstantGo

Intel AMT Heuristics

WS-Management Translator for Intel AMT

Audit Log/Access Monitor in Intel AMT

Security and Privacy with Intel AMT

Remote Screen Blanking with Intel AMT 10

Remote Configuration for Intel AMT

Intel AMT WS-Management Flows

What's new with Intel AMT 10 SDK

Intel AMT and the Intel® Management Engine - Intel AMT Remote Commands

Who should be writing the software to enable Intel AMT

Intel AMT Remote Wake Methods from Companion Devices