Intel® Developer Zone:
Business Client

UNS "Failed to subscribe to local Intel AMT" Error Messages and how to fix them (Intel AMT SW, 7th part)
By Shmuel Gershon (Intel)Posted 04/13/20095
This post continues the previous installment in the Intel AMT software series. You may be interested in reading what is the UNS and how it works before proceeding. We learned about the inner flow of the User Notification Service and his use of SOAP protocol and HTTP... Being HTTP based has big ad...
Community Building Pays Off
By Lance Atencio (Intel)Posted 04/01/20094
  Take a look at our new featured community member on the Manageability Community main page. Javier has been an avid user of the forum for a long time, not only asking great questions but posting answers as well. He is also becoming a regular blog author with contributions that are very informati...
AMT Audit Log ... Let it Roll
By Lance Atencio (Intel)Posted 03/24/20090
When the Access Monitor (a.k.a. Audit Log) feature was added to AMT back in release 4.0 (see original blog here) there was concern expressed about the behaviour when the log became full. To ensure the Auditor had a chance to see all the events flagged as "critical", these events would not be allo...
HEY AMT!!! Time to wake up
By Lance Atencio (Intel)Posted 03/20/200915
  Have you ever been working and had a patch come down from your IT department that you had to install now. Or how about a virus scan that brought your machine to a crawl in the middle of your work. If so, then you may want AMT Alarm Clock, a new feature in the recently released 5.1 version of In...


Subscribe to Intel Developer Zone Blogs
Management Software: Concepts for Managing a Mobile Workforce
By Evan Merrill (Intel)Posted 10/11/20100
by Lynn Merrill Introduction The world of Management Software serves an important role for those administrators responsible for the assets and security of information within an enterprise. This genre of software provides tools installed at a central location that enables the administrator to ma...
Diagnostic 15042: pragma supersedes previous setting
By adminPosted 10/01/20100
Cause:This diagnostics message comes when the parameters of the pragma contradicts each other. In this case the #pragma loop count has two clauses, avg() and max(). But max() parameter is lesser than the avg() clause value. Below is an example for this scenario. Examples: void foo(float *A, int n...
Testing the Intel AMT platform features.
By javierandrescaceresPosted 04/29/20100
There are many resources about how to develop applications to work with the Intel AMT platform, but there is no such as availability when it’s about executing a testing process; this article defines some test cases based on the test scenarios described in
Improving the Performance of the Secure Hash Algorithm (SHA-1)
By Max Locktyukhin (Intel)Posted 03/31/201022
Fast Secure Hash Algorithm (SHA-1) implementation for Intel Architecture.


Subscribe to

Intel Business Client Platforms
Whether you’re developing for unmanaged small business, or enterprise-level IT departments, 3rd Generation Intel® Core™ processor-based PC and mobile platforms are designed to help you meet the needs of your customers.

Intel® vPro™ Technology
Maximize data security applications and optimize IT productivity solutions with unique hardware-assisted security and manageability features.

Intel® Small Business Advantage
Preloaded software on all Intel® Small Business Advantage platforms includes built-in PC protection and support to take care of managing the firmware, and make enabling your software quick and easy.


Intel® vPro™ Technology

Intel® Small Business Advantage

Manageability (Use Cases)
Remote management features make it easy to keep PCs running smoothly and more cost effectively.



State-of-the-art technology makes security, data backup, updates, and routine maintenance fully automatic.


Hardware-assisted security features allow quick deployment of patches, and remote unlocking of encrypted drives, even when the PC is off.

The visibly smart 3rd generation Intel® Core™ vPro™ processor family means improved security, manageability, and cost-effectiveness.

Built-in security and virtualization capabilities provide a flexible foundation for computer models of today and tomorrow.


Technology Capabilities

Develop Software unlocking the detect, repair and protect capabilities of Intel® vPro™ Technology. Gain access to the tools, technical information and industry expert support to help you develop software for Intel's premier business platform.

  • Intel vPro platforms are loaded with features and technologies to deliver best in class security protection. Whether it's applying advanced encryption or remotely disabling a stolen/lost PC, systems equipped with Intel vPro technology are designed to keep your data safe. Explore the many options below to see which features/technologies might fit best into your products.

    Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)

    AES (Advanced Encryption Standard), an encryption standard adopted by the U.S. government is widely used across the software ecosystem to protect network traffic, personal data, and corporate IT infrastructure. AES-NI were designed to implement some of the complex and performance intensive steps of the AES algorithm using hardware and thus accelerating the execution of the AES algorithms.

    Learn More ›

    Intel® TXT

    Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS, virtual machine monitor, and operating system.

    Learn More ›


    User Manual for the Rdrand Library (Linux Version)

    User Manual for the Rdrand Library (Windows Version)

    Intel® Secure Key is Intel's name for its new Intel® 64 Architecture instruction RdRand and its underlying Digital Random Number Generator (DRNG) hardware implementation (old code name, Bull Mountain). Intel® Secure Key provides a processor-based RNG solution that is of high quality and performance, highly available, and secure.

    Learn More ›

    Intel® Anti-Theft (Intel® AT)

    Laptops with the 2nd generation Intel® Core™ and 2nd generation Intel® Core™ vPro™ processor families with Intel® Anti-Theft Technology (Intel® AT) provide intelligent protection of lost or stolen assets. Intel AT provides the ability to disable a PC with a local or remote "poison pill" if the system is lost or stolen. This poison pill can delete essential cryptographic material from system hardware in order to disable access to encrypted data stored on the hard drive.

    Intel® IPT

    Intel® Identity Protection Technology (Intel® IPT). Intel has built two-factor authentication directly into the processors of select 2nd generation Intel® Core™ processor-based PCs, helping to prevent unauthorized access to important personal accounts. Intel IPT allows vendors to store their OTP algorithms inside the processor itself, in a secure chipset called the Manageability Engine (ME). Intel's hardware solution eliminates the complexity and unstable nature of OTP software solutions, as well as the user-dependent problems of tokens.

    Download Intel® IPT Installer

    If you have a strong authentication solution or component to your application, take the next step in incorporating Intel® IPT by contacting us at

  • At the heart of the many features and capabilities of Intel vPro systems are the latest Intel® Core™ vPro™ processors. These processors provide outstanding performance while still delivering power efficiency. Review the features below and visit the Parallel Programming Community for additional threading support.


    Intel® Hyper-Threading Technology (Intel® HT Technology)1 uses processor resources more efficiently, enabling multiple threads to run on each core. Intel® HT Technology increases processor throughput, improving overall performance on threaded software. Intel HT Technology is available on Previous Generation Intel® Core™ processors, 2nd generation Intel® Core™ processor family, and Intel® Xeon® processor family.

    An Intel® processor and chipset combined with an OS and BIOS supporting Intel HT Technology allows you to:

    • Run demanding applications simultaneously while maintaining system responsiveness
    • Keep systems more secure, efficient, and manageable while minimizing impact on productivity
    • Provide headroom for future business growth and new solution capabilities

    Introduction to Hyper-threading ›

    1 Available on select Intel® Core™ processors. Requires an Intel® Hyper-Threading Technology (Intel® HT Technology) enabled system. Consult your PC manufacturer. Performance will vary depending on the specific hardware and software used. For more information including details on which processors support HT Technology, visit


    Intel has optimized Intel® Turbo Boost Technology2 to provide even more performance when needed on 2nd Generation Intel® Core™ processor based systems. Intel® Turbo Boost Technology 2.0 automatically allows processor cores to run faster than the base operating frequency if it's operating below power, current, and temperature specification limits. Intel Turbo Boost Technology 2.0 is activated when the Operating System (OS) requests the highest processor performance state (P0).

    The maximum frequency of Intel Turbo Boost Technology 2.0 is dependent on the number of active cores. The amount of time the processor spends in the Intel Turbo Boost Technology 2.0 state depends on the workload and operating environment.

    Any of the following can set the upper limit of Intel Turbo Boost Technology 2.0 on a given workload:

    • Number of active cores
    • Estimated current consumption
    • Estimated power consumption
    • Processor temperature

    When the processor is operating below these limits and the user's workload demands additional performance, the processor frequency will dynamically increase until the upper limit of frequency is reached. Intel Turbo Boost Technology 2.0 has multiple algorithms operating in parallel to manage current, power, and temperature to maximize performance and energy efficiency. Note: Intel Turbo Boost Technology 2.0 allows the processor to operate at a power level that is higher than its rated upper power limit (TDP) for short durations to maximize performance.

    2 Intel® Turbo Boost technology requires a PC with a processor with Intel Turbo Boost capability. Intel Turbo Boost performance varies depending on hardware, software and overall system configuration. Check with your PC manufacturer on whether your system delivers Intel Turbo Boost technology. See for more information.

Whether you’re developing 3rd Generation Intel® Core™ processor-based applications for networked systems, or creating tools for smaller businesses, this is the place for all your technical content needs.

Need advice or help? Tap into a world of expertise through our forum.

No Content Found
Subscribe to

A Developer's Introduction to Business Client Technology

The following table will help you understand which technologies are present in which 3rd Generation Intel® Core™ processors, so you can more effectively help your customers manage and streamline their business needs.

Advanced Technologies 

Intel® Core™ i3

Intel® Core™ i5 

Intel® Core™ i7





Intel® SBA Software




Intel® AES-NI




Intel® Secure Key




Intel® Anti-Theft




Intel® VT 

Yes (Vt-x)

Yes (Vt-x & Vt-d)

Yes (Vt-x & Vt-d)

Intel® TXT




1 Certain SKUs may vary. Please check your specific systems at

For the "Un-managed" Small Business

Intel® Small Business Advantage (SBA)
Bring streamlined maintenance and security solutions to your small business customers using


Intel® AMT Software Development Kit
The building blocks and documentation needed to develop for Intel® AMT systems
Download ›

Intel® Setup and Configuration Software (Intel® SCS)
This package provides the newest tools to set up and configure Intel® AMT Devices.
Download ›

Open Manageability Developer Toolkit
Open source tools for management for computer that supports Intel® Active Management Technology (Intel® AMT). 
Download ›

Intel® vPro Platform Solution Manager
Allows you to launch plug-in applications to remotely manage your Intel vPro Technology based PC clients. 
Download ›


Intel® AES New Instructions (Intel® AES-NI)
Intel® AES-NI is a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in the Intel® Xeon® processor family and the 3rd Generation Intel® Core™ processor family.
Download ›

Intel® Secure Key
Intel Secure Key is the name for the Intel 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation.

  • Implementation Guide
  • Code Examples
  • Case Studies

Download ›

Intel® Trusted Execution Technology

Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects IT infrastructures against software-based attacks by validating the behavior of key components within a server or PC at startup.
Learn more ›

  • Static Security Analysis (SSA)
  • Static Security Analysis (SSA) examines source code to find errors and security weaknesses, allowing you to eliminate defects early in the development cycle and proactively harden your application against security breaches.
Download ›

Intel® Virtualization
Intel® Virtualization models can help enhances security and manageability for your Business Client Customers.
Learn more ›

Find all the latest documentation to help with your development projects. Technical guides, case studies, code samples, videos and thought-provoking blog posts–you'll find it all here.


Welcome to Intel® Active Management Technology (AMT)
To learn more about Intel AMT and to download the latest Software Development Kit (SDK), visit:
Intel AMT Start Here Guide 
Intel AMT SDK Download 
Intel AMT SDK Documentation

Intel® vPro™ Technology Resource Kit
The Intel® vPro™ Technology Resource Kit is a downloader tool that is a compilation of tools, utilities, and supporting documentation to simply educate you and easily walk you through the implementation of Intel vPro technology.
Learn more ›

Intel® AMT: Known Issues and Best Practices
The Known Issues, Best Practices, and Workarounds, may be very useful to many of our vPro Developers.
Learn more ›


Advanced Security Features of Intel® vPro™ Technology
Intel® vPro™ technology creates a powerful platform in which security and manageability go hand in hand. Since manageability is a crucial aspect of an enterprise’s network.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Introduction AES (Advanced Encryption Standard) is an encryption standard adopted by the U.S. government starting in 2001. It is widely used across the software ecosystem to protect network traffic.
Learn more ›

Intel® AES New Instructions (Intel® AES-NI)
Overview of Intel® AES-NI, a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data.
Learn more ›

Securing the Enterprise with Intel® AES-NI
Learn why cryptography is hot in the marketplace today, especially in the enterprise.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Description of the six new instructions that make up the AES-NI instruction set and perform several compute intensive parts of the AES algorithm.
Learn more ›

Intel® Anti-theft
Intel® Anti-Theft Technology (Intel® AT) helps keep your laptop safe and secure in the event that it’s ever lost or stolen.
Learn more ›

Intel® Trusted Execution Technology
Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS and virtual machine monitor.
Learn more ›

Intel® System Defense and Agent Presence Overview
System Defense and Agent Presence are security toolsets built into Intel® Active Management Technology (Intel® AMT). The System Defense and Agent Presence toolsets are targeted at closing two gaps in in the Intrusion Detection System (IDS) methods currently employed by IT:

  • The time window between the identification of an OS/Agent vulnerability and completed deployment of a corresponding patch.
  • The time between an end-user tampering with an IDS agent and detection of and acting on the tampering.

Learn more ›


Virtualization HW technical brief
Intel® Virtualization Technology (Intel® VT) provides comprehensive hardware assists that boost virtualization software performance, improve application response times and provide greater reliability, security and flexibility.
Learn more ›

Virtualization: A Developer's Friend
The more developers use virtualization, the more they find new uses for it. Dis¬cover what you’re missing and how virtualization can help you get more done.
Learn more ›

Intel® Virtualization Technology: Flash* Animation
This animation provides an overview of Intel® Virtualization Technology.
Learn more ›

Intel® Virtualization Technology: Best Practices for Software Vendors
This series of articles functions as an aid to help software vendors tailor their applications for use with Intel VT.
Learn more ›

Business Client Developer Community

This is your community. We encourage you to participate in all ways that will help you, your fellow developers, and your customers. Whether it be asking and answering questions in our forums, reading writing or commenting on blogs, working toward becoming an Intel® Black Belt Software developer, your contribution is valued and valuable!

Build your Reputation

Intel® Black Belt Software Developers
Black belt status is awarded to software developers known for technical expertise, community leadership.
Learn more ›

Gael Hofemeier
Gael is an Application Engineer at Intel (since 2000) working primarily with Business Client Technologies.

Ylian Saint-Hilaire
A senior architect at Intel, Ylian Saint-Hilaire part of a path finding group and is currently researching new ways of using Intel platform technologies.

Javier Caceres
Javier is an Project & Product Manager working on Colombian industry since 2002. He has worked on many challenging projects like Windows Kernel Mode Drivers, Intel AMT SOL, and many, many more.


We missed you at the IDF 2012 in San Francisco

Are you an IT Manager?
Visit the Intel® vPro™ Expert Center
Become an Intel® Software Partner
As an Intel® Software Partner, software companies and individuals find resources to help them develop, optimize, and market commercially available applications running on Intel platforms and technologies.
Learn more ›
AMT and change the Supervisor Password in the BIOS
By Demétrius Paula1
One of my first tasks managability. I'm trying to figure out how to change the supervisor password in the BIOS settings periodically. Would be through a program. What are the best methods of doing this? Thanks!
Switching off Host display - KVM
By plmanikandan0
Hi, I'm able to use KVM in AMT 8.0. When I took KVM from remote, Local user is also able to see display. Is there any command/ways to switch off local display while using KVM from remote Thanks, Mani
vPro Alarm Clock working only on full hours
By Patryk M.4
Hello. I have trouble setting the Alarm Clock properly. I am using the C++ API ver. 8.1. The documentation says that in the start time I'm supposed to fill in year, month, day, hour, and minutes, and that seconds have to be 0. Yet, whenever I try to set the minutes to something other than 0, we get the "XML invalid" exception. Can this be circumvented, so that I'm able to set the alarm with better precision than hours? Thanks in advance and best regards, Patryk
how to implement vPro????
By Chris B.4
I want to implement USE vPro, not develop for it... is there a turnkey solution that someone offers? or an out-of-box software that just simply works?  just wondering.  Seems like vPro has 10-15 seperate items (sdk, adk, scs, bla bla bla) and not one thing that ties them all together on it's own. I am wrong or am i just missing somthing? Is a third party software required? Is there a consultant available that can simply explain the steps? thanks!
Remote Control with Intel KVM doesn't work after provisioning
By salva g.10
Hi all, I have some issues with remote control with Intel KVM, we are using landesk management suite 9.0 in the server side, godaddy certificate for remote provisioning, The devices are amt versions 6,7,8, and all have Intel integrated graphics. After provisioning all vPro options work but in some devices Remote Control via Intel KVM desn't work. To get kvm option working, in landesk managemet console we have to go to Intel vPro Options -> Intel vPro Status.. then we go to Remote Control via Intel KVM and works. It seems that device is provisioned but kvm option is "False", then when we do Intel vPro Status, Intel amt finish configuration.. We don't know.  When a device is just  provisioned it show KVMOptions><EnableKVM>False</EnableKVM>.. in log file from scs_discovery, after intel vPro status it show True. Maybe a bug in provisioning process? Also to say that when device is provisioned and kvm doesn´t work, we go to Intel MEBX with Ctrl+P and KVM is Enabled.. Is ...
Searching BMC IPMI SDK
By Alex R.5
Hello. We have Intel Server Board S1200BTL. It supports IPMI through BMC. We want to develop some software that will use BMC features remotely. Can somebody help us in searching some SDK. How we can work with this hardware remotely using some high level API?  Maybe you can give us some links from Internet. Maybe you know some famous API, COM library that can help us in working with BMC... thanks in advance. Best regards, Alex.
Remote BIOS update using AMT.
By Florian W.1
Hi, I am currently trying to understand how a remote BIOS update using Intel AMT might work. We've got two different types of workstations, Dell Precision T1650 and HP Compaq 8200 Elite. Dell, as well as HP only offer .exe files for BIOS updates on their websites. Is it somehow possible to remotely install BIOS updates on multiple of each of the workstations mentioned above using Intel AMT?  Thanks in advance and best regards, F. Weile            
AMT SDK - NetworkAdmin sample
By Anthony W.6
I am testing out the various samples contained within the AMT SDK and am running into issues with the NetworkAdmin sample.  One of the switches is "-sgen" which allows the changing of a property.  Specifically I'm trying to change the 'RespondsToPing'.  However, I can't seem to figure out how to use the '-sgen' switch. Assistance is appreciated.  Thanks.


Subscribe to Forums