Intel® Developer Zone:
Business Client

More configurations (disabling) of the Intel AMT icon. Part 4 in the Intel AMT software series
By Shmuel Gershon (Intel) Posted on 10/12/08 6
Hi! In the previous part of this series (part 1, part 2, part 3), we began describing the Intel AMT software, and the ways in which the Intel AMT System Status can be configured to suit a specific system, network or style. As we wrote in the past, this application unnoficially goes also by the na...
WebUI issues with IE and AD
By Lance Atencio (Intel) Posted on 10/10/08 2
If you have extended Active Directory (AD) for use with your AMT clients you may have issues connecting to the AMT WebUI for those machines using Internet Explorer (IE). This is related to authentication settings. If you experience this problem, you can first try another browser (e.g. Firefox) to...
Configuring the notification area icon & app. Intel AMT SW Part 3
By Shmuel Gershon (Intel) Posted on 09/23/08 7
(See Part 1 for an overview, and Part 2 for the icon introduction and screenshots) Hi All. Today we'll see some secret settings in Intel AMT software. Well, not so secret: They're all written in the software readme, but hey! Who reads the instructions? :) Also, your equipment manufacturer may hav...
Intel AMT SW, part 2: The notification area icon - understanding the pop-up
By Shmuel Gershon (Intel) Posted on 09/15/08 2
(Hello all, this is a delayed continuation from the Part 1 overview. Please see there the enumeration of all the software we'll see in the articles) Privacy: "\prī-vuh-sē, noun,  freedom from unauthorized intrusion" (one definition from the Merriam Webster Dictionary). Following the need and will...
Subscribe to Intel Developer Zone Blogs
Intel® Active Management Technology (AMT) in the Small Business
By ylian-saint-hilaire (Intel)Posted 10/10/20082
  By Ylian Saint-Hilaire Overview Intel® Active Management Technology (Intel® AMT) is not just for big enterprises. Small business owners with only a few PCs can benefit greatly from Intel AMT, a key feature of the Intel® vPro™ technology. Power savings, improved remote management, and invento...
Web Services Issues: Manageability
By Posted 10/06/20080
Introduction Management, as it relates to computing environments, is a multifaceted discipline. It pertains to systems/server management, client management, applications management, database management, storage management, network management, and much more.Management in the Web services world is ...
Standards-Based Management Influences Platform Evolution
By Posted 10/02/20080
  Introduction by Andrew BinstockThe pressure put on IT budgets due to the recent economic downturn focused managers’ attention once again on the importance of total cost of ownership (TCO). When TCO was first proposed as the comprehensive way to assess the true cost of systems ownership, the pri...
Intel® AMT in a wireless environment
By adminPosted 10/02/20080
Support for wireless connectivity in Intel® Active Management Technology (Intel® AMT) provides new functionality for makers of network-management software. Because of inherent differences in the needs of wireless and wired connectivity, developers and IT organizations working with these capabilit...
Subscribe to Intel Developer Zone Articles

Intel Business Client Platforms
Whether you’re developing for unmanaged small business, or enterprise-level IT departments, 3rd Generation Intel® Core™ processor-based PC and mobile platforms are designed to help you meet the needs of your customers.


Intel® vPro™ Technology

Intel® Small Business Advantage

Manageability (Use Cases)
Remote management features make it easy to keep PCs running smoothly and more cost effectively.



State-of-the-art technology makes security, data backup, updates, and routine maintenance fully automatic.


Hardware-assisted security features allow quick deployment of patches, and remote unlocking of encrypted drives, even when the PC is off.

The visibly smart 3rd generation Intel® Core™ vPro™ processor family means improved security, manageability, and cost-effectiveness.

Built-in security and virtualization capabilities provide a flexible foundation for computer models of today and tomorrow.


Technology Capabilities

Develop Software unlocking the detect, repair and protect capabilities of Intel® vPro™ Technology. Gain access to the tools, technical information and industry expert support to help you develop software for Intel's premier business platform.

  • Intel vPro platforms are loaded with features and technologies to deliver best in class security protection. Whether it's applying advanced encryption or remotely disabling a stolen/lost PC, systems equipped with Intel vPro technology are designed to keep your data safe. Explore the many options below to see which features/technologies might fit best into your products.

    Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)

    AES (Advanced Encryption Standard), an encryption standard adopted by the U.S. government is widely used across the software ecosystem to protect network traffic, personal data, and corporate IT infrastructure. AES-NI were designed to implement some of the complex and performance intensive steps of the AES algorithm using hardware and thus accelerating the execution of the AES algorithms.

    Learn More ›

    Intel® TXT

    Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS, virtual machine monitor, and operating system.

    Learn More ›


    User Manual for the Rdrand Library (Linux Version)

    User Manual for the Rdrand Library (Windows Version)

    Intel® Secure Key is Intel's name for its new Intel® 64 Architecture instruction RdRand and its underlying Digital Random Number Generator (DRNG) hardware implementation (old code name, Bull Mountain). Intel® Secure Key provides a processor-based RNG solution that is of high quality and performance, highly available, and secure.

    Learn More ›

    Intel® Identity Protection Technology (Intel® IPT)

    Intel has built two-factor authentication directly into the processors of select 2nd generation Intel® Core™ processor-based PCs, helping to prevent unauthorized access to important personal accounts. Intel IPT allows vendors to store their OTP algorithms inside the processor itself, in a secure chipset called Intel® Management Engine (Intel® ME). Intel's hardware solution eliminates the complexity and unstable nature of OTP software solutions, as well as the user-dependent problems of tokens.

    Download Intel® IPT Installer

    If you have a strong authentication solution or component to your application, take the next step in incorporating Intel® IPT by contacting us at

    Intel® IPT Public Key Infrastructure (PKI)

    Intel® Identify Protection Technology (Intel® IPT) is meant to augment security features that allow for user identification and encryption by adding a hardware layer of protection. Intel® IPT with Public Key Infrastructure (PKI) acts as a hardware security module, similar to a Smart Card. However, it is as easy to manage as software PKI deployments. Intel® IPT with protected transaction display further protects PKI certificates with a PIN code entry generated in Intel’s protected audio vision path (PAVP) using Intel’s integrated graphics. Display and entry of the PIN code is handled by secure hardware, making PIN theft very difficult.

    Technology Overview
  • At the heart of the many features and capabilities of Intel vPro systems are the latest Intel® Core™ vPro™ processors. These processors provide outstanding performance while still delivering power efficiency. Review the features below and visit the Parallel Programming Community for additional threading support.


    Intel® Hyper-Threading Technology (Intel® HT Technology)1 uses processor resources more efficiently, enabling multiple threads to run on each core. Intel® HT Technology increases processor throughput, improving overall performance on threaded software. Intel HT Technology is available on Previous Generation Intel® Core™ processors, 2nd generation Intel® Core™ processor family, and Intel® Xeon® processor family.

    An Intel® processor and chipset combined with an OS and BIOS supporting Intel HT Technology allows you to:

    • Run demanding applications simultaneously while maintaining system responsiveness
    • Keep systems more secure, efficient, and manageable while minimizing impact on productivity
    • Provide headroom for future business growth and new solution capabilities

    Introduction to Hyper-threading ›

    1 Available on select Intel® Core™ processors. Requires an Intel® Hyper-Threading Technology (Intel® HT Technology) enabled system. Consult your PC manufacturer. Performance will vary depending on the specific hardware and software used. For more information including details on which processors support HT Technology, visit


    Intel has optimized Intel® Turbo Boost Technology2 to provide even more performance when needed on 2nd Generation Intel® Core™ processor based systems. Intel® Turbo Boost Technology 2.0 automatically allows processor cores to run faster than the base operating frequency if it's operating below power, current, and temperature specification limits. Intel Turbo Boost Technology 2.0 is activated when the Operating System (OS) requests the highest processor performance state (P0).

    The maximum frequency of Intel Turbo Boost Technology 2.0 is dependent on the number of active cores. The amount of time the processor spends in the Intel Turbo Boost Technology 2.0 state depends on the workload and operating environment.

    Any of the following can set the upper limit of Intel Turbo Boost Technology 2.0 on a given workload:

    • Number of active cores
    • Estimated current consumption
    • Estimated power consumption
    • Processor temperature

    When the processor is operating below these limits and the user's workload demands additional performance, the processor frequency will dynamically increase until the upper limit of frequency is reached. Intel Turbo Boost Technology 2.0 has multiple algorithms operating in parallel to manage current, power, and temperature to maximize performance and energy efficiency. Note: Intel Turbo Boost Technology 2.0 allows the processor to operate at a power level that is higher than its rated upper power limit (TDP) for short durations to maximize performance.

    2 Intel® Turbo Boost technology requires a PC with a processor with Intel Turbo Boost capability. Intel Turbo Boost performance varies depending on hardware, software and overall system configuration. Check with your PC manufacturer on whether your system delivers Intel Turbo Boost technology. See for more information.

Whether you’re developing 3rd Generation Intel® Core™ processor-based applications for networked systems, or creating tools for smaller businesses, this is the place for all your technical content needs.

Need advice or help? Tap into a world of expertise through our forum.

No Content Found
Subscribe to Intel Developer Zone Articles

A Developer's Introduction to Business Client Technology

The following table will help you understand which technologies are present in which 3rd Generation Intel® Core™ processors, so you can more effectively help your customers manage and streamline their business needs.

Advanced Technologies 

Intel® Core™ i3

Intel® Core™ i5 

Intel® Core™ i7





Intel® SBA Software




Intel® AES-NI




Intel® Secure Key




Intel® Anti-Theft




Intel® VT 

Yes (Vt-x)

Yes (Vt-x & Vt-d)

Yes (Vt-x & Vt-d)

Intel® TXT




1 Certain SKUs may vary. Please check your specific systems at

For the "Un-managed" Small Business

Intel® Small Business Advantage (SBA)
Bring streamlined maintenance and security solutions to your small business customers using


Intel® AMT Software Development Kit
The building blocks and documentation needed to develop for Intel® AMT systems
Download ›

Intel® Setup and Configuration Software (Intel® SCS)
This package provides the newest tools to set up and configure Intel® AMT Devices.
Download ›

Open Manageability Developer Toolkit
Open source tools for management for computer that supports Intel® Active Management Technology (Intel® AMT). 
Download ›

Intel® vPro Platform Solution Manager
Allows you to launch plug-in applications to remotely manage your Intel vPro Technology based PC clients. 
Download ›


Intel® AES New Instructions (Intel® AES-NI)
Intel® AES-NI is a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in the Intel® Xeon® processor family and the 3rd Generation Intel® Core™ processor family.
Download ›

Intel® Secure Key
Intel Secure Key is the name for the Intel 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation.

  • Implementation Guide
  • Code Examples
  • Case Studies

Download ›

Intel® Trusted Execution Technology

Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects IT infrastructures against software-based attacks by validating the behavior of key components within a server or PC at startup.
Learn more ›

  • Static Security Analysis (SSA)
  • Static Security Analysis (SSA) examines source code to find errors and security weaknesses, allowing you to eliminate defects early in the development cycle and proactively harden your application against security breaches.
Download ›

Intel® Virtualization
Intel® Virtualization models can help enhances security and manageability for your Business Client Customers.
Learn more ›

Find all the latest documentation to help with your development projects. Technical guides, case studies, code samples, videos and thought-provoking blog posts–you'll find it all here.


Welcome to Intel® Active Management Technology (AMT)
To learn more about Intel AMT and to download the latest Software Development Kit (SDK), visit:
Intel AMT Start Here Guide 
Intel AMT SDK Download 
Intel AMT SDK Documentation

Intel® vPro™ Technology Resource Kit
The Intel® vPro™ Technology Resource Kit is a downloader tool that is a compilation of tools, utilities, and supporting documentation to simply educate you and easily walk you through the implementation of Intel vPro technology.
Learn more ›

Intel® AMT: Known Issues and Best Practices
The Known Issues, Best Practices, and Workarounds, may be very useful to many of our vPro Developers.
Learn more ›


Advanced Security Features of Intel® vPro™ Technology
Intel® vPro™ technology creates a powerful platform in which security and manageability go hand in hand. Since manageability is a crucial aspect of an enterprise’s network.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Introduction AES (Advanced Encryption Standard) is an encryption standard adopted by the U.S. government starting in 2001. It is widely used across the software ecosystem to protect network traffic.
Learn more ›

Intel® AES New Instructions (Intel® AES-NI)
Overview of Intel® AES-NI, a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data.
Learn more ›

Securing the Enterprise with Intel® AES-NI
Learn why cryptography is hot in the marketplace today, especially in the enterprise.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Description of the six new instructions that make up the AES-NI instruction set and perform several compute intensive parts of the AES algorithm.
Learn more ›

Intel® Trusted Execution Technology
Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS and virtual machine monitor.
Learn more ›

Intel® System Defense and Agent Presence Overview
System Defense and Agent Presence are security toolsets built into Intel® Active Management Technology (Intel® AMT). The System Defense and Agent Presence toolsets are targeted at closing two gaps in in the Intrusion Detection System (IDS) methods currently employed by IT:

  • The time window between the identification of an OS/Agent vulnerability and completed deployment of a corresponding patch.
  • The time between an end-user tampering with an IDS agent and detection of and acting on the tampering.
Learn more ›



Virtualization HW technical brief
Intel® Virtualization Technology (Intel® VT) provides comprehensive hardware assists that boost virtualization software performance, improve application response times and provide greater reliability, security and flexibility.
Learn more ›

Virtualization: A Developer's Friend
The more developers use virtualization, the more they find new uses for it. Dis¬cover what you’re missing and how virtualization can help you get more done.
Learn more ›

Intel® Virtualization Technology: Flash* Animation
This animation provides an overview of Intel® Virtualization Technology.
Learn more ›

Intel® Virtualization Technology: Best Practices for Software Vendors
This series of articles functions as an aid to help software vendors tailor their applications for use with Intel VT.
Learn more ›

Business Client Developer Community

This is your community. We encourage you to participate in all ways that will help you, your fellow developers, and your customers. Whether it be asking and answering questions in our forums, reading writing or commenting on blogs, working toward becoming an Intel® Black Belt Software developer, your contribution is valued and valuable!

Build your Reputation

Intel® Black Belt Software Developers
Black belt status is awarded to software developers known for technical expertise, community leadership.
Learn more ›

Gael Hofemeier
Gael is an Application Engineer at Intel (since 2000) working primarily with Business Client Technologies.

Ylian Saint-Hilaire
A senior architect at Intel, Ylian Saint-Hilaire part of a path finding group and is currently researching new ways of using Intel platform technologies.

Javier Caceres
Javier is an Project & Product Manager working on Colombian industry since 2002. He has worked on many challenging projects like Windows Kernel Mode Drivers, Intel AMT SOL, and many, many more.

Are you an IT Manager?
Visit the Intel® vPro™ Expert Center
Become an Intel® Software Partner
As an Intel® Software Partner, software companies and individuals find resources to help them develop, optimize, and market commercially available applications running on Intel platforms and technologies.
Learn more ›
AMT - How to enable HTTPS
By Rupert H.12
Hello, I'm trying to enable HTTPS on my VPRO enabled server. HTTP (on port 16992) runs without problems but I think it is not a good idea holding a port always open on my router (directly connected to internet) and sending password on an unsecured connection. Basically this is my actual configuration (host side): - a router/firewall directly connected to WAN/Internet with port-forwarding enabled on port 16992 (this port is always open) - AMT enabled / TLS disabled on host computer (this computer is directly connected to the router) - Linux with MEI driver and LMS correctly installed (also ACUConfig is installed on linux box) - Virtualbox (with Windows 8) installed on my linux box - OpenMDTK installed in Win8/virtualbox (correctly working and connecting) - ACUWizard installed in Win8/virtualbox (working but unable to connect because peraphs it needs MEI and LMS for Windows) Mi only need is to enable HTTPS port 16993 on AMT host in way to connect to the host through a secured connect...
MBEx User Consent
By Joel G.5
Hello to all, I have a question that I hope you all can help me address. We are in the process of provisioning our workstations in my environment so that we can use the Intel KVM functionality. With that being said, we have several Dell workstations each running a different version of AMT firmware. The firmware on our workstations ranges from 7.1.2, 7.1.4, 8.0.4 and 8.1.0. I need to find a way to disable the User Consent\User Opt-in for my workstations. Currently this setting is set to *KVM, I want to set this to *None in the MEBx settings. Can this particular MEBx setting be modified with a powershell script or vbscript that I can then deploy via SCCM 2012? I have tried reading several articles online to no avail. I need to disable this because the application we are using to establish a KVM session, will other wise ask for the User Consent code in order to display the screen. Sadly the application Bomgar, does not handle KVM sessions as well as VNC Plus and that is why I require t...
img file format support for ide-r redirection in Linux
By plmanikandan15
Hi, In AMT 9.5 SDK(IntelAMT9.5.0.27Gold) there is note related to img/iso file redirection for Linux When working in Linux, Redirection is supported with physical disks only.  There is no Linux Redirection support for iso or img files. But when I checked the Redirection sample program available in AMT 9.5 SDK(ntelamt9.5.0.27gold\IntelAMT9.5.0.27Gold\Linux\Intel_AMT\Samples\Redirection\RedirectionSample), it shows like iso/img can be redirected. README have following details How to work with iso or img files: ----------------------------------- Unlike real CD or real floopy, working with iso\img files doesn't require files to the file system. In order to work iso\img file, send the file path as input parameter without doing anything else. For example, if MyFloopy.img file is located at /home/Desktop, send "/hone/Desktop/Myfloopy.img" path as the floopy device. I'm able to redirec img file using RedirectionSample from CentOS 5.3. I would like know is IMG file redirection is suppor...
AMT 9: "Authentication failed x times. The system may be under attack."
By mcbsys12
Hi, I recently deployed a Lenovo M93p desktop that has AMT 9.0.2-build 1345. I set up vPro from MEBx, changing the password as required when I first went in to MEBx. That's the password I'm still using to access the web UI. The web UI event log is reporting thousands of authentication failures (see screen shot).Since the vPro ports are only open inside the LAN and across a private VPN, it's unlikely that it's a real attack. I found a 2009 reference on this: but I don't quite understand what it means. Is it "normal" to see thousands of failures when no one is connecting? Where are these failures coming from? Also:  is it normal for AMT to use GMT time rather than local time? Thanks, Mark BerryMCB Systems
imrsdk Temporary Files
By Fábio C.1
I am using HLAPI that came with the AMT 8.1.4198 SDK. I am trying to use HLAPI Redirection with TLS to remotely install another OS using a web interface. I was able to sucessfully change the HLAPIVariables.TempFilesDirectory so that temporary files are created in a directory the site has write access to. This is essential since the application running the actual code is IIS. This works fine and the MC.ini file created by the RedirectionImpl class is created in the temporary directory I created. However the imrsdk dll also creates some temporary files, a log file and a client.db file. These files ignore the HLAPIVariables.TempFilesDirectory and write to the startup path, which is a protected system folder where IIS is located. I was able to get my system working giving IIS write access to its folder, but I would rather not do this. Is there a way to change where the imrdsk library writes its temporary files?
Cannot connect to vPro 9 from MDTK 1.26
By mcbsys31
Hi, I found this forum from the Open Manageability Developer Tool Kit (MDTK) page. I'm setting up a new Lenovo M93p running AMT 9.0.2-build 1345. This is for a small business, so it's all manual provisioning. I've turned on SOL, IDER, and KVM. I've set user consent to NONE. I can access the machine via a web browser (port 16992) for power control, log viewing, etc. However when I try to Connect from MDTK 1.26, the connection times out. Same thing if I try to connect from UltraVNC. If I run Wireshark while trying to connect with MDTK, I can see packets going back and forth between the management station and the M93p. (This is all on a local IPv4 LAN for now.) I don't know what the packets mean, but at leat there is bi-directional traffic. Just to be sure, I disabled the firewall on my Win7 management PC just in case that was a problem, but that didn't make a difference. Is there something I'm missing to able to connect remotely to this machine using MDTK and VNC/KVM? Thanks, Mark
How to stop iAMT from resetting during power outtage
By Joshua E.3
Hi. We're trying to use iAMT on some boards that are being developed for us, but having one issue: We setup a MEBx password on the board, and everything works great. We have Admin level access and can KVM/etc as needed. However, once line power is removed and the CMOS battery is missing/dead, the MEBx account resets and we lose our iAMT config. After that, we obviously can't KVM/etc to fix the machine. Is there some way to configure iAMT so it won't lose the config when the CMOS is pulled? If it loses the config when power is lost and the CMOS battery is dead, it's unfortunately not suitable to our application, unless there is some other way to gain Admin access once the MEBx password is reset that I can't find. Also, maybe unrelated, but the \Windows\Intel_Manageability_Configuration\Bin folder in the Gold SDK is missing, which means I can't gen certs/etc. Thanks!
How to backup Intel® MEBx bin firmware on a Desktop based on the Intel Q35 architecture?
By Lalya S.3
Hello, I have two "SUN Microsystems" workstations identical but one is not able to access the Management Engine BIOS Extension (MEBx). There's no point in which, during boot, it tells 'Press <Ctrl-P> to enter MEBx Setup', I have tried serveral reboots pressing every solitary second 'Ctrl+P' but still absolutely no way to access. I have also tried to update the BIOS version several times but still nothing. The other identical machine works fine instead and it is showing the Ctrl-P message. So I want to ask if there's some way with an utility (under DOS of course) to make a backup of the ME firmware BIN image (I don't mean the BIOS!) from the working machine, and then load it back in the machine who has problems. Intel AMT BIOS Extensions is version Thanks
Subscribe to Forums