Intel® Active Management Technology Use Cases

Intel® AMT can be utilized by several types of management and security applications such as security and other management agents, firewalls, and hardware & software inventory tracking to help IT improve asset management, reduce downtime, and minimize desk side visits. Read the Intel® AMT Architecture Guide to learn everything you need to know about implementing one or more of the following features in your application.



Intel AMT Use Case Summary

 

Use Case

Purpose

UC1 Platform Auditing

Reduce or eliminate manual inventory audits by being able to locate systems regardless of power state or health. Improve asset management.
UC2 Software Inventory Management Improve the software-inventory process; optimize maintenance contracts, licensing, and configurations inventory through firmware (FW) resident SW info.
UC3 Hardware Inventory Management Reduce manual audits and better manage hardware inventories, recalls, warranties. Efficiently manage hardware inventories.

UC4 Remote Diagnosis, Remote Repair
Remotely diagnose and repair client machines, reducing on-site visits to resolve SW problems, even when OS is down.

UC5 Remote Diagnosis, Local Repair
Reduce visits to resolve HW problems with improved remote diagnosis and hardware information.

UC6 Software Version Compliance
Ensure up-to-date software versions, virus signatures, etc. Improve accuracy, speed and efficiency of anti-virus software updates regardless of OS or power state.

UC7 Hardware-based Isolation and Recovery
Detect and stop malware from propagating. Suspicious activity detected at a node, alert sent to conso le, IT quarantines system and updates policy out of band. Monitors out-bound traffic by comparing a timeslice of network traffic to enhanced filters in the system defense engine to obtain data on the time frame and number of occurrences of a particular network traffic event.

UC8 Presence Checking of User Partition Agents
Virtually eliminate the ability of users or malware to circumvent protection. If the user disables agents, that action triggers alerts, quarantines the system, and re-initializes agent.
UC9 Endpoint Access Control (EAC) Limit network access by visitor, rogue systems, and systems that do not conform to company policies for virus protection, OS patches, etc. Force systems that do not meet corporate policy onto a remediation network.
UC10 One-Touch Configuration Perform automated setup and configuration of an Intel AMT device, either using credentials stored on a USB key storage device or by keying credential information manually into BIOS.
UC11 Remote Configuration Automatically set up and configure an Intel AMT device upon connection to the network, either using a third-party management software agent resident on the client OS or from a 'bare-metal' state, without requiring a host OS.
UC12 Fast Call for Help Fast Call for Help allows Intel AMT platforms to initiate a secured connection to Intel vPro enabled gateway residing in the enterprise De-Militarized Zone (DMZ). Using Fast Call for Help, Intel AMT clients can be managed remotely by the IT Administrator when the system is located outside the corporate network .

 


RESOURCES:

 


Pour de plus amples informations sur les optimisations de compilation, consultez notre Avertissement concernant les optimisations.
Étiquettes: