Use Case Summary
Intel® Active Management Technology (Intel® AMT) can be utilized by several types of management and security applications such as security and other management agents, firewalls, and hardware and software inventory tracking to help IT improve asset management, reduce downtime, and minimize deskside visits.
Reduce or eliminate manual inventory audits by locating systems regardless of power state or health. Improve asset management.
Software Inventory Management:
Improve the software inventory process and optimize maintenance contracts, licensing, and configuration inventory through firmware-resident software info.
Hardware Inventory Management:
Reduce manual audits and better manage hardware inventories, recalls, and warranties. Efficiently manage hardware inventories.
Remote Diagnosis, Remote Repair:
Remotely diagnose and repair client machines, reducing on-site visits to resolve software problems, even when the OS is down.
Remote Diagnosis, Local Repair:
Reduce visits to resolve hardware problems with improved remote diagnosis and hardware information.
Software Version Compliance:
Ensure up-to-date software versions, virus signatures, etc. Improve accuracy, speed and efficiency of antivirus software updates regardless of OS or power state.
Hardware-based Isolation and Recovery:
Detect and stop malware from propagating. Detect suspicious activity at a node, send alert to console, IT quarantines system and updates policy out of band. Monitor outbound traffic by comparing a timeslice of network traffic to enhanced filters in the system defense engine to obtain data on the time frame and number of occurrences of a particular network traffic event.
Presence Checking of User Partition Agents:
Virtually eliminate the ability of users or malware to circumvent protection. If the user disables agents, that action triggers alerts, quarantines the system, and re-initializes the agent.
Endpoint Access Control (EAC):
Limit network access by visitors, rogue systems, and systems that do not conform to company policies for virus protection, OS patches, etc. Force systems that do not meet corporate policy onto a remediation network.
Perform automated setup and configuration of an Intel AMT device, either using credentials stored on a USB key storage device or by keying credential information manually into BIOS.
Automatically set up and configure an Intel AMT device upon connection to the network, either using a third-party management software agent resident on the client OS or from a 'bare-metal' state, without requiring a host OS.
Fast Call for Help:
Allow Intel AMT platforms to initiate a secured connection to Intel® vPro™ technology-enabled gateway residing in the enterprise De-Militarized Zone (DMZ). Using Fast Call for Help, Intel AMT clients can be managed remotely by the IT Administrator when the system is located outside the corporate network.