Intel® Business Client Software Development

Preloaded *3rd Party Data Storage* (3PDS) in my AMT device

In my AMT device I've found this preloaded 3PDS:

  • venAltiris (appAltiris)
  • venBMC (Marimba)
  • venCA (Unicenter)
  • venCheckPoint (Integrity)
  • venIBM (appIBM)
  • venLANDesk (Management Suite)
  • venNovell (appNovell)
  • venStarSoftComm (appStarSoftComm)
  • venSymantec (SymantecApp)
  • venTrendMicro (appTrendMicro)

My motherboard is a Supermicro motherboard. I wonder why AMT in my MB is shipped with these preloaded 3PDS applications.

Moreover I would like to know why:

ACUConfig doesn't behave as expected

- I have installed Linux version of ACUConfiug.
- I have created a simple profile with ACUWizard (in MS-Windows) to change power management settings.
This is my simple profile "profile.xml":

  <Description>Power Management</Description>

"Remote Control" link disappeared in web interface after Unprovisioning

I have unprovisioned my AMT environment through OpenMDTK Director Tool.
Now, entering as admin in web interface I don't have no more the "Remote Control" link in left menu.
It's not a problem of permission because I have created a new user with specific permission for Remote Controlling but problem doesn't solve.

I think I have to activate that menu in some way. Anyone know how?

Intel AMT, VNC and, TLS

I've recently implemented OOB in my office and I'm having difficulties getting VNC to connect to the clients.  When I try to connect to a client using VNC Viewer Plus I get the following error, "KVM tunnel TLS failure.  Check TLS configuration and certificates."  Everything else is working.  I can connect to the client from IE using HTTPS.  Powershell commands are also connecting to the client using TLS with no issues.  I've pretty much ran out of ideas on how to get this working.  Any help would be appriciated.

AMT - How to enable HTTPS


I'm trying to enable HTTPS on my VPRO enabled server.
HTTP (on port 16992) runs without problems but I think it is not a good idea holding a port always open on my router (directly connected to internet) and sending password on an unsecured connection.

Basically this is my actual configuration (host side):

- a router/firewall directly connected to WAN/Internet with port-forwarding enabled on port 16992 (this port is always open)

- AMT enabled / TLS disabled on host computer (this computer is directly connected to the router)

MBEx User Consent

Hello to all,

I have a question that I hope you all can help me address. We are in the process of provisioning our workstations in my environment so that we can use the Intel KVM functionality. With that being said, we have several Dell workstations each running a different version of AMT firmware. The firmware on our workstations ranges from 7.1.2, 7.1.4, 8.0.4 and 8.1.0.

img file format support for ide-r redirection in Linux


In AMT 9.5 SDK(IntelAMT9.5.0.27Gold) there is note related to img/iso file redirection for Linux

When working in Linux, Redirection is supported with physical disks only.  There is no Linux Redirection support for iso or img files.

But when I checked the Redirection sample program available in AMT 9.5 SDK(ntelamt9.5.0.27gold\IntelAMT9.5.0.27Gold\Linux\Intel_AMT\Samples\Redirection\RedirectionSample), it shows like iso/img can be redirected. README have following details

AMT 9: "Authentication failed x times. The system may be under attack."


I recently deployed a Lenovo M93p desktop that has AMT 9.0.2-build 1345. I set up vPro from MEBx, changing the password as required when I first went in to MEBx. That's the password I'm still using to access the web UI.

The web UI event log is reporting thousands of authentication failures (see screen shot).Since the vPro ports are only open inside the LAN and across a private VPN, it's unlikely that it's a real attack.

I found a 2009 reference on this:

订阅 Intel® Business Client Software Development