What Is Intel AMT, and What Can It Do?

What Is Intel AMT, and What Can It Do?

Some ThinkPad users may notice an Intel AMT option in the BIOS. At first glance, it is easy to assume this is just an ordinary hardware toggle; in fact, Intel AMT is a remote management technology designed for enterprise operations scenarios.

Intel AMT stands for Intel Active Management Technology. In Chinese, it is usually translated as “Intel active management technology.” It is part of the capabilities associated with the Intel vPro platform. Its core purpose is to let administrators perform a certain level of remote management even when the operating system is not working properly, or even when the device is powered off but still connected to power.

This Is Intel Active Management Technology

To help software solutions support Intel Active Management Technology (Intel AMT), Intel once provided software developers with a set of tools, including a Software Development Kit (SDK), a Reference Design Kit (RDK), and Setup and Configuration Service (SCS). Through APIs, libraries, and sample code, these tools helped software vendors integrate Intel AMT management capabilities into network management products.

Overview

Intel AMT is a set of hardware-level management features that reside in firmware. It allows network management applications to perform remote management operations. Even if the target device has an abnormal power state, a damaged operating system, or cannot boot normally, administrators may still be able to perform diagnosis and maintenance through the AMT channel.

Its value is mainly reflected in the following areas:

  • Remote asset inventory: read hardware information, device status, and some platform configuration details.
  • Remote power control: perform actions such as power on, power off, and reboot.
  • Out-of-band management: access the device through a firmware-level management channel even when the operating system is unavailable.
  • Remote diagnosis and repair: assist with problems such as boot failure or system corruption using capabilities such as Serial over LAN, IDE Redirection, and KVM.
  • Centralized enterprise management: combine with enterprise management platforms for patch distribution, asset management, troubleshooting, and security response.

It is important to note that Intel AMT is intended for enterprise management scenarios. Individual users who do not use remote operations features usually do not need to enable it. If AMT is enabled, a strong password should be set, and the network access policy and firmware version should be checked to ensure they meet security requirements.

Intel once provided software vendors with the following types of tools so that Intel AMT could be integrated into network manageability applications:

  • Intel AMT Software Development Kit (SDK): provides low-level programming interfaces that allow developers to build management applications that make full use of Intel AMT.
  • Intel AMT Reference Design Kit (RDK): includes a set of customizable open-source software building blocks that developers can use to quickly build Intel AMT console applications.
  • Intel AMT Setup and Configuration Service (SCS): uses credentials and configuration parameters to automatically complete deployment and configuration of Intel AMT platforms so that devices can be managed remotely.

The SDK Supports Low-Level Intel AMT Programming Features

The Intel AMT SDK provides application programming interfaces (APIs) and sample code. Developers can deploy Intel AMT features in their own solutions and run them on Microsoft Windows or Linux platforms. With these tools, software developers can more quickly understand Intel AMT programming requirements and integrate related capabilities into network management products.

The SDK libraries and APIs provide abstraction interfaces for non-volatile storage access, used to store and read Intel AMT-related data. Together with session technologies such as Serial over LAN and IDE Redirection, administrators can remotely manage Intel AMT devices.

The SOAP-based Intel AMT network interface was once provided in the form of WSDL files, while sample code guided developers in writing their own Intel AMT applications. In theory, the SDK could be used by languages or toolchains that support SOAP calls.

If you need to develop or maintain related tools in today’s environment, it is recommended to rely on the current platform’s official documentation, firmware versions, chipset support lists, and enterprise management platform compatibility, because AMT versions, authentication methods, and interface support vary across different generations.

The RDK Provides High-Level Intel AMT Solution Building Blocks

The purpose of the Intel AMT RDK was to help developers quickly build simple, customizable Intel AMT console solutions. Through a set of Java-based software building blocks, it abstracted away some lower-level implementation details, allowing developers to deploy AMT management features more quickly.

The RDK also provided complete source code, which developers could modify to add more complex custom features. It also included a simple graphical utility that helped users understand the various Intel AMT features available on networked platforms.

The RDK once consisted of three separately downloadable packages:

  • RDK Utility Application Package: helped developers become familiar with practical Intel AMT platform operations, remotely collect hardware information, and execute management functions.
  • RDK Building Blocks Package: contained Java binaries for performing various Intel AMT tasks, along with documentation explaining how to use those binaries in applications.
  • RDK Source Code Package: contained the Java source code for the building blocks and related build scripts, which developers could use to customize the building blocks or port the functionality to other languages.

SCS Connects Intel AMT Devices to Enterprise Infrastructure

Intel AMT SCS provided IT departments with a way to connect Intel AMT devices to enterprise management infrastructure. Software vendors could also use SCS capabilities to integrate device configuration and deployment workflows into their own products.

The core functionality of SCS was provided by a Windows service. It configured the SOAP API using passwords and other credentials so that management systems could communicate with Intel AMT devices, after which management applications could call it. SCS used a SQL Server database to store configuration data, stored procedures, and logs related to system operations. It also provided sample console applications that software companies could use as references for creating their own consoles, or as a foundation for adding value-added features.

In enterprise deployment, the focus of SCS was not merely “being able to connect to the device.” It also included bulk configuration, certificate and credential management, policy delivery, and coordination with existing directory services and management platforms.

The Difference Between Intel AMT and Microsoft SMS

Intel AMT and Microsoft SMS are concepts at two different layers: one leans toward hardware- and firmware-level management, while the other leans toward operating system- and software-level management.

Software management solutions such as Microsoft SMS usually require the managed client to be powered on, the operating system to be running normally, and the background client service to be intact. They are better suited for software distribution, patch management, asset inventory, and policy management while the system is running normally.

Intel AMT’s advantage lies in out-of-band management. As long as the client hardware supports AMT, has been correctly configured, is connected to power, and the management network is reachable, administrators may still be able to perform power control, asset reading, remote diagnosis, redirected boot, and other operations even if the operating system is damaged or the machine is powered off. Therefore, AMT is better suited as a supplement to system-level management tools.

If the two are combined, routine management can be handled by the software management platform, while Intel AMT provides out-of-band maintenance when the system is abnormal or cannot boot. This creates a more complete enterprise endpoint management solution.

Usage and Security Recommendations

If you see an Intel AMT option in the BIOS, you can decide whether it needs to be enabled using the following approach:

  1. For personal computers or computers that are not centrally managed by an enterprise, it can usually remain disabled.
  2. If enterprise devices require remote operations, they should be configured centrally by IT administrators. Users are not advised to enable it themselves.
  3. Before enabling it, confirm the firmware version, management engine version, network access policy, and authentication method.
  4. After enabling it, set a strong password and restrict the network range that can access the AMT management ports.
  5. If the device is no longer under enterprise management, clear the AMT configuration in the BIOS or management tool.

AMT is powerful. Precisely because it can manage a machine by bypassing the operating system, permissions, network isolation, and firmware updates must be handled seriously.

Conclusion

Intel AMT is a hardware-level remote management technology for enterprise endpoints. It can provide asset management, remote power control, diagnostic maintenance, and out-of-band management capabilities when the operating system is unavailable.

Intel once helped software vendors integrate Intel AMT through tools such as the SDK, RDK, and SCS: the SDK provided low-level APIs and libraries, the RDK provided reusable building blocks and a reference console, and SCS helped enterprises complete setup and configuration of AMT devices.

For ordinary users, it is enough to understand what the Intel AMT option in the BIOS means. If enterprise remote management is not needed, keeping it disabled is usually simpler. For enterprise IT, the value of AMT lies in filling the blind spots of operating system-level management tools, especially when a system is damaged, cannot boot, or needs remote recovery.

Original source: http://www.91bjb.com/bbs/thread-65406-1-1.html

Leave a Reply