Intel SCS Deployment Guide
Intel SCS Deployment Guide
Revision 1.1
January 2019
Intel technologies' features and benefits depend on system configuration and may require enabled hardware,
software or service activation. Performance varies depending on system configuration. No product or
component can be absolutely secure. Check with your system manufacturer or retailer or learn more at
intel.com.
Cost reduction scenarios described are intended as examples of how a given Intel- based product, in the
specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances
will vary. Intel does not guarantee any costs or cost reduction.
Intel, the Intel logo, Intel Core, and Intel vPro are trademarks of Intel Corporation or its subsidiaries in the U.S.
and/or other countries.
©Intel Corporation.
Contents
1 Introduction ................................................................................................................................................. 6
1.1 Intel® Setup and Configuration Software (Intel® SCS) overview ................................................................................ 7
2 Prerequisites ................................................................................................................................................ 9
2.1 Client software components....................................................................................................................................................... 9
6.3 Verify and validate the Transport Layer Security (TLS) configuration .................................................................39
7 Wireless ......................................................................................................................................................41
7.1 Introduction ......................................................................................................................................................................................41
8 Configuration .............................................................................................................................................47
8.1 Introduction ......................................................................................................................................................................................47
8.6 Using the Intel® AMT Configuration Utility Command Line Interface (CLI) ........................................................51
9 Discovery ....................................................................................................................................................57
9.1 Introduction ......................................................................................................................................................................................57
Intel® AMT operates independently of the CPU and the firmware is delivered in an un-configured state. Intel®
SCS is provided by Intel to support the setup and configuration of the firmware for the target environment and
enable remote, out-of-band access to Intel® AMT features1.
Guidance is provided to enable a baseline implementation of Intel® AMT and identifies common configuration
settings to support an enterprise deployment that take advantage of the manageability and security features
available on platforms that support Intel® AMT and Intel® Standard Manageability 2
After configuration, Intel® AMT systems can be remotely managed by products, toolsets and solutions
including Microsoft System Center Configuration Manager*, Microsoft PowerShell*, and Intel® Manageability
Commander.
Examples of where Intel® AMT delivers value to IT and the business include:
Utilizing hardware based KVM Remote Control to reduce maintenance and support costs and avoid
desk-side visits3.
Improving system deployment and rebuild processes.
Keeping clients updated and avoid working hour reboots, even for remote employees.
Providing effective remote assistance whilst outside the corporate network.
Providing an effective decommission process for retired machines.
The guide compliments the Intel® Setup and Configuration Software (Intel ® SCS) User Guide
(Intel(R)_SCS_User_Guide.pdf) in the Intel® SCS download package that is available from
http://www.intel.com/go/scs.
1
Intel® Active Management Technology features may be unavailable or limited over a host OS-based VPN, when connecting
wirelessly, or on battery power when in a low power state or powered off. For more information, visit intel.com/AMT.
2
Intel® Standard Manageability (ISM) systems were introduced with Intel® AMT Release 5.0 and have a subset of Intel® AMT
features e.g. no KVM, Wireless LAN support, etc.
3
KVM (Keyboard, Video, and Mouse) Remote Control is only available with Intel® Core™ vPro™ processors with active
integrated graphics. Discrete graphics are not supported.
A free, supported product that enables a consistent and standard approach to the setup and
configuration of Intel® AMT manageability and security features available on Intel® vPro™ Platforms.
Robust enterprise features including support for the latest releases of Microsoft Operating Systems
and SQL Server and proven scalability to discover, configure and maintain 10’s of thousands of Intel®
AMT systems.
Intel® SCS includes the components listed below. However, only some of these components are used or
referenced within this guide. Please see the Intel® Setup and Configuration Software (Intel® SCS) User Guide
(Intel(R)_SCS_User_Guide.pdf), for additional details.
Remote Configuration Service (RCS): A Windows* based service that runs on a physical computer or
VM within your network. The RCS processes configuration requests and can handle the storage of
data.
Console: This is the user interface to the RCS and is used to create and edit configuration profiles. In
database mode, the Console allows you to view data sent to the RCS and additional options including
monitoring and performing maintenance tasks against multiple Intel® AMT systems.
Configurator: ACUConfig.exe is a Command Line Interface (CLI) used to configure Intel® AMT and runs
locally on each Intel® AMT system.
Intel® AMT Configuration Utility: ACUWizard.exe provides a GUI based wizard to quickly configure
individual Intel® AMT systems or create XML profiles that can be used to configure multiple Intel®
AMT systems.
Discovery Utility: SCSDiscovery.exe is a standalone utility used to gather detailed information about
Intel® AMT.
Remote Configuration Service Utility: RCSUtils.exe is a Command Line Interface (CLI) used to make
some of the RCS setup tasks easier including installing certificates and assigning Windows
Management Instrumentation (WMI) permissions to user accounts.
Solutions Framework: Extends the capability of Intel® SCS to discover and configure other Intel
products in addition to Intel® AMT.
Database Tool: Used to perform some of the tasks necessary when installing the RCS in database
mode i.e. Intel® SCS database creation.
Encryption Utility: Used to encrypt and decrypt XML files used by Intel® SCS.
Once the Intel® AMT firmware has been configured using Intel® SCS components, computers can be remotely
accessed when they are powered off or the operating system is unavailable. The only requirements are that
the system is connected to a power supply and has a wired (LAN) and/or wireless (WLAN) network connection.
When using the wired LAN interface on a corporate network, Intel® AMT traffic shares the same physical
network interface as the host operating system. Network traffic (on ports 16992-16995) is directly intercepted
by Intel® AMT before being passed to the host operating system. Network traffic received on an Intel® AMT
A configured Intel® AMT environment contains hardware, firmware and software that controls Intel® AMT
features and capabilities. These components include:
The Intel® Management Engine (Intel® ME) firmware.
The Intel® Management Engine BIOS Extension (Intel® MEBX) is a BIOS menu extension on the Intel®
AMT system that can be used to view and manually configure some of Intel® AMT settings. The menu
is either available via a system BIOS menu or can be displayed if you press a special key combination,
traditionally <Ctrl-P>, during the system boot process.
The Intel® Management Engine Interface 4 (Intel® MEI) driver, is the operating software interface to the
Intel® AMT device.
The Intel® Local Manageability Service 56 (LMS.exe) provides OS-related Intel(R) ME functionality.
The Intel® Management and Security Status (IMSS) provides status information to the local user about
Intel® AMT including messages and an indication that Intel® AMT is configured.
4
The MEI driver and LMS are installed by the OEM. If they’re missing or need to be reinstalled, check the OEM’s support site
to locate the correct versions for your system.
5
The LMS is installed on a platform that has Intel® AMT Release 9.0 or greater.
6
From Intel® AMT Release 2.5 to 8.1, LMS functions were performed by the User Notification Service (UNS).
Depending on the configuration path chosen, you may not need to install the Intel® SCS components,
RCS and Console, or a database.
The Intel Management Engine Interface (Intel® MEI) driver provides the software interface to the Intel®
AMT device and is installed as a system device.
The Intel Local Manageability Service (LMS.exe) is a Windows service installed on an Intel® AMT
system that has Intel® AMT Release 9.0 or greater. LMS enables local applications to send requests
and receive responses to and from the Intel Management Engine, via the Intel® MEI. From Intel® AMT
Release 2.5 to 8.1, LMS functions were performed by the User Notification Service (UNS).
The Intel Management and Security Status (IMSS) provides status information to the local user about
Intel® AMT including messages and an indication that Intel® AMT is configured.
Serial-Over-LAN (SOL) device installed as a COM port.
The Intel Management Engine software has a separate version for every Intel® AMT generation (6.x,
7.x, 8.x, 9.x etc.). The Management Engine 10.x software also supports 9.x and 8.x generations.
The RCS is used to remotely configure and maintain (when a Database is available) Intel® AMT systems and is a
Windows based service (RCSServer) that runs on a server in the network.
The RCS and console components should be installed and configured and an Intel® AMT provisioning
certificate purchased if you want to do any of the following:
Manual Configuration
Host-based Configuration (Client Control Mode)
For the purposes of this guide, Intel® SCS will be installed in Database Mode with the Remote Configuration
Service (RCS) and console installed locally. In this mode, the RCS does not store data about the Intel® AMT
systems. Configuration and maintenance tasks can only be done using the Configurator. More information is
available in “Setting up the RCS” and “Selecting the Type of Installation” sections within the Intel® SCS User
Guide.
1. From the RCS directory run the executable IntelSCSInstaller.exe. The Welcome panel of the Intel®
SCS Installer window appears. Click the Next button.
2. Select I accept the terms of the license agreement and click the Next button. The Select
Components panel appears.
Intel® SCS 12.0 defaults to TLS 1.1 to encrypt communication to Intel® AMT. TLS 1.0 has
been deprecated as the security protocol for Intel® SCS communication with Intel® AMT, as
the TLS 1.0 protocol has identified security vulnerabilities, including CVE-2011-3389 and
CVE-2014-3566. Intel® SCS allows users to enable TLS 1.0 protocol support for backwards
compatibility with legacy Intel® AMT platforms. For this example we have left TLS 1.0
support disabled. Please reference the Intel® SCS User Guide for additional details.
Click Next and the installer will test the SQL connection.
7. The installer will detect if there is an Intel® SCS database present. In this example, there isn’t one
installed and the installer will create the database. Select Create Database to continue.
9. Click the Next button. The Confirmation panel appears, showing information about the selections
made. The default installation folder is C:\Program Files(x86)\Intel\SCS12. If you want to change the
location, type a new path in the Installation Folder field or click the Browse button to select one.
11. Click the Next button. The Completed Successfully panel appears.
4.1 Introduction
This SSL certificate, commonly referred to as the Remote Configuration Certificate (RCFG) or AMT provisioning
certificate is used to establish initial trust between the RCS and Intel® AMT systems when initiating client
configuration into Admin Control Mode.
Dependent upon Intel® AMT Release, the firmware contains root certificate hashes from a number of
commercial Certificate Authorities including GoDaddy*, Comodo*, and Entrust*. From Intel® AMT Release 7.0,
you can add your own root certificate hashes into the Intel® MEBX (up to 10 custom SHA1 hashes). Additional
details on supported Root Certificate Hashes is available in the Intel® AMT Implementation and Reference
Guide at https://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide/WordDo
cuments/rootcertificatehashes.htm
To support Remote Configuration using Public Key Infrastructure (PKI), a suitable SSL certificate must be
purchased from one of the commercial SSL certificate providers, whose hashed root certificates are
embedded within Intel® AMT firmware.
Host-Based Configuration (HBC), supported from Intel® AMT Release 6.2 or Manual Configuration do
not require an AMT provisioning certificate and HBC remains the recommended option, if mandatory
user consent requirement for redirection operations is acceptable.
This section provides simple, step-by-step instructions to obtain an Intel® AMT provisioning certificate
suitable for use with remote configuration of Intel® AMT systems using freely available OpenSSL tools.
Figure 4-1 illustrates the necessary steps and overall flow to support this process, which consists of the
following five high-level steps:
1. GENERATE a certificate signing request (CSR) suitable for use by Intel® AMT. This step includes
creating the public and private keys.
2. SUBMIT request for a SSL certificate from a commercial Certificate Authority.
3. ISSUE a signed certificate, once procedural steps required by the CA have been completed.
4. MERGE the signed certificate with your private key.
5. INSTALL the resulting certificate into the RCS Local Machine certificate store.
For evaluation purposes you can add your own root certificate hash into the Intel® MEBX. However
this is not recommended for large scale deployments and is not covered in this guide. Before
pursuing this approach consider Host-Based Configuration.
Additional information is available in the Intel® SCS User Guide under the section “Setting up Remote
Configuration.”
Start
Modify Certificate
Signing Request
Configuration File
(AMT.CFG)
CA Signed Certificate
Submit CSR to CA (AMTCERT.PEM)
2. SUBMIT 3. ISSUE
(AMTCSR.PEM)
Alternative guides are available on how to purchase and install certificates below. For more information,
please go to our Intel Active Management Technology Implementation website.
4.2 Prerequisites
Download the OpenSSL tools for Microsoft Windows and copy into a folder on a Windows client.
Select the pre-compiled Win32/64 libraries without external dependencies and choose download the
zip file.
Create two batch files, MAKEAMTCSR.BAT and MAKEPFX.BAT using the reference section below and save
these into the OpenSSL folder.
4.3 Reference
MAKEAMTCSR.BAT
openssl req -config AMT.CFG -new -keyout AMTKEY.PEM -out AMTCSR.PEM -days 365
MAKEPFX.BAT
openssl pkcs12 -export -in AMTCERT.PEM -inkey AMTKEY.PEM -out AMTCERT.PFX -name "Intel(R) RCFG
Certificate" -password "pass:P@ssw0rd"
This example includes a password: “P@ssw0rd” to protect the private key. Ensure you make a note of
this you change it.
AMT.CFG
# Sample OpenSSL configuration to generate a certificate request
# (CSR) for an Intel(R) AMT(tm) Provisioning Certificate
RANDFILE = ./.rnd
[ req_distinguished_name_section ]
C = US
ST = California
L = San Francisco
O = My Company Inc
OU = Intel(R) Client Setup Certificate
CN = provisionserver.mydomain.com
emailAddress = administrator@mydomain.com
[ req_extensions_section ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature
extendedKeyUsage = critical,serverAuth,2.16.840.1.113741.1.2.3
subjectKeyIdentifier = hash
# subjectAltName = @alt_name_section
# When applying for a Unified Communication Certificate (UCC),
# uncomment the entire [ alt_name_section ] section and set DNS.x
# entries to match additional domains. DNS.x entries can be added
# or removed. The DNS domain portion of DNS.x entries must be
# owned by the organisation requesting the certificate
# [ alt_name_section ]
# DNS.1 = provisionserver.mydomain.co.uk
# DNS.2 = provisionserver.mydomain.co.fr
The CSR contains your certificate-application information, including your public key. When you generate the
CSR, you also create your public/private key pair which is used for encrypting and decrypting transactions.
1. Use the AMT.CFG example in the above reference section to create your own configuration file
AMT.CFG in the OpenSSL folder.
2. Edit the section [req_distinguished_name] and modify the C, ST, L and O fields. Set these to the
appropriate country, state or province, site, company name.
The company information must match the government or registered commercial company
information.
3. Edit the CN field to correctly match the hostname and domain name of the server where Intel RCS is
running. This is the fully qualified domain name (FQDN).
Do not change the OU field, this contains the appropriate OU that traces to a CA that has a
root certificate hash stored in the Intel® AMT device. The exact text string in English must be
used, in the same case, without a trailing period. OU = Intel(R) Client Setup Certificate
When requesting a SSL certificate from your CA you will be prompted for the CSR by the CA website. Cut and
paste the contents of AMTCSR.PEM into the CA website dialog box. If you are asked what type of software you
are using the certificate with, use Other. If you are asked for Cryptographic service provider, select Microsoft
Strong Cryptographic Provider.
You should receive a signed certificate from the CA which needs to be merged with the private key
AMTKEY.PEM so this can be loaded it into RCS’s Local Machine certificate store. To carry out this process
follow these instructions:
1. Copy the signed certificate from the CA into a file called AMTCERT.PEM. The file should have a
format which starts with the string '---BEGIN CERTIFICATE-' and ends '-END CERTIFICATE---'.
2. Ensure AMTCERT.PEM is in the same directory as the private key AMTKEY.PEM.
You now have a SSL certificate suitable for use with Intel® AMT and remote configuration that is in a format
suitable for loading into the certificate store of your Microsoft Windows server running the Intel RCS.
1. Retrieve the Root and any Intermediate certificates, according to the instructions of the certificate
vendor. For example it may be possible to download these from their website or they may email
them. Save the certificates in .CER format.
2. Locate each stored certificate, right-click and select Install certificate. The certificate manager Import
Wizard opens.
3. Click the Next button.
4. Select Automatically select the certificate store based on the type of the certificate. Click the OK
button.
5. Click the Next button then click on the Finish button.
6. When prompted if you want to add the certificate to the root store, click the Yes button.
Since you cannot “logon” using the Network Service Account, Intel has developed the Remote Configuration
Service Utility (RCSUtil.exe). This is a Command Line Interface (CLI) used to make RCS setup tasks easier
including installing certificates and applying Windows Management Instrumentation (WMI) permissions to
user accounts that require to access the RCS.
The RCS Utility (RCSutils.exe) is located in the Utils folder within the Intel® SCS download package and can be
run from a command line prompt or using a batch file.
You must run the RCS Utility on the computer where the RCS is installed and running.
1. Copy the file AMTCERT.PFX into the Utils directory, you will also need the password that protects the
private key (P@ssw0rd).
2. Open a command prompt on the Intel® AMT system, using Run as Administrator.
For systems running Microsoft Windows 7* or newer operating systems, this executable
must be opened with elevated privileges due to interaction with a kernel level driver. This is
done by right-clicking on the executable and selecting Run as administrator.
The RCS Utility uses the Windows Task Scheduler to impersonate the Network Service
account. To do this, a task is created and run immediately. The results from this task cannot
be sent to the console screen so the log option is used.
You will see your AMT Provisioning Certificate with its thumbprint (hash) listed. This is required to
validate the certificate and signing chain for remote configuration in the step below.
To support remote configuration using PKI all the Intel® AMT systems to be provisioned should be directly
connected to the enterprise via the wired LAN interface (not via VPN or using an Ethernet dongle).
This presents problems for some of the latest Intel vPro™ Platforms that do not include an onboard wired LAN
interface, only a wireless interface.
Intel® AMT Release 9.x systems cannot be configured entirely remotely, however Intel® AMT Release 10.x and
newer systems fully support remote configuration. The configuration of these LAN-less Platforms is covered in
the Wireless section.
2. Open a command prompt on the Intel® AMT system, using Run as Administrator and change to the
Configurator directory.
3. Run the following command:
ACUconfig.exe ConfigViaRCSonly <RCS Server IP Address or FQDN> <profilename>
4. When the Intel Management and Security (IMSS) toast notification appears, the Intel Management
Engine (Intel® ME) configuration is complete.
The screen below shows the system is now configured in Admin Control Mode.
2. From the SCS console system, open a web browser and enter the URL for the Intel® AMT System:
http://FQDN:16992
If the Intel® Active Management Technology webpage appears, the managed client is configured.
4. Enter the default user “admin” and the password set using the profile: P@ssw0rd.
5.1 Introduction
This is an optional feature that provides the capability for Intel® AMT to be integrated with the security
infrastructure of your network's Microsoft Active Directory (AD). This integration includes the ability to:
Support Kerberos with Microsoft Windows domain user and group accounts when interacting with
Intel® AMT systems
Use the 802.1x protocol for wired and wireless access
Use End-Point Access Control (EAC)
802.1x and EAC are beyond the scope of this deployment guide. For more information refer to the
Intel® SCS User Guide.
When AD integration is enabled, during configuration Intel® SCS will send a request to create a Computer
object for the Intel® AMT system to support Kerberos authentication. By default, the AD Computer object is
created with a User Principal Name (UPN) that matches the hostname of the Intel® AMT system as defined in
the Intel® SCS configuration profile and the operating system (with $iME appended). Each Intel® AMT system is
recorded in the Active Directory database as an Intel® AMT object and defined as an AD Computer object with
the version of Intel® AMT linked to it. AD uses the Intel® AMT device password to create the device secret.
During unconfiguration of AMT a request to delete the AD Computer object is performed.
Prior to Intel® SCS version 9.1 this object could be detected as a User Object by some applications
that calculate their license fee based upon the number of User Objects in AD. Changes in Intel® SCS
9.1 ensured the object created is always detected as a Computer Object.
The Intel® AMT system will register and authenticate with Active Directory after it has booted and provides six
Service Principal Names (SPNs) for the six services it provides, as shown in Table 5–1.
SPN Service
HTTP/FQDN:16992 SOAP over HTTP
Deleting the AD object of a configured Intel® AMT system causes Kerberos authentication to fail and
blocks access to Intel® AMT using Kerberos admin user accounts. If you also do not know the
password of the Digest admin user, this will make it impossible to remotely access or reconfigure
Intel® AMT.
5.2 Prerequisites
To implement Active Directory integration the Intel® AMT system must be joined to the domain and have an
associated Computer object.
For additional detail refer to the Intel® SCS User Guide section “Defining Active Directory Integration.”
AMT Administrators : Members of this group have full administration access to all AMT features over both
interfaces (out of band and local) Associate the AMT “PT Administration” Realm with AD group members
including “Domain Admin”, “Domain Computers” and the Computer object representing the Network Service
account running the RCS with the access type set to “Both.” To add the Computer object this you must select
the object type to “Computers.”
Service Desk: Access is limited to the following Realms over both interfaces to support the majority of
standard Intel® AMT use cases:
Redirection
Hardware Asset
Remote Control
Event Manager
General Info
Event Log Reader
If the AD OU was not created in the previous section and no create/delete rights were granted to the
OU as described in the previous section, do not select Active Directory Integration. Digest User can
only be used for authentication.
In the ACL Window, click the Add button, select Active Directory User/Group and click the Browse button to
one of the AD groups previously created i.e. AMT Administrators and select Both to set the Access Type to
access all AMT features over both interfaces (out of band and local). By selecting PT Administration members
of the AMT Administrators group will have full access to all AMT capabilities on the Intel® AMT system. Click
OK. Repeat for other AD groups who will require access.
If you are using Host-Based Configuration, then export the profile to an XML file from the Intel® SCS
Console, copy to the Intel® AMT system, and run the following command:
If the Intel® Active Management Technology webpage displays, the managed client is configured.
If you are logged as a Domain User who is a member of one of the groups then clicking Log On will provide
authorized access to Intel® AMT.
When testing against the Intel® AMT WebUI using Microsoft Internet Explorer, a change to the
Windows registry may be required to enable Kerberos authentication over non-standard HTTP ports
such as 16992/16993.
6.1 Introduction
Transport Layer Security (TLS) is an optional feature that helps secure management traffic between the Intel®
AMT system and RCS and integrates with the Public Key Infrastructure (PKI) of an organization. Its
implementation should be evaluated based upon your environment and security policies. A Certificate
Authority (CA) is necessary if you want to configure any of these settings in an Intel® AMT system:
During configuration of the Intel® AMT system the RCS sends a request to the CA to generate a certificate and
places this into the firmware of the Intel® AMT system. The RCS can request certificates from
For additional detail, refer to the Intel® SCS User Guide section “Preparing the Certification Authority.”
6.2 Prerequisites
Intel® SCS supports the Standalone and Enterprise versions of Microsoft CA. The Microsoft PKI may have a
hierarchy of CAs, with subordinates and a root. This is beyond the scope of this guide.
Certificate Revocation Lists (CRL) are not covered in this section and Intel RCS does not use the
original CRL file supplied by the Certification Authority. Additionally CRL is only available to Intel®
AMT when you configure mutual TLS authentication which is beyond the scope of this deployment
guide. For additional detail refer to the Intel® SCS User Guide section “Preparing the Certification
Authority.”
1. From your Certificate Authority, run the Microsoft Management Console with the Certificate
Templates plug-in.
3. In the right-pane, right-click the Web Server template and select Duplicate Template.
4. The Duplicate Template Window asks if you want to create a certificate template for Windows Server
2003 Enterprise or for Windows Server 2008 Enterprise. Select Windows Server 2003 Enterprise
and click OK.
Only version 2 certificate templates are supported. Version 3 certificate templates (Windows
Server 2008) cannot be selected in the configuration profile.
3. Click the Request Handling tab and ensure the Minimum key size field is not assigned a value higher
than 2048, which is the maximum key size supported by Intel® SCS. Additionally ensure the Allow
private key to be exported check box is selected.
2. Click Add to add the SCS server computer account and check Allow Read and Enroll permissions for
this group. Click on the OK button.
3. At the CA Console, right-click the CA, in this example vProLab CA, and click Properties.
4. Select Next, then the method for creating the certificate that will be installed in the Intel® AMT system
from the drop-down list. Default is Request certificate from Microsoft CA.
5. If a Microsoft Enterprise CA was used and you configured access as described earlier, the pull down
list will automatically populate with registered CA’s for your environment. Intel® SCS automatically
detects if the selected CA is a Standalone root CA or an Enterprise root CA.
6. From the Server Certificate Template drop-down list, select the template that you previously defined
for TLS, i.e., AMTServer, as shown below.
7. Leave System Settings as previously defined in the Install and Validate the Certificate section and
click the Finish button.
If you are using Host-Based Configuration then export the profile to an XML file from the
Intel® SCS Console, copy to the Intel® AMT system and run the following command:
2. When the Intel Management and Security (IMSS) toast notification appears, configuration is complete.
7.1 Introduction
New innovative form factors and designs for the Intel vPro Platform typically have no on-board wired LAN
interface due to requirements around size, weight and thickness. These LAN-less platforms present challenges
if you want to configure Intel® AMT into Admin Control mode and they need to be handled differently to
systems that have a built-in wired LAN interface. This is due to the Remote Configuration using PKI only being
performed via Out of Band using the on-board wired LAN interface.
Traditionally this has meant that mobile platforms can only be remotely configured if in addition to the WLAN
interface, they also have an onboard wired LAN interface that is directly connected to an organizations
network (not via VPN). Alternatively you can configure LAN-less platforms into Client Control mode using the
host-based configuration approach, with the mandatory user consent requirements.
Intel® SCS, in combination with Intel® AMT Release 10 and newer, now supports Remote Configuration using
PKI (RCFG), with some pre-requisites and the flow chart in section 4.2 details the approach.
Configuring LAN-less Systems via Manual mode is another option that is not covered in this
deployment guide. Please see the Intel® SCS User Guide for additional detail.
7.2 Prerequisites
Configuration of Intel® AMT over WLAN requires a Wi-Fi profile to be setup which is applied during
configuration. The profile provides information including network keys, encryption and authentication
protocol settings and other security elements to authenticate against an organizations wireless infrastructure.
Additional requirements include:
The Intel® AMT system share its IP address with the host operating system and is configured to use
DHCP.
WLAN infrastructure that supports WPA or WPA2 wireless security.
The total number of Wi-Fi setups including 802.1x that can be configured depends on the version of Intel®
AMT. For 8.x and lower, a maximum of 15. AMT 9.0 and higher, a maximum of 7.
Configuration of 802.1x Wi-Fi setups is beyond the scope of this deployment guide. Please reference
the Intel® SCS User Guide for additional detail.
If the client platform has an external switch to enable or disable WLAN, the switch must be in the ON position
for Intel® AMT over wireless to be configured and to operate. Once enabled, only a full un-provision or un-
configuration of the AMT firmware will disable the setting.
1. Enter the Intel® MEBX using the appropriate method dependent upon the OEM, e.g., BIOS menu,
<CTRL-P> during system boot, etc.
2. If this is the first time the Intel® MEBX has been accessed, enter the default Intel® ME password
(admin). You will then be prompted to set a new Intel® MEBX password.
5. Enter the PKI DNS Suffix for your domain. This will be the value supplied by your organization’s DHCP
server Option 15.
6. Enter the PKI DNS Suffix for your domain. This is the value supplied by your organization’s DHCP
server Option 15.
7. Press the Esc key to save and exit the Intel® MEBX menu.
When un-configuring Intel® AMT systems, DO NOT perform a full un-provision on a LAN-less
system as the PKI DNS Suffix value will be deleted.
The output file looks similar to below and the required values are:
Value Description
WiredLANExists For LAN-less systems, this value will be “False.” The value can also be “True”
assuming the next values are configured.
AMTVersion The version of Intel® AMT.
AMTPKIDNSSuffix The value defined for the PKI DNS Suffix as defined in the Intel® MEBX
Ensure that you do NOT select the check box named Put locally configured devices in Admin
Control mode.
3. When the Intel Management and Security (IMSS) system tray applet dialog appears, configuration of
the Intel Management Engine (Intel® ME) into Client Control mode is complete. Reboot if required
(AMT 10 only)
2. After the command has completed successfully, Intel® AMT will be configured in Admin Control mode
and full access to Intel® AMT capabilities can be performed over the WLAN as configured in the
profile.
3. Optionally, you can now use the ConfigViaRCSOnly command of the Configurator to reconfigure the
system against existing profiles on the Intel RCS.
8.1 Introduction
The factory default state for Intel® AMT firmware is un-configured. This ensures un-authorized users cannot
access the manageability and security features of Intel® AMT. The three main objectives of the setup and
configuration process are:
The decision tree in Figure 8-1 provides a simple flow to aid in the selection of a configuration method, all of
which result in a configured Intel® AMT system.
Start
NO NO
YES YES
YES YES
NO NO
YES YES
Manual Configuration
Manual Configuration (USB)
(Add PKI DNS Suffix)
CONFIGAMT
Dependent upon AMT Release, the Intel® AMT firmware contains root certificate hashes from a number of
commercial Certificate Authorities including GoDaddy, Comodo, and Entrust. You can also add your own root
certificate hash into the Intel® MEBX.
To support Remote Configuration using PKI, an SSL certificate from one of these embedded hashed root
certificates must be purchased from a commercial SSL certificate provider. This is often referred to as a
Remote Configuration (RCFG) or Provisioning certificate and is used by the RCS to authenticate with Intel®
Additional information is available in the Intel® SCS User Guide, in the “Configuration Methods and Intel® AMT
Versions” and “Control Modes” sections.
Run the Configuration Utility GUI on an Intel® AMT system to configure Intel® AMT.
Create XML profiles that can be used to configure Intel® AMT on multiple systems using the
Command Line Interface (CLI) of the Configurator. The Configurator will configure Intel® AMT with the
settings in the profile.
1. Download the entire Intel® SCS package from http://intel.com/go/scs.
2. Extract the ACU_Wizard directory, as selected in the example below and copy to the Intel® AMT
client.
3. On the Intel® AMT system, navigate to the ACU_Wizard directory and select the executable
ACUWizard.exe.
For systems running Microsoft Windows 7* or newer operating systems, this executable
must be opened with elevated privileges due to interaction with a kernel level driver. This is
done by right-clicking on the executable and selecting Run as administrator.
5. Select “Configure via Windows.” In the bottom right hand corner you will see that Intel® AMT is not
configured on this system. Additional system details can be found by clicking the System Info…
button.
6. For new Intel® AMT systems the default password is Admin. Enter a new password and confirm. The
existing configuration details should suffice.
7. The XML profile that is created as part of the configuration process contains sensitive data and the
resulting file will be encrypted with a password using the following :
Encryption algorithm: AES128 using SHA-256 on the provided password to create the key
Encryption mode: CBC
Initialize Vector (IV) is the first 16 bytes of the Hash
NOTE: You can use the SCSEncryption.exe utility located in the Utils folder of the Intel®
SCS download package to encrypt and decrypt files using the same format used by Intel®
SCS. For more information, refer to the CLI help of the SCSEncryption.exe utility.
8. Click the Configure button and Intel® AMT will begin configuration.
9. When the Intel Management and Security (IMSS) toast notification appears, the Intel Management
Engine (Intel® ME) configuration is complete.
For systems with AMT Release 10.0 the following configuration notification will also be shown.
For troubleshooting purposes, you can locate this operation in the ACU_Wizard directory.
Additionally, you’ll find the encrypted file, profile.xml located in the same directory, which is
protected with the password entered in step 7.
3. Open a command prompt on the Intel® AMT system, using Run as Administrator.
4. Change to the Configurator directory and run the following command on the Intel® AMT system
(where /DecryptionPassword is the password entered when creating the original profile):
ACUconfig ConfigAMT profile.xml /DecryptionPassword P@ssw0rd
5. When the Intel Management and Security (IMSS) toast notification appears, the Intel Management
Engine (Intel® ME) configuration is complete.
For troubleshooting purposes, you can locate the log corresponding with this operation in the
ACU_Wizard directory. Additionally, you’ll find the encrypted file, profile.xml located in the same
directory, which is protected with the entered password.
Once a single Intel® AMT system has been configured and functionality validated, then the
configuration directory containing the files ACU.DLL, ACUConfig.exe and the XML profile can
be packaged up and using the above command can be distributed to all Host-Based
Configuration capable Intel® AMT systems within the target environment.
This option is only available on Intel® AMT systems with AMT Release 4.0 and higher.
Detailed instructions for performing Manual Configuration are provided in the Intel® SCS User Guide. The
following is a summarized version.
1. From the Configuration Options window, select Configure via USB key.
The password must be at least 8 and at most 32 characters long, must have at least 1 digit
and 1 non-alphanumeric characters and both lowercase and uppercase Latin letters. The
underscore (_) character is counted as alphanumeric.
4. (Optional) Select Display advanced settings to view or edit the default settings that the
Configuration Utility will define for this system.
5. Power Settings: Defines in which power states (of the host system) the Intel® AMT device will operate.
6. The previous image shows the recommended setting. When the system is connected to power, all
Intel® AMT manageability features remain available in any of the system power states. If set to “Host
is On (S0)” then Intel® AMT manageability features are only available only if the operating system is
up and running.
Network Settings: The recommended default setting is to configure the Intel® AMT device
with the hostname and the domain name defined in the operating system and to use the
Dynamic Host Configuration Protocol (DHCP) server to configure the IP address of the
device.
Redirection Settings: These settings are only shown for systems with Intel® AMT 6.0 and
newer.
7. Keep the default settings of Enable KVM Redirection to support KVM redirection and Allow IT to
change user consent setting which allows to the user consent setting to be set remotely.
9. Click the Next button and a message is displayed warning that the USB key will be formatted.
10. Click the Yes button and the Configuration Utility creates a configuration file (Setup.bin) on the USB
key. When complete, the USB Key Ready window opens with information about the success or failure
of the process.
11. Click the Finish button and the Configuration Utility closes.
12. Ensure that only the USB key that you created is connected to the target Intel® AMT system and
reboot.
13. During the reboot, a message is shown on the screen:
14. Type “Y” and press <Enter>. The settings are put in the device and a new message is shown on the
screen:
15. Remove the USB key and press a key to continue booting. The Intel® AMT system is now configured
and can be accessed remotely.
After configuration, all data in the Setup.bin file on the USB key is deleted, however the file
is not deleted. You must repeat all previous steps for each system that you want to configure
using a USB key.
The Intel® AMT Configuration Utility allows you create profiles with configuration settings for multiple
systems. Select “Create Settings to Configure Multiple Systems” and the Profile Designer opens. Select Tools >
Prepare a USB Key for Manual Configuration.
1. Extract the ACU_Wizard directory, as selected in the example below and copy to the Intel® AMT
system.
6. Once complete, Intel® AMT will be unconfigured and un-provisioned. Click the Finish button.
The Intel Management and Security Status toast notifies you that the Intel® ME is Unconfigured.
9.1 Introduction
Discovery provides detailed information on current configuration states, specific firmware versions, features
and capabilities for Intel® AMT platforms systems within your environment and helps determine the most
appropriate configuration approach. Using Intel® SCS utilities, data can be gathered about Intel® AMT and the
host platform and saved to an XML file on the system and/or written to the registry. Alternatively an option
exists to send this data to the Remote Configuration Service (RCS) and save it in the database (if configured).
Data is collected from all systems, even those without Intel® AMT. Intel® SCS tries to acquire data
about Intel® AMT using the Intel Manageability Engine Interface (Intel® MEI) driver. If this driver is not
installed and/or enabled, data is taken from the BIOS. If the manufacturer has not installed the
correct BIOS in the platform, this can cause incorrect values in the data collected.
3. On the Intel® AMT system, open a command prompt to the Configurator directory.
For systems running Microsoft Windows 7* or newer operating systems, this must be opened
with elevated privileges due to interaction with a kernel level driver. This is done by right-
clicking on the executable and selecting Run as administrator.
In the above example, the output of the ACUconfig.exe Status command shows that the Intel® AMT version is
10.0.30, the system is un-configured and supports Host-Based Configuration.
When additional information is required across multiple systems in the environment, the SystemDiscovery
command may be preferred as it can optionally capture information to a local file, Windows registry or send
data to the Remote Configuration Service (RCS).
ACUconfig.exe SystemDiscovery
This creates a local XML file and saves the data to the registry. The location for 32-bit and 64-bit Windows
operating systems is:
The resulting data provides an in-depth view of the Intel® AMT platform in a format which can be centrally
collected via custom inventory solutions. Figure 3 shows the resulting XML file located in the Configurator
directory and a preview of the file contents. The combined information is helpful with initial configuration and
when troubleshooting is required.
For additional detail, refer to the Intel® SCS User Guide section “Discovering Systems” and the “Intel® SCS
Discovery Utility” documentation, as detailed above.