Talk:Intel Active Management Technology
This is a very short page and does not even begin to address the subject right now, particularly it is missing any mention of possible abuses of this system. I admittedly know very little about iAMT at the moment, but i have seen references to out of band management which historically suggests communican outside of the network itself.
I will try to read over intels papers about this technology and improve this article.
Mrsteveman1 15:25, 2 June 2007 (UTC)
New features for 2.5 version?
What about adding a few words about new features? I have read about them here and some of them, up to my mind, are interesting enough to be written about:
- - NIC based TCP/IP filters configurable remotely
- - Handy magic bypass for TCP/IP filters
- - Remote BIOS updates over the network
- - Remote IDE redirection, as in boot off CDROM over the network
- - Persistent storage even if you change hard disks
- - Authentication can be done on Kerberos.
- - Built in web interface on every machine (port 16992, or 16993 if HTTPS is setup)
- - handy well documented SDK for building whatever you need to interact with this
Hope someone who knows more about all this will add something to the article. Gaz v pol 15:19, 12 June 2007 (UTC)
Criticisms and concerns
Anyone up to adding a section of criticisms and concerns, as mentioned on an OpenBSD mailing list? I think they'd be a useful addition to this stub. I don't understand AMT enough to do so. --Tene 15:43, 28 June 2007 (UTC)
As of Oct. 2010, Intel is up to, I think, Version 6 of AMT for certain platforms. I found the page because I just bought a laptop that has version 4. The potential for abuse/snooping by the laptop manufacturers is one of the main things I wanted to find out, so I second the request for a criticisms/concerns section to the article. I don't understand AMT authentication enough to know if my laptop comes with some "certificates" already installed by the manufacturer, in which case they could access the laptop without my knowledge.
That said, I don't find the article to be overly "advertisement-y" -- it was the best description of what AMT does that I was able to find anywhere, including on Intel's and Lenovo's websites. A little more description of what it's actually used for, and HOW (as opposed to how it works internally) would complement a section with some criticism.
RandySteer (talk) 21:46, 23 October 2010 (UTC)
General Stuff
There is no question that Intel AMT is like a corporate agent in hardware, but it is not as powerful as software agents. For example, it can't be used to do bad things like key logging, etc. Security of Intel AMT was reviewed quite a bit, so unless you have correct authentication, it's going to be really difficult to use it as a back door for anyone except the real administrators. Since I work with Intel AMT quite a bit, you guys will have to keep me honest, I don't want to edit the page too much, this said, I have plenty of criticism I could throw at it. As for new features, 2.5 only adds wireless support over 2.0 and is only available in laptops. All the features I see above for 2.5 are also in 1.0 and 2.0 Ylian 17:20, 12 July 2007 (UTC)
Fair use rationale for Image:Intel AMT 2.0 web page - memory.jpg

Image:Intel AMT 2.0 web page - memory.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.
If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.
BetacommandBot (talk) 23:09, 22 December 2007 (UTC)
Management Engine
It would probably be better to have a page about Intel's Management Engine (ME) and how it relates to semiconductor products (available on which chipsets, etc.) and firmware solutions (software modules like QST, AMT, etc.). This page could then be simplified to cover just AMT or Intel's management solution (rumor has it the name will change to AT6 for next generation vPro mobile (Calpella) and desktop (Piketon) platforms based on PCH (Ibex Peak)) as a lot more than just AMT goes into the ME firmware stack. 64.122.14.55 (talk) 14:39, 22 April 2008 (UTC)
Which channel?
Access to the Intel AMT features relies on a hardware-based OOB communication channel.
- Which hardware channels can be used? Only the common Ethernet interface already present on the mainboard?
--Abdull (talk) 14:19, 28 August 2008 (UTC)
Comparison with HP's iLO ?
Any idea how this relates to (for example), HP's iLO features ? Or whether the use of AMT is free or for a fee ? For example, can I use that at home to remotely shut down or control my daughter's machine ?
-- Christophe 20 July 2009. —Preceding unsigned comment added by 94.111.109.233 (talk) 20:49, 19 July 2009 (UTC)
intel actively blocking support for windows server systems
I have had the frustrating experience of getting an intel AMT equipped motherboard (Q45) for a server and then finding out that not only are there no explicit drivers for windows server 2003, but because of the way the drivers for XP are constructed (most XP drivers work fine on Server 2003) it's not possible to install them on server 2003. Intel seems to be actively blocking use of Q45 and related AMT products in combination with windows server OS's. Should deserve a mention in the article, no? —Preceding unsigned comment added by 85.145.116.131 (talk) 23:23, 28 August 2009 (UTC)
Finding this page
I wanted to look up iAMT 4.0, typed "iamt" in the search box, got redirected to Standard Alphabet of Mahal Transliteration, which is obviously the wrong place. Somebody, fix that please. —Preceding unsigned comment added by 71.191.191.184 (talk) 02:53, 6 November 2009 (UTC)
BIOS rootkit?
This is misleading and sensationalist. AMT's point is to provide control of the system independent of any software that runs on the host (x86) CPU. It does so with special features built into the chipset. Certainly there's some software interaction with ACPI and other subsystems, but that's not the defining part of it. AMT is largely a hardware feature, and should be described likewise.