Jump to content

Talk:Intel Active Management Technology

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 109.193.182.33 (talk) at 00:58, 11 December 2014 (General Stuff). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.

Short page

This is a very short page and does not even begin to address the subject right now, particularly it is missing any mention of possible abuses of this system. I admittedly know very little about iAMT at the moment, but i have seen references to out of band management which historically suggests communican outside of the network itself.

I will try to read over intels papers about this technology and improve this article.

Mrsteveman1 15:25, 2 June 2007 (UTC)[reply]

New features for 2.5 version?

What about adding a few words about new features? I have read about them here and some of them, up to my mind, are interesting enough to be written about:

  • - NIC based TCP/IP filters configurable remotely
  • - Handy magic bypass for TCP/IP filters
  • - Remote BIOS updates over the network
  • - Remote IDE redirection, as in boot off CDROM over the network
  • - Persistent storage even if you change hard disks
  • - Authentication can be done on Kerberos.
  • - Built in web interface on every machine (port 16992, or 16993 if HTTPS is setup)
  • - handy well documented SDK for building whatever you need to interact with this

Hope someone who knows more about all this will add something to the article. Gaz v pol 15:19, 12 June 2007 (UTC)[reply]

Criticisms and concerns

Anyone up to adding a section of criticisms and concerns, as mentioned on an OpenBSD mailing list? I think they'd be a useful addition to this stub. I don't understand AMT enough to do so. --Tene 15:43, 28 June 2007 (UTC)[reply]


As of Oct. 2010, Intel is up to, I think, Version 6 of AMT for certain platforms. I found the page because I just bought a laptop that has version 4. The potential for abuse/snooping by the laptop manufacturers is one of the main things I wanted to find out, so I second the request for a criticisms/concerns section to the article. I don't understand AMT authentication enough to know if my laptop comes with some "certificates" already installed by the manufacturer, in which case they could access the laptop without my knowledge.

That said, I don't find the article to be overly "advertisement-y" -- it was the best description of what AMT does that I was able to find anywhere, including on Intel's and Lenovo's websites. A little more description of what it's actually used for, and HOW (as opposed to how it works internally) would complement a section with some criticism.

RandySteer (talk) 21:46, 23 October 2010 (UTC)[reply]


General Stuff

There is no question that Intel AMT is like a corporate agent in hardware, but it is not as powerful as software agents. For example, it can't be used to do bad things like key logging, etc. Security of Intel AMT was reviewed quite a bit, so unless you have correct authentication, it's going to be really difficult to use it as a back door for anyone except the real administrators. Since I work with Intel AMT quite a bit, you guys will have to keep me honest, I don't want to edit the page too much, this said, I have plenty of criticism I could throw at it. As for new features, 2.5 only adds wireless support over 2.0 and is only available in laptops. All the features I see above for 2.5 are also in 1.0 and 2.0 Ylian 17:20, 12 July 2007 (UTC)[reply]

Well, it's nice to have your word for it, but experience with all similar tehcnology sugegsts that these things are certainly possiblöe, whether officially, documented, supported, or not. Regardless, if you could source this, you cna edit wikipedia, as long as you provide suitable references. It's lunlikely that you cna source this, because it's impossible to prove beyond hearsay.109.193.182.33 (talk) 00:58, 11 December 2014 (UTC)[reply]

Fair use rationale for Image:Intel AMT 2.0 web page - memory.jpg

Image:Intel AMT 2.0 web page - memory.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot (talk) 23:09, 22 December 2007 (UTC)[reply]

Management Engine

It would probably be better to have a page about Intel's Management Engine (ME) and how it relates to semiconductor products (available on which chipsets, etc.) and firmware solutions (software modules like QST, AMT, etc.). This page could then be simplified to cover just AMT or Intel's management solution (rumor has it the name will change to AT6 for next generation vPro mobile (Calpella) and desktop (Piketon) platforms based on PCH (Ibex Peak)) as a lot more than just AMT goes into the ME firmware stack. 64.122.14.55 (talk) 14:39, 22 April 2008 (UTC)[reply]

Which channel?

Access to the Intel AMT features relies on a hardware-based OOB communication channel.

  • Which hardware channels can be used? Only the common Ethernet interface already present on the mainboard?

--Abdull (talk) 14:19, 28 August 2008 (UTC)[reply]

Comparison with HP's iLO ?

Any idea how this relates to (for example), HP's iLO features ? Or whether the use of AMT is free or for a fee ? For example, can I use that at home to remotely shut down or control my daughter's machine ?

-- Christophe 20 July 2009. —Preceding unsigned comment added by 94.111.109.233 (talk) 20:49, 19 July 2009 (UTC)[reply]

intel actively blocking support for windows server systems

I have had the frustrating experience of getting an intel AMT equipped motherboard (Q45) for a server and then finding out that not only are there no explicit drivers for windows server 2003, but because of the way the drivers for XP are constructed (most XP drivers work fine on Server 2003) it's not possible to install them on server 2003. Intel seems to be actively blocking use of Q45 and related AMT products in combination with windows server OS's. Should deserve a mention in the article, no? —Preceding unsigned comment added by 85.145.116.131 (talk) 23:23, 28 August 2009 (UTC)[reply]

Finding this page

I wanted to look up iAMT 4.0, typed "iamt" in the search box, got redirected to Standard Alphabet of Mahal Transliteration, which is obviously the wrong place. Somebody, fix that please. —Preceding unsigned comment added by 71.191.191.184 (talk) 02:53, 6 November 2009 (UTC)[reply]

BIOS rootkit?

This is misleading and sensationalist. AMT's point is to provide control of the system independent of any software that runs on the host (x86) CPU. It does so with special features built into the chipset. Certainly there's some software interaction with ACPI and other subsystems, but that's not the defining part of it. AMT is largely a hardware feature, and should be described likewise. — Preceding unsigned comment added by 92.224.150.182 (talk) 20:44, 7 February 2012 (UTC)[reply]

I've reverted those edits as clearly violating NPOV. The Rootkit page clearly states that a rootkit is a malicious piece of software. Absent any reliable source claiming this technology is a rootkit, it reads as inflammatory opinion. JSB73 (talk) 08:41, 27 February 2012 (UTC)[reply]
This technology is not and cannot be a rootkit. Prior the AMT can be used, it must be provisioned. It must be activated and configured (usually) in several places - BIOS and MEBx or over a corporate network (that still requires prior activation in BIOS). Plus, it will only work in the corporate network (e.g. W/LAN, VPN). Only in CIRA mode (see CIRA page) AMT is able to work over the Internet. CIRA is user initiated. In some cases CIRA could be configured to connect based on a timer or maintain a constant connect. However, it requires additional infrastructure to be deployed on the corporate side. This infrastructure is rarely used because it has serious stability issues. There were vulnerabilities in the early AMT versions (http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf) but they were fixed by Intel. — Preceding unsigned comment added by Vlsys1 (talkcontribs) 05:34, 20 July 2013 (UTC)[reply]

Long headings

The sub-section titles are awfully long. But is that a problem? --Mortense (talk) 17:02, 10 October 2013 (UTC)[reply]

Yes because most are spammy, making various claims without citations. Someone not using his real name (talk) 23:49, 25 February 2014 (UTC)[reply]

Merge vPro

Basically Intel has kitchen-and-sink brand called vPro that according to their marketing materials [1] includes lots of other stuff besides AMT. The only problem with having a separate wiki page about the vPro brand is that it does not seem wp:notable independently of AMT. As far as I can tell every journalist out there when writing something seemingly about vPro is mostly if not exclusively covering AMT [2] [3] [4]. The same goes for Intel's OEM partners, e.g. [5] [6] [7]. So I think the vPro brand deserves two-three paragraphs here but not an entirely separate page. Someone not using his real name (talk) 08:07, 26 February 2014 (UTC)[reply]

Even inside Intel, some more technically oriented pages like the FAQ accessible from the vPro page only talks about AMT/ME. Someone not using his real name (talk) 09:02, 26 February 2014 (UTC)[reply]

As a side-note here, Intel now has another brand that touts AMT, namely Small Business Advantage (SBA) [8] [9]. Hopefully we're not getting another wiki page for that, although frankly that might deserve a page more than vPro because SBA at least can be identified with the Intel software package that delivers it, whereas vPro is just a marketing name. Someone not using his real name (talk) 08:40, 26 February 2014 (UTC)[reply]

  • Oppose: While I totally agree that Intel AMT is one of the key components of Intel vPro (which is by the way just a marketing buzzword, but a widely used one), I'd say that Intel vPro still deserves a separate article. Though, some serious trimming should be applied to the Intel vPro article, so we end up with no repeated descriptions of Intel AMT. — Dsimic (talk | contribs) 18:35, 26 February 2014 (UTC)[reply]

Location of ME?

According to the Invisible Labs presentation, the ME is located in the MCH, but according to [10] it's in the PCH. Someone not using his real name (talk) 11:57, 26 February 2014 (UTC)[reply]

Well, Platform Controller Hub (PCH) chipset layout basically replaced Northbridge (MCH) and I/O Controller Hub (ICH) chipset layouts for newer Intel architectures (Intel 5 Series onwards), so both papers are right; ME is inside the chipset, whichever layout it uses. Just as a note, Invisible Labs' presentation is dealing with the Intel Q35 chipset, which employs a MCH layout. — Dsimic (talk | contribs) 18:47, 26 February 2014 (UTC)[reply]

Anything in layman words?

I'm a typical John Doe user installing a new motherboard in my home PC/HTPC. I came here to know what it's used for so as to decide whether or not I should install the Intel AMT/ME driver provided by the motherboard manufacturer on its drivers CD. Please can someone write such brief explanation? NOTHING on this page is clear enough for me... Thanks in advance.

Hello! Just as a note, Wikipedia is not a forum. However, for your personal needs in a HTPC usage scenario, security-wise it would be the best to disable AMT entirely in your motherboard's firmware (which is UEFI for new motherboards) setup utility. Basically, AMT allows remote out-of-band access to your PC, which is usually useful only when a PC is remotely managed in a corporate environment. — Dsimic (talk | contribs) 06:22, 24 November 2014 (UTC)[reply]