IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : Related Technologies and References - AMT and vPro

10/21/2013 1:22:24 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Windows Deployment Integration

Windows Deployment Services (WDS), which is included with Microsoft WAIK and Windows Server 2003 SP 2, is the new version of Microsoft Remote Installation Services (RIS). WDS, similar to RIS, is used to deploy Windows operating systems to client PCs without requiring an administrator present. WDS uses a hook into DHCP to allow PXE booting of PCs, and it leverages the Trivial File Transfer Protocol (TFTP) to network boot clients into WinPE and apply images to them.

Windows Deployment Services provides the following benefits:

  • Reduces the complexity of deployments. Also, the cost is built in to the licensing of Microsoft Windows Server.

  • Empowers users to reimage their own PC.

  • Allows network-based installation of Windows operating systems.

  • Supports the New PC scenario.

  • Supports mixed environments that include Windows XP/Vista and Microsoft Windows Server 2003/2008.

  • Provides an end-to-end solution for the deployment of Windows operating systems to client computers and servers.

  • Builds on standard Windows Server 2008 setup technologies, including WinPE, WIM files, and image-based setup.

When ConfigMgr 2007 shipped, it lacked a method of supporting the New PC scenario without IT administrators having to touch the ConfigMgr Administrator console for each PC they needed to image. ConfigMgr 2007 Release 2 (R2) resolved this issue. The issue was that an administrator could not image a PC using the New PC scenario without ConfigMgr first knowing about the PC. This meant that new PCs—either coming right from the OEM or without having had the ConfigMgr client on them—could not be imaged without a ConfigMgr admin going into the ConfigMgr console and creating the computer association.

Although PXE booting a PC and connecting to WDS works as expected, another issue arises when you introduce ConfigMgr into the equation. If the computer is unknown to the local ConfigMgr site, ConfigMgr will not respond to the PXE request. MDT offers a PXE filter, which hooks into WDS and ConfigMgr, allowing WDS to add PCs to the ConfigMgr database prior to ConfigMgr seeing the request.

Several other integration points exist between WDS/MDT and ConfigMgr. You can customize WinPE builds in the Deployment Workbench within MDT and then use them in ConfigMgr. You can use task sequences from the Workbench in ConfigMgr, but not without some modifications. Keep in mind the environment used for deployments in MDT does not exist in ConfigMgr, nor does a ConfigMgr client know about the MDT environment.

2. AMT and vPro

Intel Corporation, the world’s largest semiconductor company and inventor of the vast majority of computer processors in PCs today, has created a technology known as vPro. vPro is a set of features and logic built in to a PC motherboard, similar to how the MMX instruction set was built in Intel’s processors. Intel vPro is a combination of processor technologies, hardware enhancements, management features, and security technologies that allow remote access to the PC. This includes monitoring, maintenance, and management—all accomplished independently of the state of the operating system or power state of the PC. Intel vPro is intended to help businesses gain certain maintenance and servicing advantages, improve security, and reduce costs.

Intel systems that support vPro technology were originally branded with the logo depicted in Figure 1.

Figure 1. The original Intel vPro logo


Since the vPro release, Intel has updated its processors and motherboards, also known as system boards, to include vPro technologies. The Core 2 Duo or Quad processors are the most recognizable new processors released by Intel. Since these new technologies have come out, Intel has released a new logo in 2008 for vPro, which is illustrated in Figure 2.

Figure 2. The new Intel vPro logo


Intel has also created Active Management Technology, known as AMT. Intel AMT is a hardware-based technology for remotely managing and securing PCs that are “out of band.” Currently, Intel AMT is available in

  • Desktop PCs with an Intel Core 2 processor with vPro technology

  • Laptop PCs with a Centrino processor with vPro technology or a Centrino 2 processor with vPro technology

ConfigMgr 2007 with Service Pack 1 supports the AMT vPro clients, leveraging the integration between the Intel OOB Management console and the ConfigMgr console. Intel’s AMT and vPro technology make it possible for ConfigMgr to provision vPro clients without an OS deployed in scenarios where the client is down, the hard drive is corrupt, and so on—all while the PC is powered off.

Intel AMT is part of the Intel Management Engine, built in to PCs with Intel vPro technology. Intel AMT is built in to a secondary processor located on the motherboard. AMT is not intended for use by itself; it is intended for use with software management applications such as ConfigMgr. AMT performs hardware-based management over the TCP/IP protocol, which is unlike software-based management in ConfigMgr, because there is no dependency on the operating system. Examples of hardware-based management include DHCP (Dynamic Host Configuration Protocol), BOOTP (Bootstrap Protocol), and WOL (Wake On LAN).

Intel AMT includes hardware-based remote management features, security features, power-management features, and remote-configuration features. These features allow an IT technician to access an AMT PC when traditional techniques such as Remote Desktop or WOL are not available. Intel AMT operates on an independent hardware-based OOB communication channel, which operates regardless of whether the OS is running, functional, or even powered on. The hardware-based AMT features in laptop and desktop PCs include the following:

  • Encrypted, remote communication channel between the IT console and Intel AMT.

  • Ability for a wired PC outside the company’s firewall on an open local area network (LAN) to establish a secure communication tunnel (via AMT) back to the IT console. Examples of an open LAN include a wired laptop at home or at an SMB (small/medium business) site without a proxy server.

  • Remote power up/power down/power cycle through encrypted WOL.

  • Remote boot via integrated device electronics redirect (IDE-R).

  • Console redirection, via serial over LAN (SOL).

  • Hardware-based filters for monitoring packet headers in inbound and outbound network traffic for known threats and for monitoring known/unknown threats based on time-based heuristics. Laptops and desktop PCs have filters to monitor packet headers. Desktop PCs have packet-header filters and time-based filters.

  • Isolation circuitry to port-block, rate-limit, or fully isolate a PC that might be compromised or infected.

  • Agent presence checking, via hardware-based, policy-based programmable timers. A “miss” generates an event; you can specify that the event generate an alert.

  • OOB alerting.

  • Persistent event log, stored in protected AMT memory for software tools such as ConfigMgr to access while the OS is down.

  • Access (preboot) the PC’s Universal Unique Identifier (UUID).

  • Access (preboot) hardware asset information, such as a component’s manufacturer and model; this is updated every time the system goes through Power-On Self-Test (POST).

  • Access (preboot) to a third-party data store (TPDS), a protected memory area that software vendors can use for version information, .DAT files, and other information.

  • Remote configuration options, including certificate-based zero-touch remote configuration, USB key configuration (light-touch), and manual configuration.

Additional AMT features in laptop PCs include the following:

  • Support for IEEE 802.11 a/g/n wireless protocols

  • Cisco-compatible extensions for Voice over WLAN

Intel vPro platform features include the following:

  • Support for IEEE 802.1x, Cisco Self Defending Network (SDN), and Microsoft Network Access Protection (NAP)

  • Gigabit network connection or network wireless connection (on laptops)

  • Intel Trusted Execution Technology (Intel TXT) and an industry-standard Trusted Platform Module (TPM), version 1.2

  • Intel Virtualization Technology (Intel VT)

  • 64-bit processors optimized for multitasking and multithreading

  • 64-bit integrated graphics to provide enough performance that the PC does not need a discrete (separate) graphics card, even for graphics-intensive operating systems such as Microsoft Windows Vista

  • Industry standards, such as ASF, XML, SOAP, TLS, HTTP authentication, Kerberos (Microsoft Active Directory), DASH (based on draft 1.0 specifications), and WS-MAN

  • Quiet System Technology (QST), formerly called advanced fan speed control (AFSC)

  • Architecture, package design, and technologies for power coordination and better thermals, in order to operate at very low voltages, use power more efficiently, and help meet Energy Star requirements

Because Intel AMT allows access to the PC below the OS level, security for the AMT features is a key concern. Security for communications between Intel AMT and the provisioning service and/or management console can be established in different ways, depending on the network environment. Security can be established via certificates and keys (TLS public key infrastructure, or TLS-PKI), pre-shared keys (TLS-PSK), or administrator password. Security technologies that protect access to the AMT features are built in to the hardware and firmware. As with other hardware-based features of AMT, the security technologies are active even if the PC is powered off, the OS has crashed, software agents are missing, or hardware (such as a hard drive or memory) has failed.

 
Others
 
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Understanding the EMS Syntax
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Common Uses of EMS , Explaining the Difference Between PowerShell and EMS
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Understanding the Exchange Task Model
- Sharepoint 2013 : Developing Applications with Access (part 2) - The Access 2013 Client Application, Access 2013 Web Applications
- Sharepoint 2013 : Developing Applications with Access (part 1) - Exploring Access 2013
- Windows 8 : Troubleshooting Startup and Shutdown
- Windows 8 : Backing Up and Recovering a Computer (part 3) - Creating and Using File History
- Windows 8 : Backing Up and Recovering a Computer (part 2)
- Windows 8 : Backing Up and Recovering a Computer (part 1)
- Internet Explorer 8 Quick Tour (part 3) - Adding Sites to Your Favorites
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us