<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.tbpindustries.com/index.php?action=history&amp;feed=atom&amp;title=Active_Management_Technology_%28AMT%29</id>
	<title>Active Management Technology (AMT) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.tbpindustries.com/index.php?action=history&amp;feed=atom&amp;title=Active_Management_Technology_%28AMT%29"/>
	<link rel="alternate" type="text/html" href="https://wiki.tbpindustries.com/index.php?title=Active_Management_Technology_(AMT)&amp;action=history"/>
	<updated>2026-05-13T10:25:10Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.tbpindustries.com/index.php?title=Active_Management_Technology_(AMT)&amp;diff=258&amp;oldid=prev</id>
		<title>Goldbolt: Created page with &quot;Intel Active Management Technology is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a separate...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.tbpindustries.com/index.php?title=Active_Management_Technology_(AMT)&amp;diff=258&amp;oldid=prev"/>
		<updated>2020-11-23T21:22:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Intel Active Management Technology is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a separate...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Intel Active Management Technology is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, update, upgrade, and repair them. Out-of-band (OOB) or hardware-based management is different from software-based (or in-band) management and software management agents.&lt;br /&gt;
&lt;br /&gt;
Intel AMT includes hardware-based remote management, security, power management, and remote configuration features that enable independent remote access to AMT-enabled PCs. Intel AMT is security and management technology that is built into PCs with Intel vPro technology.&lt;br /&gt;
&lt;br /&gt;
Hardware-based AMT features on desktop PCs include:&lt;br /&gt;
&lt;br /&gt;
* Encrypted, remote communication channel for network traffic between the IT console and Intel AMT.&lt;br /&gt;
* Ability for a wired PC (physically connected to the network) outside the company's firewall on an open LAN to establish a secure communication tunnel (via AMT) back to the IT console. Examples of an open LAN include a wired laptop at home or at an SMB site that does not have a proxy server.&lt;br /&gt;
* Remote power up / power down / power cycle through encrypted WOL.&lt;br /&gt;
* Remote boot, via integrated device electronics redirect (IDE-R)&lt;br /&gt;
* Console redirection, via serial over LAN (SOL)&lt;br /&gt;
* Keyboard, video, mouse (KVM) over network.&lt;br /&gt;
* Hardware-based filters for monitoring packet headers in inbound and outbound network traffic for known threats (based on programmable timers), and for monitoring known / unknown threats based on time-based heuristics. Laptops and desktop PCs have filters to monitor packet headers. Desktop PCs have packet-header filters and time-based filters.&lt;br /&gt;
* Isolation circuitry (previously and unofficially called &amp;quot;circuit breaker&amp;quot; by Intel) to port-block, rate-limit, or fully isolate a PC that might be compromised or infected.&lt;br /&gt;
* Agent presence checking, via hardware-based, policy-based programmable timers. A &amp;quot;miss&amp;quot; generates an event; and this can also generate an alert.&lt;br /&gt;
* OOB alerting.&lt;br /&gt;
* Persistent event log, stored in protected memory (not on the hard drive).&lt;br /&gt;
* Access (preboot) the PC's universal unique identifier (UUID).&lt;br /&gt;
* Access (preboot) hardware asset information, such as a component's manufacturer and model, which is updated every time the system goes through power-on self-test (POST).&lt;br /&gt;
* Access (preboot) to third-party data store (TPDS), a protected memory area that software vendors can use, in which to version information, .DAT files, and other information.&lt;br /&gt;
* Remote configuration options, including certificate-based zero-touch remote configuration, USB key configuration (light-touch), and manual configuration.&lt;br /&gt;
* Protected Audio/Video Pathway for playback protection of DRM-protected media.&lt;/div&gt;</summary>
		<author><name>Goldbolt</name></author>
		
	</entry>
</feed>