Intel vPro, Centrino Pro quick start

Page 31

Intel® vPro™ and Intel® Centrino® Pro Processor Technology Quick Start Guide

A UDP flood policy which will trigger SD if Intel AMT sees at least 20,000 UDP packets per second and will monitor for a Denial-of-service attack.

An SYN flood policy which will trigger SD if Intel AMT sees at least 20,000 IP packets per second and will monitor for a Denial-of-service attack.

A Kill All NICs policy which will stop all network traffic except for LANDesk management, Intel AMT, DNS, and DHCP traffic, thus isolating the client system from the network except for system management functions.

Note: In LANDesk 8.8 there is no GUI to create or modify System Defense filters or policies. Currently all modifications have to be made to the XML pages used for System Defense.

Once SD triggers an alert, the alert is displayed in the LSM log. LANDesk and Intel AMT limit network access by replacing the current client policy with the Kill All NICs policy when SD is triggered. The client machine is also placed in the Remediation queue, which can be found in Configure Intel vPro Options System Defense Remediation. Once the machine is remediated, the Kill All NICs policy is removed and the previous policy is re-applied. The administrator must manually perform the actual remediation of removing the virus or spyware, or fixing whatever caused the SD to be triggered.

Congratulations! You are now on your way to more productively managing a powerful computer system. This can improve your productivity and provide a valuable return on your investment.

31

Image 31
Contents Guide Centrino Pro Processor Technology Quick Start GuideContents Intended Audience PrefaceWhat This Document Contains Process Overview Where do I go from here? Deciding Which Provisioning Mode to UseProcess Flowchart Deploying Intel vPro Using SMB Basic Mode ProvisioningSet Firewall/Router Ports Configure Existing IT InfrastructureVerify Intel vPro Client Windows Drivers Choose Dhcp or Static IP Addressing for Client SystemsEnsure Management Console Has the Correct Intel AMT Support Set PasswordChange the Intel MEBx Password Configure Intel vPro Client BiosSelect TLS or non-TLS mode Confirm You Have the Latest Bios and Firmware VersionSet Additional Intel MEBx Parameters Select an IP Addressing SchemeTest Intel vPro Client Functionality Discovery Without the LANDesk Agent Installed on the ClientDiscovery With the LANDesk Agent Installed on the Client Discover Intel vPro Clients Through the Management ConsolePage Adding New Devices Post ConfigurationUpdating Procedures to Include Intel AMT Features Using Agent Presence APSystem Defense SD Using LANDesk* Out-of-Band Monitor Amtmon FeaturesPage Process Flowchart Setup Intel vPro Enterprise Setup and Configuration FlowSQL DB Dhcp DNS Database Server Integration Set Firewall/Router Ports Open for Management TrafficSet Intel vPro Password and TLS mode in Management Console Set Intel MEBx Password Configure Intel vPro Client Authentication SettingsSelect TLS Advanced mode or non-TLS Standard mode Page OEM Pre-configuration Factory State to Configured State Management console Page Page Discover Intel vPro Clients through the Management Console Test Intel vPro Client Functionality From LANDesk Network Settings o User Accounts Using LANDesk* Out-of-Band Monitor Amtmon Features Page PID Appendix a TroubleshootingPage An example of Successful Provisioning Page An example of an unsuccessful Provisioning Page Page Appendix B Glossary of Terms used in this guide

Centrino Pro, vPro specifications

Intel vPro and Centrino Pro are advanced technologies designed to enhance business computing environments, providing a blend of performance, security, and manageability. These technologies are specifically aimed at IT professionals and organizations looking to streamline their operations and protect sensitive data.

Intel vPro technology is built for today’s enterprise needs, incorporating a set of hardware and software features that allow for advanced security, remote management, and increased performance. One of the core features of Intel vPro is its Hardware Shield, which provides security at the firmware level, helping to protect against threats before they even reach the operating system. This feature enhances the overall security posture of devices while enabling IT departments to respond more effectively to potential threats.

Another prominent aspect of Intel vPro is its remote management capabilities, which include Intel Active Management Technology (AMT). AMT allows IT administrators to manage devices even when they are powered off or have a corrupted operating system. This capability significantly reduces downtime and improves productivity, as IT support can troubleshoot and resolve issues remotely without needing physical access to the machine.

Centrino Pro, on the other hand, focuses on delivering performance and power efficiency for mobile computing. It integrates Wi-Fi capabilities with advanced security features, enabling users to stay connected securely while on the move. Centrino Pro technology includes Intel's power management capabilities, which optimize battery life and enhance the performance of mobile devices.

The combination of Intel vPro and Centrino Pro offers features like Intel Trusted Execution Technology (TXT), which helps to protect virtual machines and sensitive data from attacks. Additionally, these technologies support enhanced multitasking capabilities, powered by Intel's robust processors, ensuring that business applications run smoothly and efficiently.

Both Intel vPro and Centrino Pro are designed with scalability in mind, allowing organizations to easily deploy and manage multiple devices across various locations. This scalability is an essential characteristic for businesses that require flexibility in their IT infrastructure without compromising performance or security.

In summary, Intel vPro and Centrino Pro represent a powerful suite of technologies tailored for enterprise environments. With features focused on security, remote management, and efficient mobile computing, they help organizations optimize their IT strategies and foster a secure and productive workplace.