Intel® vPro™ and Intel® Centrino® Pro Processor Technology Quick Start Guide

Use your own root certificate, if you already have one

Use one of the certificate hashes provided with Intel vPro (i.e., already on the client systems)

Using your own root certificate: If you already have a root certificate on your LANDesk core server (the provisioning server), then you need to do one of the following:

instruct your Intel vPro client manufacturer (OEM) to place a matching certificate hash on each Intel vPro client during manufacture

manually enter the matching certificate hash using the Intel MEBx on each Intel vPro client before deployment

If you instruct your OEM to load the certificate hashes onto your Intel vPro clients, the clients will already have a certificate hash that matches the existing root certificate on your provisioning server when they arrive. All you need to do is connect them to the network and power them on and they’ll automatically provision themselves (assuming you’ve completed Steps 1-3 above). Then they will be in a Configured state.

Skip to Step 5: Discover Intel vPro Clients through the Management Console, on page 27.

Using one of the certificates provided with Intel vPro: If you want to use one of the certificates provided with Intel vPro, you will need to purchase a matching root certificate, and load it onto your LANDesk core server (the provisioning server). Once a matching root certificate is present on the provisioning server, the Intel vPro clients will automatically authenticate themselves with the provisioning server at power on, and will then automatically be provisioned by the provisioning server.

The certificates are purchased from one of the approved Certificate Authority (CA) vendors, such as VeriSign, Comodo, Go Daddy, and Starfield. Check with your OEM to see which of these CA vendors they support. The certificates are placed in C:\Program Files\LANDesk\ManagementSuite\amtprov\certStore.

1.Create a new folder named cert_1.

2.Copy the three files that were received from the CA vendor (trusted_cert.pem, corecacert.pem, corecakey.pem) into the cert_1 directory. You can create up to eight cert folders to hold eight different certs from different CAs.

3.Some CA vendors may name the certificates differently. To be consistent, renamed the files to: o trusted_cert.pem (root cert)

o corecacert.pem (the cert user buys from the CA)

ocorecakey.pem (the private key the administrator generated when they bought the cert).

oTrusted_cert_intermediate.pem (The certificate that CA’s use to issue the cert you buy. This is issued by the root cert from each CA.)

When your Intel vPro clients arrive, they will already have a certificate hash that matches the new root certificate you just installed on your provisioning server. All you need to do is connect them to the network and power them on and they’ll automatically provision themselves (assuming you’ve completed Steps 1-3 above). Then they will be in a Configured state.

22

Page 22
Image 22
Intel Centrino Pro, vPro quick start

Centrino Pro, vPro specifications

Intel vPro and Centrino Pro are advanced technologies designed to enhance business computing environments, providing a blend of performance, security, and manageability. These technologies are specifically aimed at IT professionals and organizations looking to streamline their operations and protect sensitive data.

Intel vPro technology is built for today’s enterprise needs, incorporating a set of hardware and software features that allow for advanced security, remote management, and increased performance. One of the core features of Intel vPro is its Hardware Shield, which provides security at the firmware level, helping to protect against threats before they even reach the operating system. This feature enhances the overall security posture of devices while enabling IT departments to respond more effectively to potential threats.

Another prominent aspect of Intel vPro is its remote management capabilities, which include Intel Active Management Technology (AMT). AMT allows IT administrators to manage devices even when they are powered off or have a corrupted operating system. This capability significantly reduces downtime and improves productivity, as IT support can troubleshoot and resolve issues remotely without needing physical access to the machine.

Centrino Pro, on the other hand, focuses on delivering performance and power efficiency for mobile computing. It integrates Wi-Fi capabilities with advanced security features, enabling users to stay connected securely while on the move. Centrino Pro technology includes Intel's power management capabilities, which optimize battery life and enhance the performance of mobile devices.

The combination of Intel vPro and Centrino Pro offers features like Intel Trusted Execution Technology (TXT), which helps to protect virtual machines and sensitive data from attacks. Additionally, these technologies support enhanced multitasking capabilities, powered by Intel's robust processors, ensuring that business applications run smoothly and efficiently.

Both Intel vPro and Centrino Pro are designed with scalability in mind, allowing organizations to easily deploy and manage multiple devices across various locations. This scalability is an essential characteristic for businesses that require flexibility in their IT infrastructure without compromising performance or security.

In summary, Intel vPro and Centrino Pro represent a powerful suite of technologies tailored for enterprise environments. With features focused on security, remote management, and efficient mobile computing, they help organizations optimize their IT strategies and foster a secure and productive workplace.