White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
Simplify and speed up activation
The all new 2010 Intel Core vPro processor family allows secure, remote access and management of PCs even if the OS is inoperable, PC power is off, a hard drive has failed, or the PC is outside the corporate firewall. To maintain the proper level of security for these capabilities, it is important that IT administrators establish the security credentials for Intel vPro technology appropriately for activation in their service environment before configuring Intel vPro technology for remote management.
IT administrators can choose the level of security and automation appropriate for their network environments.
General activation processActivating Intel vPro technology in a PC with a new Intel Core vPro processor generally follows three steps: setup, configuration, and integration. Setup establishes the initial security credentials required for secure communication between the
Configuration is a
A new Intel Core vPro processor supports different processes for setting up security credentials on the PC and management console. These processes allow IT to select the security level appropriate for their environment:
•
•
•Remote configuration: Setup of initial security credentials occurs automatically (the PC must be configured by the original equipment manufacturer (OEM) for remote configuration). Remote configuration requires a provisioning service, typically called a setup and configu- ration application (SCA). An SCA is required for both standard and advanced provisioning.
A new Intel Core vPro processor supports three configuration models to allow for flexible activation:
•Basic configuration refers to a manual provisioning method useful for small businesses. This configuration method uses HTTP Digest for user authentication. There is no encryption applied to management traffic.
•Standard configuration provides enough security for most corpora- tions. Client authentication is based on HTTP Digest, which requires a username and password. There is no encryption applied to management traffic.
•Advanced configuration provides the highest level of security features. This model allows IT to configure the PCs to use network access control standards such as 802.1x, Cisco SDN, and Microsoft NAP. This model also allows IT to configure the management traffic to be encrypted with TLS or mutual TLS. In addition, authentication can be managed by the Microsoft Active Directory* via Kerberos. PCs with a new Intel Core vPro processor allow IT to remotely config- ure these security options. Note that not all management console vendors provide support to configure all security options.
Ready for the future
Laptop and desktop PCs with a new Intel Core vPro processor help manufacturers deliver stable, standardized PCs. These PCs have with broad industry support and are ready for the heavily multithreaded OSs and applications of the future.
•
•Performance for
2010 Intel Core vPro processors provide the performance needed for Microsoft Office 2007, including the adaptable performance for intense,
•
•Upgrade to Windows 7 quickly, remotely, and overnight without losing access to your legacy applications, and save up to 40 minutes of
vPro
•Support for legacy applications via Windows 7: IT can take advan- tage of
25