White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
PCs based on the all new 2010 Intel Core vPro processor family are designed to give IT technicians greater remote visibility into and access to the system in both wired and wireless states, as described in Table 4. When managing PCs with the all new 2010 Intel Core vPro processor family, technicians can remotely power up a PC almost anytime. (In order to prevent unexpected battery use in laptops, remote
Control, and use other critical maintenance and management capabilities of a new 2010 Intel Core vPro processor for wired or wireless PCs. PCs can even perform their own local, scheduled wake from any
With the ability to remotely manage PCs regardless of power state, IT can streamline more work and implement more automation. In turn, this helps business minimize user downtime, reduce IT service costs, and realize a rapid ROI.
Table 4. Capability matrix for PCs with new 2010 Intel® Core™ vPro™ processors.
|
|
|
| Works with wired | |||||||
|
|
|
| laptop or wired desktop | wired or wireless laptop | ||||||
|
|
|
| ||||||||
|
|
|
|
|
|
|
|
|
| ||
Use Cases |
| Usages |
| communication outside | AWAKE, | AWAKE, |
| AWAKE, | AWAKE, |
| |
a | a | corporate firewall | a | PROPERLY | UNRESPONSIVE |
| PROPERLY | UNRESPONSIVE |
| ||
|
|
| OS WORKING | BUT OS | Asleep (Sx) | OS WORKING | BUT OS | Asleep (Sx) | |||
|
|
|
|
|
|
|
|
|
|
| |
|
| IT remotely powers PC down, then |
|
|
|
|
|
|
|
| |
Remote power | up again to reset to clean state |
|
|
|
| YES | YES |
| N/A | ||
(or powers up PC for servicing). | YES |
| YES | YESb | YESb | ||||||
up/power cycle |
| ||||||||||
Use power management to |
|
|
|
|
|
|
|
| |||
|
|
|
|
|
|
|
|
|
| ||
|
| reduce energy costs. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Remote |
| Power up PCs during off hours |
|
|
|
|
|
|
|
| |
| for software updates. Also client- | YES |
| YES | YESb | YES | YES | YESb | N/A | ||
software update | initiated scheduled wake for |
| |||||||||
|
|
|
|
|
|
|
| ||||
|
| update. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
Agent presence | Ensure critical applications are |
|
|
|
|
|
|
|
| ||
checking and |
| running, and be quickly notified | YES |
| YESc | YESb | N/A | YESc | YESb | N/A | |
alerting |
| when they miss a check in. |
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
| ||
System isolation | Automated or manual | YES |
| YES | YESb | N/A | YES | YESb | N/A | ||
and recovery |
| protection against virus outbreaks. |
| ||||||||
|
|
|
|
|
|
|
|
| |||
|
|
|
|
|
|
|
|
|
|
| |
|
| Identify and prevent unauthorized |
|
|
|
|
|
|
|
| |
Protection for | access to encrypted data, or disable |
|
|
|
|
|
|
|
| ||
the laptop remotely or via |
|
| YESc | YES |
| YESc | YES |
| |||
data if a laptop | intelligence if it is lost or stolen. | N/A |
| N/A | N/A | ||||||
is lost or stolen | Upon |
|
| for laptops | for laptops |
| for laptops | for laptops |
| ||
|
|
|
|
|
|
|
| ||||
|
| access to encryption keys. Rapid |
|
|
|
|
|
|
|
| |
|
| reactivation if laptop is returned. |
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
| Diagnose and repair problems |
|
|
|
|
|
|
|
| |
Remote |
| remotely via |
|
|
|
|
|
|
|
| |
| log, remote/redirected boot, |
|
|
|
|
|
|
|
| ||
diagnosis and | YES |
| YES | YESb | YES | YES | YESb | N/A | |||
console redirection, KVM Remote |
| ||||||||||
repair |
|
|
|
|
|
|
|
|
| ||
| Control,2 and preboot access to |
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
| ||
|
| BIOS settings. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Remote |
| Take a hardware or software |
|
|
|
|
|
|
|
| |
hardware and/or |
|
|
|
| YES | YES |
| N/A | |||
inventory regardless of OS state or | YES |
| YESc | YESb | YESb | ||||||
software asset |
| ||||||||||
power state. |
|
|
|
|
|
|
|
|
| ||
tracking |
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
aIT must activate Intel® vPro™ technology in order to take advantage of these intelligent security and remote manageability technologies. For more information about activating Intel vPro technology, which includes Intel® AMT and Intel® AT, see page 25 of this white paper.
bRequires WPA or WPA2/802.11i security and Controller Link 1 for wireless operation when the user OS is down.
cAlso available when using host
8