SlideShare ist ein Scribd-Unternehmen logo
1 von 17
All New 2010 Intel®
Core™ vPro™ Processor
Family for MSPs
How Spiceworks has integrated Intel
technology into the Spiceworks IT Desktop
Kevin S. Havre
Intel Corporation
September 2010
1
Smart Security1
Intel® Core™ Processors and Piketon: Essential
technology for SMB Desktop PCs
Intelligent
Performance1 Easy PC Care1
Intel® Core™ processors
deliver intelligent
desktop performance
that accelerates in
response to demanding
tasks helping improve
business productivity,
reduce energy
consumption and enable
smaller and more
innovative form factors
Built-in smart security
technologies to help
guard against viruses,
data loss or corruption
and protect assets and
data in the event of PC
loss or theft
2
A new level of intelligent performance for desktop PCs
Industry leading
technologies to help
you or your service
provider remotely
manage and service
PCs regardless of PC
state or IT care model
to help improve PC
availability and reduce
your IT support cost
All New 2010 Intel® Core™ vPro™ Processor Family:
IT Computer Within the Computer
Smart Security and
Cost Saving Manageability
with activated features2:
• Built into the hardware
• Regardless of OS or software
agent health
• Even when powered off
Specifically:
• Secure power management
• Network isolation
• Remote remediation
2. Activated features include Intel Active Management Technology. Intel® Core™ vPro™ processor family includes Intel® Active Management
Technology (Intel® AMT). Intel AMT requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as
well as connection with a power source and a corporate network connection.
Intel® vPro™ Technology
Intel® AMT Architecture
Intel® AMT
Operating System
BIOS
HW Sensors Network Connection
SW
Apps
SW
Apps
HW Drivers
Network
Stack
Non-
Volatile
Storage
Event Log,
Alerts,
Redirection
Features
Secure Out Of Band
access
Remote troubleshooting
and recovery
Proactive alerting
More detailed HW
inventory
Third-party, nonvolatile
storage
SW
Apps
SW
Apps
SW
Apps
Secure access and control of Intel® vPro™ machines, even OOB
Intel® vPro™ Processor Technology
Usage summary
Usage to features
OOB
Access
Power
Control
KVM/IDEr
SOL/ IDEr
iMST
HW maintenance tasks
Change Management, Disk defrag, temp files,
security credentials
SW / Anti-virus updates
Change management, compliancy, security
HW updates/remediation
BIOS updates, HW/OS failure, disk image restore
• More secure Out of band (OOB) access
External access to systems the consoles can “see”, with more
secure posture than ASF or WOL, regardless of OS state and a
detailed list of HW inventory since last boot.
• Power Control
Gives consoles the ability to power up systems when they are
needed and reboot when the OS is not working
• KVM and Serial-over-LAN (SOL) Remote Control
Gives remote control consoles access to the system below the
OS for seeing pre-boot messages, boot into and edit BIOS,
launch OS into “Safe Mode”.
• IDE redirection (IDEr)
Tricks the BIOS into booting to an OS
image on the network; saving a truck roll
onsite to trouble shoot even if the HDD
has failed, or restore backup images.
• Intel Matrix Storage Technology
Internal mirrored drives; local instant
data back-up without the SW hassle.
External cloned drive; protect your data
and recover quickly
Spiceworks IT Desktop
Demo
Provisioning Intel® AMT
Secure your customers Passwords!
“Losing” them are as costly as key to your customers
front door…
Type Used for
BIOS
password
BIOS access
Intel® AMT
password
MEBx and Web
UI access
Local admin
password
OS level
access
Management
Application
Passwords
Management
console
For accessing
PCs
• OS != AMT
• Use strong Passwords
one char, number and UC letter.
• Only assigned techs
• Change regularly
• Change when techs leave
your company
Password management
Intel AMT configuration
DHCP
• Intel AMT conforms its settings to the
host (the PC’s OS) network settings. IP
address is the same for OS and MEBx,
access; Intel AMT MEBx through port
16992...
Static
• Use different IP addresses for Intel AMT
and the host (the PC’s OS).
Decide on IP addressing method
Common mistake:
using a different hostname for
Intel AMT MEBx than in the OS
Choosing a provisioning method
10
Manual Improved Manual Automatic (PSK) Automatic (PKI)
LevelofEffort
Labor Intensive
• Must visit every PC for
initial & on-going
configuration
• Must access the BIOS to
make changes
• Error Prone
• English Only
Less Labor Intensive
• Must visit every PC for
initial & on-going
configuration
• Configuration data
entered into Windows
utility
• Less Error Prone
• Localized
Less Labor Intensive
• Must visit every; reboot
only, no data entry
• Least error prone
• Localized
Least Labor Intensive
• Never requires a visit to
the PC
• Least Error Prone
• Localized
Preparation
• None • USB key purchase
• Download Intel AMT
Configuration Utility
• USB key purchase
• Download & install
Intel SCS 6.0 Lite
• Security Certificate
Purchase
• DHCP server with option
15
• Download & install Intel
SCS 6.0 Lite
Basic Provisioning – Manual
Manually configuring in MEBx
Multiple settings
typed into every
computer in SMB
site
•Time consuming
•Error Prone
•Supported in all AMT versions
Basic One Touch Provisioning
Simple AMT Configuration using a USB Key
• Simple Windows wizard for local AMT
Configuration using a USB Key
• Supported in AMT 4.0+ Only
Centralized Provisioning
Enter settings once, each PC calls in and provisions
automatically
13
One Touch Remote Configuration
USB key loads provisioning “secret”,
PSK or CA hash
Certificate hash already in firmware; purchase
matching certificate and load on Provision Server
Onsite Server?
Onsite Server
More Capabilities
Integrated Graphics
KVM Remote Control1
New AES instructions (AES-NI)
More Performance
Most cache, cores, threads & boost range
No integrated graphics
NO KVM Remote Control1 or AES-NI
Intel® Core™ vPro™ Processor Family
Using Integrated
Graphics ONLY.
Intel® Core™ i5 & i7 vPro™ Processors
For business clients
Intel® Core™ i7 vPro™ Processors
For workstations and high performance products
1 – KVM = Keyboard, Video, & Mouse; KVM Remote Control ONLY works over Intel® integrated graphics, not available on Lynnfield processors
Desktop: i5-670, 660, 650
Mobile: i5-580, 560, 540, 520, i7-640, 620
Desktop: i7-870, 860, 860s
Mobile: i7-840, 820, 740, 720
15
Revision - 01
Intel Confidential
16
Legal Disclaimer Intel Confidential
• INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO
LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL
PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS
AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER,
AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF
INTEL® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A
PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR
OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN
MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS.
• Intel may make changes to specifications and product descriptions at any time, without notice.
• All products, dates, and figures specified are preliminary based on current expectations, and are subject to
change without notice.
• Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which
may cause the product to deviate from published specifications. Current characterized errata are available on
request.
• Customers, licensees and other third parties are not authorized by Intel to use code names in advertising,
promotion or marketing of any product or services and any such use of Intel's internal code names is at the
sole risk of the user.
• Performance tests and ratings are measured using specific computer systems and/or components and reflect
the approximate performance of Intel products as measured by those tests. Any difference in system
hardware or software design or configuration may affect actual performance.
• Intel, Intel Inside, the Intel logo, vPro, Centrino, Centrino Inside, Intel Core, Intel Atom and Pentium are
trademarks of Intel Corporation in the United States and other countries.
• *Other names and brands may be claimed as the property of others.
• Copyright © 2010 Intel Corporation.

Weitere ähnliche Inhalte

Was ist angesagt?

Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsMohamed Tarek
 
2013 Advantech Master Catalog
2013 Advantech Master Catalog2013 Advantech Master Catalog
2013 Advantech Master CatalogJack Lin
 
advance ambedded system
advance ambedded systemadvance ambedded system
advance ambedded systemVishwasJangra
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350Binod Kumar
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationHelpSystems
 
Advantech's Automation Devices & Computing Star Product Guide | ITG India
Advantech's Automation Devices & Computing Star Product Guide | ITG IndiaAdvantech's Automation Devices & Computing Star Product Guide | ITG India
Advantech's Automation Devices & Computing Star Product Guide | ITG IndiaITG Software Engineering Pvt. Ltd.
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latestDeepak Chouhan
 
Advantech Industrial IoT TPC-5000 Controlpanel sales kit
Advantech Industrial IoT TPC-5000 Controlpanel sales kitAdvantech Industrial IoT TPC-5000 Controlpanel sales kit
Advantech Industrial IoT TPC-5000 Controlpanel sales kitMarco Zampolli
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsSandeep Reddy
 

Was ist angesagt? (20)

ITE - Chapter 5
ITE - Chapter 5ITE - Chapter 5
ITE - Chapter 5
 
Clear Linux OS - Architecture Overview
Clear Linux OS - Architecture OverviewClear Linux OS - Architecture Overview
Clear Linux OS - Architecture Overview
 
Why choose genetec
Why choose genetecWhy choose genetec
Why choose genetec
 
Rnote17
Rnote17Rnote17
Rnote17
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
2013 Advantech Master Catalog
2013 Advantech Master Catalog2013 Advantech Master Catalog
2013 Advantech Master Catalog
 
advance ambedded system
advance ambedded systemadvance ambedded system
advance ambedded system
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
ION Mini PC
ION Mini PCION Mini PC
ION Mini PC
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
 
Advantech's Automation Devices & Computing Star Product Guide | ITG India
Advantech's Automation Devices & Computing Star Product Guide | ITG IndiaAdvantech's Automation Devices & Computing Star Product Guide | ITG India
Advantech's Automation Devices & Computing Star Product Guide | ITG India
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
 
Embedded system - Introduction to micro-controller 8051
Embedded system - Introduction to  micro-controller 8051Embedded system - Introduction to  micro-controller 8051
Embedded system - Introduction to micro-controller 8051
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latest
 
Advantech Industrial IoT TPC-5000 Controlpanel sales kit
Advantech Industrial IoT TPC-5000 Controlpanel sales kitAdvantech Industrial IoT TPC-5000 Controlpanel sales kit
Advantech Industrial IoT TPC-5000 Controlpanel sales kit
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 

Ähnlich wie How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - Kevin S. Havre, Intel

Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"GeeksLab Odessa
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014StampedeCon
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureJim St. Leger
 
Droidcon2013 x86phones weggerle_taubert_intel
Droidcon2013 x86phones weggerle_taubert_intelDroidcon2013 x86phones weggerle_taubert_intel
Droidcon2013 x86phones weggerle_taubert_intelDroidcon Berlin
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)videos
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterDr. Wilfred Lin (Ph.D.)
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиCisco Russia
 
2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etc2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etcvideos
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Techtechnext1
 
1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hwvideos
 
E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case Intel IT Center
 
Develop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyDevelop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyIntel IT Center
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013Matthew Rosenquist
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Ceph Community
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelIntel IT Center
 
4 dpdk roadmap(1)
4 dpdk roadmap(1)4 dpdk roadmap(1)
4 dpdk roadmap(1)videos
 

Ähnlich wie How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - Kevin S. Havre, Intel (20)

Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
Droidcon2013 x86phones weggerle_taubert_intel
Droidcon2013 x86phones weggerle_taubert_intelDroidcon2013 x86phones weggerle_taubert_intel
Droidcon2013 x86phones weggerle_taubert_intel
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data Center
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связи
 
2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etc2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etc
 
Win 7 & Intel V Pro Tech
Win 7 & Intel V Pro TechWin 7 & Intel V Pro Tech
Win 7 & Intel V Pro Tech
 
1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw
 
E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case E5 Intel Xeon Processor E5 Family Making the Business Case
E5 Intel Xeon Processor E5 Family Making the Business Case
 
Develop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster ReadyDevelop, Deploy, and Innovate with Intel® Cluster Ready
Develop, Deploy, and Innovate with Intel® Cluster Ready
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
4 dpdk roadmap(1)
4 dpdk roadmap(1)4 dpdk roadmap(1)
4 dpdk roadmap(1)
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 

Mehr von Spiceworks

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eyeSpiceworks
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceworks
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpiceworks
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpiceworks
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceworks
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...Spiceworks
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365Spiceworks
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Spiceworks
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Spiceworks
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Spiceworks
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Spiceworks
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Spiceworks
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...Spiceworks
 
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Spiceworks
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Spiceworks
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Spiceworks
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...Spiceworks
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupSpiceworks
 

Mehr von Spiceworks (20)

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eye
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation Eaton
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey Howe
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben Snape
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
 
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
 

How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - Kevin S. Havre, Intel

  • 1. All New 2010 Intel® Core™ vPro™ Processor Family for MSPs How Spiceworks has integrated Intel technology into the Spiceworks IT Desktop Kevin S. Havre Intel Corporation September 2010 1
  • 2. Smart Security1 Intel® Core™ Processors and Piketon: Essential technology for SMB Desktop PCs Intelligent Performance1 Easy PC Care1 Intel® Core™ processors deliver intelligent desktop performance that accelerates in response to demanding tasks helping improve business productivity, reduce energy consumption and enable smaller and more innovative form factors Built-in smart security technologies to help guard against viruses, data loss or corruption and protect assets and data in the event of PC loss or theft 2 A new level of intelligent performance for desktop PCs Industry leading technologies to help you or your service provider remotely manage and service PCs regardless of PC state or IT care model to help improve PC availability and reduce your IT support cost
  • 3. All New 2010 Intel® Core™ vPro™ Processor Family: IT Computer Within the Computer Smart Security and Cost Saving Manageability with activated features2: • Built into the hardware • Regardless of OS or software agent health • Even when powered off Specifically: • Secure power management • Network isolation • Remote remediation 2. Activated features include Intel Active Management Technology. Intel® Core™ vPro™ processor family includes Intel® Active Management Technology (Intel® AMT). Intel AMT requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection.
  • 4. Intel® vPro™ Technology Intel® AMT Architecture Intel® AMT Operating System BIOS HW Sensors Network Connection SW Apps SW Apps HW Drivers Network Stack Non- Volatile Storage Event Log, Alerts, Redirection Features Secure Out Of Band access Remote troubleshooting and recovery Proactive alerting More detailed HW inventory Third-party, nonvolatile storage SW Apps SW Apps SW Apps Secure access and control of Intel® vPro™ machines, even OOB
  • 5. Intel® vPro™ Processor Technology Usage summary Usage to features OOB Access Power Control KVM/IDEr SOL/ IDEr iMST HW maintenance tasks Change Management, Disk defrag, temp files, security credentials SW / Anti-virus updates Change management, compliancy, security HW updates/remediation BIOS updates, HW/OS failure, disk image restore • More secure Out of band (OOB) access External access to systems the consoles can “see”, with more secure posture than ASF or WOL, regardless of OS state and a detailed list of HW inventory since last boot. • Power Control Gives consoles the ability to power up systems when they are needed and reboot when the OS is not working • KVM and Serial-over-LAN (SOL) Remote Control Gives remote control consoles access to the system below the OS for seeing pre-boot messages, boot into and edit BIOS, launch OS into “Safe Mode”. • IDE redirection (IDEr) Tricks the BIOS into booting to an OS image on the network; saving a truck roll onsite to trouble shoot even if the HDD has failed, or restore backup images. • Intel Matrix Storage Technology Internal mirrored drives; local instant data back-up without the SW hassle. External cloned drive; protect your data and recover quickly
  • 8. Secure your customers Passwords! “Losing” them are as costly as key to your customers front door… Type Used for BIOS password BIOS access Intel® AMT password MEBx and Web UI access Local admin password OS level access Management Application Passwords Management console For accessing PCs • OS != AMT • Use strong Passwords one char, number and UC letter. • Only assigned techs • Change regularly • Change when techs leave your company Password management
  • 9. Intel AMT configuration DHCP • Intel AMT conforms its settings to the host (the PC’s OS) network settings. IP address is the same for OS and MEBx, access; Intel AMT MEBx through port 16992... Static • Use different IP addresses for Intel AMT and the host (the PC’s OS). Decide on IP addressing method Common mistake: using a different hostname for Intel AMT MEBx than in the OS
  • 10. Choosing a provisioning method 10 Manual Improved Manual Automatic (PSK) Automatic (PKI) LevelofEffort Labor Intensive • Must visit every PC for initial & on-going configuration • Must access the BIOS to make changes • Error Prone • English Only Less Labor Intensive • Must visit every PC for initial & on-going configuration • Configuration data entered into Windows utility • Less Error Prone • Localized Less Labor Intensive • Must visit every; reboot only, no data entry • Least error prone • Localized Least Labor Intensive • Never requires a visit to the PC • Least Error Prone • Localized Preparation • None • USB key purchase • Download Intel AMT Configuration Utility • USB key purchase • Download & install Intel SCS 6.0 Lite • Security Certificate Purchase • DHCP server with option 15 • Download & install Intel SCS 6.0 Lite
  • 11. Basic Provisioning – Manual Manually configuring in MEBx Multiple settings typed into every computer in SMB site •Time consuming •Error Prone •Supported in all AMT versions
  • 12. Basic One Touch Provisioning Simple AMT Configuration using a USB Key • Simple Windows wizard for local AMT Configuration using a USB Key • Supported in AMT 4.0+ Only
  • 13. Centralized Provisioning Enter settings once, each PC calls in and provisions automatically 13 One Touch Remote Configuration USB key loads provisioning “secret”, PSK or CA hash Certificate hash already in firmware; purchase matching certificate and load on Provision Server Onsite Server? Onsite Server
  • 14. More Capabilities Integrated Graphics KVM Remote Control1 New AES instructions (AES-NI) More Performance Most cache, cores, threads & boost range No integrated graphics NO KVM Remote Control1 or AES-NI Intel® Core™ vPro™ Processor Family Using Integrated Graphics ONLY. Intel® Core™ i5 & i7 vPro™ Processors For business clients Intel® Core™ i7 vPro™ Processors For workstations and high performance products 1 – KVM = Keyboard, Video, & Mouse; KVM Remote Control ONLY works over Intel® integrated graphics, not available on Lynnfield processors Desktop: i5-670, 660, 650 Mobile: i5-580, 560, 540, 520, i7-640, 620 Desktop: i7-870, 860, 860s Mobile: i7-840, 820, 740, 720
  • 15. 15
  • 16. Revision - 01 Intel Confidential 16
  • 17. Legal Disclaimer Intel Confidential • INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. • Intel may make changes to specifications and product descriptions at any time, without notice. • All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. • Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. • Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user. • Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. • Intel, Intel Inside, the Intel logo, vPro, Centrino, Centrino Inside, Intel Core, Intel Atom and Pentium are trademarks of Intel Corporation in the United States and other countries. • *Other names and brands may be claimed as the property of others. • Copyright © 2010 Intel Corporation.

Hinweis der Redaktion

  1. Software-based communication (which is through the software stack in the OS) can be disrupted for a variety of reasons, as listed via power being off, OS not operational, software agent being disabled via virus attack and hard drive not functioning. Therefore- hardware-based management via Intel Core vPro processor family can help monitor, maintain, update, upgrade, and repair PCs when software-based management agents are not available.For instance, software-based management is often unavailable when an Operating System blue screens. Therefore, without Intel vPro technology, you cannot remotely manage the computer from the IT management console. Also - a PC with an Intel Core vPro processor uses TLS encryption to secure an out-of-band communication tunnel to the IT management console. Intel vPro technology secures the communication tunnel Advanced Encryption Standard (AES) 128-bit encryption and RSA keys with modulus lengths of 2,048 bits. Because the encrypted communication is out-of-band, the PC’s hardware and firmware receive the magic packet before network traffic reaches the software stack for the operating system (OS). Since the encrypted communication occurs “below” the OS level, it is less vulnerable to attacks by viruses, worms, and other threats that typically target the OS level.Legal Disclaimer2. Intel® Core™ vPro™ processor family includes Intel® Active Management Technology (Intel® AMT). Intel AMT requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes.
  2. TLS encryption – buy one cert for every client – Server authentication – MTLS (cert for mgmt console, 1 for each AMT client)Create your own certificates – Remote config – buy GoDaddy cert and provision systems – export certificate hash and put onto each AMT clientDirector - ownGoDaddy – Provision Server buys a cert to provision any # of systems