Home

Intel® Setup and Configuration Software (Intel® SCS)

image

Contents

1. Version 9 0 Document Release Date October 31 2013 License Intel Setup and Configuration Software Intel SCS is furnished under license and may only be used or copied in accordance with the terms of that license For more information refer to the Exhibit A section of the Intel R SCS License Agreement rtf located in the Licenses folder Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS NO LICENSE EXPRESS OR IMPLIED BY ESTOPPEL OR OTHERWISE TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY RELATING TO SALE AND OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE MERCHANTABILITY OR INFRINGEMENT OF ANY PATENT COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT A Mission Critical Application is any application in which failure of the Intel Product could result directly or indirectly in personal injury or death SHOULD YOU PURCHASE OR USE INTEL S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES SUBCONTRACTORS AND AFFILIATES AND THE DIRECTORS OFFICERS AND EMPLOYEES OF EACH HARMLESS AGAINST ALL CLAIMS COSTS DAMAGES AND EXPENSES AND REASONABLE ATTORNEYS FEES ARISING OUT OF
2. 000 0 00022 c 22 eee cee ee cece cece eee ee 104 5At Defining Network Setups c coincides cate aula dice ceialseltcenha a e T a easier ae needa leas 107 5 12 Defining System SCCM OS cai cds a ie Se a Aa E E ae a tia ncedanee mecca ass 116 Chapter 5 Defining Intel AMT Profiles 5 1 About Intel AMT Profiles Intel AMT profiles contain the configuration settings that will be put in the Intel AMT device during configuration These profiles can be created and used by several of the Intel SCS components These are the main types of Intel AMT profile e Console Profiles These profiles are created and edited using the Console The settings in these profiles are used when a configuration request is sent to the RCS e Exported Profiles These profiles are created and edited using the Console and then Exported to an XML format During export the lt RCSParameters gt tag is added with information about the location of the RCS These profiles can then be used by the Configurator as part of the Unified Configuration Process on page 7 e Delta Profiles A Console Profile and an Exported Profile can be a Delta Profile After a system is configured Delta Profiles can be used to make changes to specific settings only Only settings defined in the profile will be changed on the systems during configuration All other settings will stay in their current condition on the systems e The SMB Manual Configuration method does not use confi
3. Windows 2000 Ga Windows 2000 FATS windows 2000 windows 2000 windows 2000 Gaca Exchange Windows Server 2003 Enterprise Edition 34 certificate templates Figure 9 3 Microsoft Management Console Intel SCS User Guide 192 Chapter 9 Preparing the Certification Authority 5 Inthe right pane right click the User template and select Duplicate Template The Properties of New Template window opens Properties of New Template 2 xi Issuance Requirements Superseded Templates Extensions Security Request Handing Subject Name Template display name Copy of User Minimum Supported CAs Windows Server 2003 Enterprise Edition After you apply changes to this tab you can no longer change the template name Template name Copy of User Validity period Renewal period 1 years z 6 weeks Me J7 Publish certificate in Active Directory Do not automatically reenrall if a duplicate certificate exists in Active Directory Figure 9 4 Properties of New Template Window If the CA is installed on a server running Windows Server 2008 all x32 64 versions and R2 the Duplicate Template window opens Make sure that you select Windows Server 2003 Enterprise and click OK Make sure that the Publish certificate in Active Directory check box is NOT selected In the Template display name field enter a meaningful name For example name a template used to generate 802 1x client certificate
4. 2 0222 oe cece cece eee cee eee eee eee eee eee cece cece cece eeeeeeee 147 6 18 Disabling the EHBC Option 2000220 c occ cee cee eee ee cee eee cee cece eee e cease 148 6 19 Running Scripts with the Configurator RCS ooo esc se ces oes e r ee ook deaed es EEE RE Eh 149 6 19 1 Scripts Run by the RCS 0 0 0 2 o eee cc eee cece ee eee eect e eect eee eeeee 149 6 19 2 Scripts Ruin by the Configurator cocven ue cee eset occa e aa es eaee tev EE EEE ENE EEES 151 6 19 3 Who Runs the Scripts 2 000000 0 220 c occ eee eee eee eee eee eee eee eeeeeee 152 6 19 4 What if a Failure Occurs ronco eee eee eee eee aoe e 153 6 19 5 Script R untimeand TiIMeOUt isisi ico en ceink cos cve ncadeduaedseddsendaecs daledisdacweabesaacdedees 153 6 19 6 Parameters Sent in Base64 Format 222 22222 eee eee 153 6 20 Configurator Return COdeS 9s ic se este jek eure aig cld aaeeea Slt gs St ne ard ene ia a Scandi es 154 Chapter 7 Monitoring Systems 2 2 0 2 22 c occ cece eee cee eee cee eee aonan aan 159 7 1 About Monitoring Intel AMT Systems 22 202 2 22 cee cece cece cece eee ee cee ee eee ee eee ence ee 160 7 2 About Adding and Deleting Systems 2 2 0222 cece cette annn 161 7 3 CreatinGa VIEW acreana nase dorset nauies Ddshaadaeasdalawistuniaetess e E E AEE E RARR a ees 162 131 Defining a System Filter 20220 2 2c ce eee cee cece eee cece eeeeeeeee 163 FA Viewing Systems 2222 cusp escecaes
5. 5 12 Defining System Settings The System Settings window of the Configuration Profile Wizard lets you define several settings in the Intel AMT device E Configuration Profile Wizard Profile1 System Settings Management Interfaces Getting Started Select which management interfaces to enable Profile Scope M WebUI Serial Over LAN V IDE Redirection KVM Redirection KVM Settings Optional Settings RFE Password for KVM Sessions M Showpassword AD Integration Power Management Settings Access Control List Specify the system power states in which the Intel Management Engine is operational Always On 50 55 JV Intel ME will go into a lower power state when idle Timeout if idle 3 minutes Home Domains Remote Access Transport Layer Security Network Configuration Network and Other Settings Intel MEBX Password QJreeeeeeee I Show password Specify the method to be used to create the Intel AMT admin user password Use the following password for all systems QJreeeeeeee I Show password Create a random password for each system O Synchronize Intel AMT clock with operating system Enable Intel AMT to respond to ping requests JV Enable Fast Call for Help within the enterprise network Fast Call for Help Settings Edit IP and FQDN settings Set J Modify Optional Settings Figure 5 21 System Settings Window For information about these settings see e Management Interfac
6. Intel SCS includes a sample script ConfigAMT vbs You can use the sample script as a basis for reference when creating your script The script is located in this folder sample files hello listener sample files Intel SCS User Guide 211 Chapter 11 Troubleshooting This chapter describes problems you might find when using Intel SCS and provides their solutions For more information see 11 1 Damaged RCS Data Files rss Puta ous tedgiom nhc a a e eelobeceuseindasnadswsaders es 213 11 2 Connecting to an RCS behind a Firewall sssssssecsrssssssssosoossitriro nsd sAnr ereo Airi E se iiE ET 213 it IPS Sa a Eee Eee S SEE EEE E EE EA EEA E EEE A E eee 214 TLA TEAC OSM eoste a a a eaa e sede aad e a aa E la 214 11 5 Remote Connection to Intel AMT Falls occ se oe onsets eae aee eee ieee ss ieaie 215 11 6 Error with XML File or Missing SCSVersion Tag 2222 02202 e cece ee eee eee cece ee eee ee ee eeee ee 216 11 7 Reconfiguration of Dedicated IP and FQDN Settings 002 2 2222 c cece e eee eee eee eee 216 11 8 Disj inted Namespaces ni 5c a cxchaie cede saccade ge feccesia aia e ae dicyclem laine Soe dee neve tian Erea 217 11 9 Disjointed Hostnames and AD Objects 2 02 2 ccc eee eee eee eect eens 218 11 10 Kerberos Authentication Fall Ure 0i0 5 2 cincieosc eieae eeen den teiatedansacdesdalaweaczas 219 11 11 Error Kerberos User is not Permitted to Configure 2 2 0 2 cece e
7. d Inthe Password field enter the password of the user you selected only the Network Service account does not require a password Intel SCS User Guide 45 Chapter 3 Setting up the RCS 7 Click Next The Storage Encryption Key window opens This window installs the encryption key for the RCS to use when accessing the data files E Intel SCS Installer Storage Encryption Key Data stored by the RCS is encrypted using a storage encryption key This key must be installed on the computer running the RCS Generate Storage Key file Load and install the key from this file Encryption Key File Browse File Password Figure 3 7 Storage Encryption Key Window 8 Select one of these e Generate storage key file Select this option to automatically create and install the storage encryption key e Load and install the key from this file You can select this option if you already have a storage encryption key for example you are moving the RCS to another computer If you select this option click Browse and select the storage encryption key file In the File Password field you must also enter the password that was used to encrypt the key file 9 Click Next The Confirmation window opens This window shows information about the selections you made 10 Optional The default installation folder is C Program Files Intel SCs9 If you want to change this location type a new path in the Install path field or cl
8. Chapter 6 Using the Configurator 6 18 Disabling the EHBC Option Description global options See CLI Global Options on page 125 Intel SCS User Guide DisableEmbeddedHI Permanently disables the Embedded Host Based Configuration EHBC option in the Intel AMT device After running this command the EHBC option cannot be used on the device After you run this command e The EHBC option can only be re enabled on the device by the computer manufacturer or supplier The control mode and configuration status of a device that is already configured is not changed If the device is already configured you cannot reconfigure the device directly to Client Control mode You must first unconfigure the device and then reconfigure it with the control mode that you want Note The EHBC option is only available on Intel AMT systems that were prepared by the manufacturer supplier to include the EHBC option The EHBC option was created to make it easier to configure and manage Intel AMT devices that are embedded in unattended systems For example a device that is embedded in an Automated Teller Machine ATM For more information about the EHBC option contact your computer manufacturer or supplier ACUConfig exe global options DisableEmbeddedHB 148 Chapter 6 Using the Configurator 6 19 Running Scripts with the Configurator RCS Intel SCS include options that you can use to run scripts These scripts can be batch
9. Do not verify RADIUS server certificate subject name Verify server s FQDN Verify server s domain suffix Figure 5 19 802 1x Setup Window 2 Inthe Setup Name field enter a name for this 802 1x setup The setup name can be up to 32 characters and must not contain lt gt characters Intel SCS User Guide 111 Chapter 5 Defining Intel AMT Profiles 3 From the Protocol drop down list select the required protocol The options in the Authentication section are enabled disabled according to the protocol selected as described in this table Table 5 2 Authentication Options Per Protocol Protocol Client Certificate Trusted Root Certificate Roaming Identity EAP PEAP MS CHAP v2 Optional Optional 4 From the Select the method for creating the certificate drop down list select the source for the certificate that will be installed in the Intel AMT device EAP GTC Not available Not available Not available e Request certificate from Microsoft CA If you are using a Microsoft CA continue from step 5 e Request Certificate via CA plugin This option is only available if you have installed the optional CA plugin For information about this option see Using Intel SCS with the CA Plugin on page 197 If you select this option enter the necessary settings as defined by the plugin provider and continue from step 6 e Do not use a certificate Instead of using a certificate authentication is done with
10. NAP or NAP NAC Hybrid Both NAC and NAP Please note that Intel AMT 9 0 and higher does not support NAC Highest hash algorithm supported by authentication server 7 Select the method for creating the certificate Request certificate from Microsoft CA 7 Certificate Authority Certificate Template Refresh CAs amp Templates Common Names CNs in certificate DefaultCNs User defined CNs Figure 5 20 Configure End Point Access Control Window 2 Inthe EAC vendor section select one of these e NAC e NAP or NAC NAP Hybrid e Both NAC and NAP Intel AMT 9 0 and higher does not support NAC This means that if you select the NAC option EAC will not be configured on systems with Intel AMT 9 0 and higher configured using this profile Intel SCS User Guide 114 Chapter 5 Defining Intel AMT Profiles 3 From the Highest hash algorithm supported by the authentication server drop down list select one of these e SHA 1 e SHA 256 only supported on Intel AMT 6 0 and higher e SHA 384 only supported on Intel AMT 6 0 and higher 4 From the Select the method for creating the certificate drop down list select the source for the certificate that will be installed in the Intel AMT device e Request certificate from Microsoft CA By default the settings for this option are displayed If you are using a Microsoft CA continue from step 5 e Request Certificate via CA plugin This option is only available if you h
11. The Intel ME operates independently of the Central Processing Units CPUs of the computer e Management Console A software application used to remotely manage computers in a network The management console must include an interface that can use the features of Intel AMT Intel AMT devices are usually supplied in an unconfigured condition Setup and configuration is the process that gives management consoles access to Intel AMT features Intel SCS lets you complete this process 1 4 Configuration Methods and Intel AMT Versions There are many different versions of Intel AMT This table gives the configuration methods available for the different Intel AMT versions Table 1 1 Configuration Methods Configuration Method Intel AMT Versions Remote Configuration using PKI 2 2 2 6 3 0 and higher e Intel SCS can automatically select the method 1 3 or 4 that is available for each Intel AMT system see Unified Configuration Process on page 7 e Methods 3 4 andthe unified configuration process all require an RCS see Setting up the RCS on page 32 Intel SCS User Guide 4 Chapter 1 Introduction 1 4 1 Host based Configuration The host based configuration method is available from Intel AMT 6 2 and higher This method lets an application running locally on the Intel AMT system configure the Intel AMT device All configuration is done locally using the settings in an XML configuration profile see Defining Intel AMT Prof
12. Usually when the RCS configures a system the configuration process is started when the Configurator sends a configuration request to the RCS In certain conditions this might not be applicable for your network environment For example e Ifyou want to use the Bare Metal option e Ifyou want to supply the RCS with the configuration data for each system or start the configuration process from the RCS Instead of using the Configurator you can use Hello messages and a script 10 6 1 How the Script Option Works The RCS requires identification information for each Intel AMT system before it can perform the setup and configuration The Hello message sent from an Intel AMT system contains the UUID of the Intel AMT system When a Hello message arrives 1 The RCS sets environment variables based on values in the Hello message and activates the script 2 The script reads the environment variables set by the RCS and uses them to find the necessary identification information for the Intel AMT system 3 The script uses the ConfigAMT command of the RCS API to send the configuration request to the RCS 4 TheRCS configures the system Intel SCS User Guide 210 Chapter 10 Setting up Remote Configuration Environment Variables The RCS sets these environment variables e CS_AMT_UUID The UUID of the system e CS_AMT_ADDRESS The IP address of the system e CS_AMT_CONFIGURATION_METHOD The configuration mode of the devic
13. example B ano 7 uum 7 contains 5s T customize operator precedence Baws oS e g A OR B AND C Figure 7 3 System Filter Example b From the first drop down list select one of these operators to define the relationship of this filter condition with the other filter conditions e AND Include the system only if this condition and the previous condition are both true e OR Include the system if either this condition or the previous condition are true c Define the remaining filter conditions as described in step 1 d Optionally repeat steps a through c to add additional filter conditions You can delete a condition by clicking the x icon next to the condition 3 Optional You can also customize the operator precedence of the filter condition rows To do this a Select the Customize Operator Preference check box b Add brackets to the condition ID codes A B etc to make the changes that you want to the filter Intel SCS User Guide 164 Chapter 7 Monitoring Systems 7 4 Viewing Systems The Systems gt Views tab shows a summary of the number of systems that each view contains The systems are automatically sorted into these columns in the view e Total Systems The total number of systems in the view e Last Operation Failed The number of systems for which the RCS did not successfully complete the last operation e Configured The number of systems for which configuration completed e Lost
14. trues Note This parameter is mandatory on systems with Intel AMT 6 0 and higher If you do not supply it configuration will fail on those systems Intel SCS User Guide 136 EnableUserConsent lt none kvm_only all redirection gt lt false true gt 6 11 1 Power Package GUIDs Chapter 6 Using the Configurator Defines for which redirection operations user consent is mandatory For more information see User Consent on page 12 Note You can use the all redirection option only on systems with Intel AMT 7 x and higher EnableRemoteITConsent Defines if it is permitted to remotely make changes to the user consent setting in the Intel AMT device The optional PowerPackage parameter enables you to define power management settings of the Intel AMT device during manual configuration If not supplied the default power settings defined by the manufacturer are used This table gives the GUID values in Hex 32 character format per Intel AMT version Supported Power Package Intel AMT 6 x and higher mobile ON in SO ON in SO ME Wake in S3 AC S4 5 AC Intel AMT 6 x and higher desktop ON in SO ON in SO ME Wake in S3 S4 5 Intel AMT 5 x desktop ON in SO ON in SO S3 ON in SO S3 S4 5 ON in SO ME WoL in S3 ON in SO ME WoL in S3 S4 5 ON in SO S3 S4 5 OFF After Power Loss ON in SO ME WoL in S3 S4 5 OFF After Power Loss Intel AMT 4 x mobile ON in SO ON in SO S3 AC ON in S
15. 6 19 6 20 About the Config ratot s occ coe wns inderne wale e r E ea aa err Ee AE RESSE 124 CTS Vina aa en a a ee ae a A E AE E 124 Configurator bog AES e aaa a aa a E aE aE 125 LE TAS IODA Op O e a e nine Siete gem ans a E a ai 125 Verifying the Status of Intel AMT 00 0002220 o eee cece cee eee eee ee ee eee eee cece eee eeeee 126 Discovermg S VSC CIS ce crs pieces as raoa cee dade apnea Se a Riana aiiai 126 Configuring Systems Unified Configuration 020 00222 c cece eee ee eee cece cece ec ceeeee 129 Configuring Systems USING the RCS ooo ieee cso cedecteniioe cacalncanntsacedcseekgaedessauanaadasisemlevacwesiaias 130 Adding a Configured SYSteM o oo acces cece eecce senescence soc sasamanseeardsauunsececesiuactetesaesasoeeee 132 Creating TES PSK PAINS sce fey ite cree aged eee ataaisiee oe ged adeieauys nadia ar e gelesen bee cesta ERE 133 ConfiquringaSystenv using a USBIKCY ox wiccitesiesscecainmncicanspeebiededdeddawscinekeexhebsaucnaieees 135 Maintaining Configured Systems 2 2 0 2 222 cece cece cece 0000000000000000 cece eeeeeeeeeeeees 138 Maintaining Systems using the RCS 2 0 2 22 c re eee eee eee ee eee ee cece eee eee ee eeee 140 Unconfiguring Intel AMT Systems 2 0 22 222 c eect eee eee e eee ee eee eeeeeee 142 Moving from Client Control to Admin Control 002 02222 c eee cece cece cece ee cece ee eens 145 Disabling Client Control Mode 2 0 0222 c eee e
16. A window opens showing the progress of the changes that you selected When complete a message is shown Click Next The Completed Successfully window opens Click Finish The installer closes Intel SCS User Guide 53 Chapter 3 Setting up the RCS 3 10 2 Changing the Database During installation of the RCS in database mode the RCS is configured to connect to a specific SQL database After installation it is possible to reconfigure the RCS to connect to a different database This is done using the Console To change the database connection of the RCS 1 Make sure that you know the exact name of the replacement database and have the Storage Encryption Key file and file password for that database In the Console select Tools gt Settings gt Storage The Storage tab opens In the Storage Settings section specify the database server name and the name of the replacement database It is also possible to change the type of authentication that the RCS will use Ww In the Storage Security section click Import The Open window opens Select the Storage Encryption Key file and click Open The Enter Passphrase window opens Enter the password that was used to encrypt the key file and click OK m Ow Click OK and then Yes to confirm that you want to restart the RCS and apply the changes you have defined The Settings window closes 8 Select Tools gt Refresh The Console and the RCS are now connected to the replacement d
17. Currently the installers do not verify that this client is installed If the client is not installed the RCS cannot connect to the database The RCS folder contains a folder named SQLNativeClient with the 32 bit and 64 bit installers for this client e Ifyou are installing the RCS on Windows Server 2003 you must also install these hotfixes e http support microsoft com kb 968730 e http support microsoft com kb 948963 e Intel SCS components can run on operating systems installed with these languages Czech Danish Dutch English Finnish French German Greek Hungarian Italian Japanese Korean Norwegian Polish Portuguese Portuguese Brazilian Russian Simplified Chinese Spanish Swedish Traditional Chinese Turkish e Intel SCS does not support Non Latin or Extended Latin characters in filenames or values in the XML files e Aminimum screen resolution of 1024 x 768 is necessary to use the Console The 800 x 600 screen resolution is not supported Intel SCS User Guide 29 Chapter 2 Prerequisites 2 4 Support for a Workgroup Environment You can configure and use most Intel AMT settings on systems in a peer to peer network a Workgroup This table shows settings that require services that are not usually available in a Workgroup Table 2 2 Intel AMT Settings To define this setting You must have 1 Active Directory Integration Access to an Active Directory AD Note e You must configure setting 1
18. DIRECTLY OR INDIRECTLY ANY CLAIM OF PRODUCT LIABILITY PERSONAL INJURY OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN MANUFACTURE OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS Intel may make changes to specifications and product descriptions at any time without notice Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them The information here is subject to change without notice Do not finalize a design with this information The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications Current characterized errata are available on request Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order Copies of documents which have an order number and are referenced in this document or other Intel literature may be obtained by calling 1 800 548 4725 or goto http www intel com design literature htm Intel Active Management Technology Intel AMT requires activation and a system with a corporate network connection an Intel AMT enabled chipse
19. If this occurs it will also not be possible to remotely reconfigure Intel AMT on these systems If you configure home domains the list must contain valid home domains for all systems that will be configured with this profile T Allow Intel AMT functionality via VPN Figure 5 8 Home Domains Window To define the domains 1 Click Add The Domain Properties window opens 2 Enter the DNS suffix name and click OK The Domain Properties window closes and the domain is added to the list of home domains Make sure that the list of home domains contains valid home domains for all systems that will be configured with this profile 3 Optional To permit access to Intel AMT over a Virtual Private Network select Allow Intel AMT functionality via VPN If selected access to the Intel AMT system is permitted when it is connected over a VPN to a domain in the Home Domains list Intel SCS User Guide 97 Chapter 5 Defining Intel AMT Profiles 5 8 Defining Remote Access The remote access feature lets Intel AMT systems versions 4 x and higher located outside an enterprise connect to management consoles inside the enterprise network The connection is established via a Management Presence Server MPS located in the DMZ of the enterprise The MPS appears as a proxy server to management console applications The Intel AMT device establishes a Mutual Authentication TLS tunnel with the MPS Multiple consoles can interact with the Intel AMT
20. Ito add them to the Selected Common Names list All the selected CNs will be put in the Subject Alternative Name field of the certificate 4 From the drop down list select a CN from the list of Selected Common Names This CN will be put in the Subject Name field of the certificate in addition to the Subject Alternative Name field 5 Click OK The Advanced Common Name window closes Intel SCS User Guide 199 Chapter 9 Preparing the Certification Authority 9 5 CRL XML Format If you are using mutual authentication you can also configure the Intel AMT device with data from a Certificate Revocation List CRL Intel SCS does not use the original CRL file supplied by the Certification Authority The information from the CRL file must be placed in the lt CRLs gt tag of the configuration profile You can use the Configuration Profile Wizard to import the CRL into the configuration profile see Defining Advanced Mutual Authentication Settings on page 105 The profile can contain a maximum of four CRLs The combined CRLs can contain a maximum total of 64 serial numbers This is an example of the XML format required by the Configuration Profile Wizard lt xml version 1 0 encoding UTF 8 gt lt i This file maps the untrusted certificates serial number to the URI of the issuer The URI value represents a valid CRL distribution point of a Certificate Authority gt lt crl gt lt uri name http certification
21. SCS User Guide 107 Chapter 5 Defining Intel AMT Profiles To define network setups 1 2 From the WiFi Connection section select one of these e Allow WiFi connection without a WiFi setup Select this option if you want to allow WiFi connection without a WiFi setup using the hosts WiFi settings You can select this option only if you define a home domain in the Home Domains list and do not select a WiFi setup e Allow WiFi connection with the following WiFi setups Select this option if you want to define WiFi setups see Creating WiFi Setups on the next page After creating WiFi setups you can also do these tasks e Edit an existing WiFi setup by clicking Edit e Remove a WiFi setup from the list by clicking Remove e Select a WiFi setup and click the Up or Down arrows to change the priority of the WiFi setup in the list If you enable support for WiFi synchronization step 2 it is not mandatory to define WiFi setups in the profile Optional Intel AMT 6 0 and higher includes a Wireless Profile Synchronization feature This feature enables synchronization of the wireless profiles in the operating system with the WiFi setups defined in the Intel AMT device When the Enable Synchronization of Intel AMT with host platform WiFi profiles check box is selected support for this feature is enabled To use this feature to synchronize profiles the Intel PROSet Wireless Software must be installed on the operating system For
22. The Configurator CLI includes a SystemDiscovery command that does interface with the RCS Intel SCS Database Tool The Database Tool DatabaseTool exe is used to do some of the tasks necessary when installing the RCS in database mode For example creating the Intel SCS database Intel SCS Remote Configuration Service Utility The RCS Utility RCSUtils exe is used to do some of the tasks necessary when installing the RCS Intel SCS Encryption Utility The Encryption Utility SCSEncryption exe is used to encrypt XML files used by Intel SCS Intel AMT Configuration Utility This utility ACUWizard exe includes a wizard that you can use to quickly configure systems that have Intel AMT 4 0 and higher This utility does not interface with the RCS and cannot be used to send requests or data to the RCS For more information refer to the Intel AMT Configuration Utility User Guide Intel SCS User Guide 2 Chapter 1 Introduction 1 2 What are the Discovery Options Intel SCS includes several methods for discovering data about your platforms Discovery Using the Platform Discovery Utility The Platform Discovery Utility PlatformDiscovery exe is used to discover which Intel products and capabilities exist on your platforms This utility returns top level data about the hardware and software of each Intel product that exists on your platforms You can use this data to determine which Intel products you can enable on your plat
23. The Import and Export buttons are used to import and export the encryption key Only use these options if you want to backup the encryption key or move the RCS to a different computer For more information see Moving the RCS to a Different Computer on page 54 Intel SCS User Guide 77 Chapter 4 Using the Console 4 4 Creating Configuration Profiles By default Intel SCS supports configuration of Intel AMT Intel SCS can also configure other Intel products if you supply the correct type of configuration profile The Console supports creating configuration profiles for other Intel products by using a profile plugin After the profile plugin for a product is installed you can select configuration profiles for that product from the Profile Type drop down list To define a configuration profile 7 1 Inthe Console click Profiles and then clickL 4 The Profile Wizard window opens ixi In addition to configuring Intel AMT you can also use Intel SCS to configure other Intel products included in your systems Each type of product is configured using a different type of profile The wizard that opens when you dick OK will contain only the configuration options supported by the selected profile type Note Additional profile types are only available if the plugin for the relevant product is installed on the computer running the Console Profile Type Intel AMT hi Profile Name Description Figure 4 6 Profile Wizard Win
24. The number of systems to which the RCS could not successfully connect during the last operation e Unmanaged The number of systems in the Unmanaged state For each view and column in a view you can get data about the systems it contains To get data about systems 1 In the Console click Monitoring and select the Systems gt Views tab 2 Select the view for which you want to get details about the systems that it contains 3 Select a column in the view right click and select one of these e Show Systems Shows all the systems in the view For the Total Systems and Name columns this is the only available option e Show Systems this column only Shows only the systems that are in the column that was selected The List of Systems window opens fi List of Systems p Intel AMT FQDN a Intel AMT IPv4 Status Connection status intelamt 7 example domain 192 168 1 10 Configured Connected intelamt 7 1 example domain 192 168 1 11 A Unknown Connection status unknown intelamt 6 2 example domain 192 168 1 14 mg Unconfigured Pending Connection intelamt 6 0 example domain 192 168 1 13 Ey Configuration Failed Disconnected intelamt 5 4 example domain 192 168 1 12 CH Missing Configuration Data S Connected Figure 7 4 List of Systems Window 4 Click asystem in the list Data for the selected system is shown in the bottom section of the List of Systems The profile that was used during the last configurat
25. Whatis Inteli AM Ween cesocecee dhe adoteceiy otdie cath tens ndun Mae ea E A Sooo eta EE 4 1 4 Configuration Methods and Intel AMT Versions 022 2 222 e cece eee ee cece eee cece cece cece eceeeeees 4 1 4 1 Host based Configuration 22 0 ccc ccc eee cccccccccececccececccecccececccceececeececececeeess 5 1 4 2 SMB Manitial COnfiquiratiOn 2ccc22 5 5 ae tice sedis se awes E donee esate cadet oes 5 1 4 3 One Touch Configuration using PSK 2 0020 22 cece eee cee eect eee cece cece cece eee 6 1 4 4 Remote Configuration using PKI 22 0222 o lec cece cece eee eee cece eect eee eeeee 6 1 4 5 Configuration of Mobile Platforms 0 002 202 cece eee een eeecceeeeceee cece cece cess 6 1 4 6 Unified Configuration Process 22 22 2002 c cece cece cee ec eeeec cece eee e eee eeeeeeeeees 7 1 5 Intel AMT and Security Considerations 02 0000 c occ c cece ec eeececceeee ee eee eee eee eens 9 154 Password Formato oct ce e e a eoubedets EEE Meters dent E E tastes oes 9 1 5 2 Bile EMChY PUlOM Ae E SE NEE aire E dade dee ce eae buden ae E E ES 9 1 5 3 Digital Signing Of FileS 0 ccscecs se eee sclesaddenagsecciesabelense reai raeo r SE IRSE NEES 10 1 5 4 Recommendations for Secure Deployment 2 2 222 22 eee cece cece cece e cece ceeee cess 11 12525 CombrollMOdCSi 25 24225 open kn ssc aes Octet blade leak azu ace d obesls tise bisides a ae en ea 12 LSO USER COMSCING
26. ptions Field Operator starts with ends with contains equals Value A string containing the required part of the system s UUID that you want to include in the filter A string containing the required part of the FQDN defined in the Intel AMT device that you want to include in the filter A string containing the required part of the IPv4 address of the wired LAN interface defined in the Intel AMT device that you want to include in the filter The Intel AMT version By default the Value field of these options contains the current date and time You can edit the value directly in the field or click the drop down list arrow to select a date from a calendar From the drop down list select one or more configuration states see Configuration States on page 177 Hold down the lt Ctrl gt or lt Shift gt keys during selection From the drop down list select one or more profiles hold down the lt Ctrl gt or lt Shift gt keys during selection The managed state e Managed e Unmanaged For more information see Changing the Managed State of Systems on page 169 Note This field is not available in Jobs See Detecting and Fixing Host FQDN Mismatches on page 170 163 Chapter 7 Monitoring Systems 2 Optionally define more filter conditions a Click Add Row A new filter condition row is added under the existing row Search Filter ID Operator Field Field Operator Value A intel AMT FQDN x star ts with x
27. with a forward slash OutputFile lt filename gt PowerPackage lt guid gt UsingDhcp HostName lt host name gt DomainName lt domain_ name gt LocalHostIp lt ip gt SubnetMaskIp lt subnet_mask gt GatewayAddrIp lt ip gt DnsAddrIp lt ip gt SecondaryDnsAddrip lt ip gt EnableKVM lt false true gt EnableRemoteITConsent lt false true gt global options See CLI Global Options on page 125 NewMEBxPass The new password to put in the Intel MEBX see Password Format on page lt password gt 9 This parameter is mandatory even if the password has already been changed from the default of admin EnableUserConsent lt none kvm only all redirection gt CurrentME The current Intel MEBX password The default password of unconfigured lt password gt systems is admin This parameter is not required for systems that have the default password Intel SCS User Guide 135 Chapter 6 Using the Configurator PowerPackage lt guid gt Power Package GUID see Power Package GUIDs on the next page OutputFile lt filename gt The name of the file and the path to the location where you want to save it If this parameter is not used by default the file is created in the same folder as the Configurator The file must be named Setup bin and must be placed in the root folder of the USB key To make sure that Setup bin is the first fi
28. AD object for the Intel AMT device The values of the Service Principal Name SPN attribute in this object are used in Kerberos tickets during AD authentication If the AD forest contains more than one object representing the same Intel AMT device the Kerberos authentication will fail This is because identical SPN values exist for different objects The AD does not know which SPN to use and thus an error occurs Multiple objects can be created during reconfiguration when you change the AD Organizational Unit ADOU defined in the profile see Defining Active Directory Integration on page 90 If you do not use the ADOU flag in the CLI Intel SCS does not know the location of the old object and thus cannot delete it Solution Make sure that the AD forest contains only one AD object for each Intel AMT device If not 1 Manually delete the object from the old ADOU 2 Wait approximately 15 minutes or manually purge the Kerberos tickets You can use the Klist exe applicaton to purge the tickets 11 11 Error Kerberos User is not Permitted to Configure Usually this error will occur if all these conditions are true e The requested operation will change the FQDN setting in the Intel AMT device or the Intel AMT Active Directory object e The requested operation is run using a Kerberos admin user e The password of the default Digest admin user is not defined in the profile or supplied in the CLI command using the AdminPas
29. All Systems All systems that exist in the database e Host FQDN Mismatch See Detecting and Fixing Host FQDN Mismatches on page 170 You cannot edit or delete these default views Search To quickly find a specific system or group of systems For more information see Searching for a Tab System on page 166 You can also use the Views tab and the Search tab to get data about operation logs and the admin password For more information see e Getting the Admin Password on page 172 e Viewing Operation Logs on page 173 Intel SCS User Guide 160 Chapter 7 Monitoring Systems 7 2 About Adding and Deleting Systems You can only use the Console to monitor and maintain systems that exist in the database These CLI configuration commands automatically add the systems to the database e ConfigViaRCSOn1ly When you configure systems using this command they are always added to the database For information about how to use this command see Configuring Systems using the RCS on page 130 e ConfigAMT This command uses an XML profile as part of the unified configuration process In some conditions this command does not add the system to the database e Intel AMT 6 1 and lower These systems are always added to the database e Intel AMT 6 2 and higher These systems are added to the database only if the XML profile is defined to put the Intel AMT device in Admin Control mode This is defined when the profile is exported from the Console
30. Configurator must NOT be Run as administrator e Some reconfiguration and maintenance tasks reset the password of the AD object If this happens you must clear the ticket of the Kerberos user before this user can do more configuration operations You can do this by restarting the Intel AMT system or logging off and on again Intel SCS User Guide 16 Chapter 1 Introduction 1 7 Maintenance Policies for Intel AMT After a system is configured it is recommended to maintain and periodically update the configuration settings in the Intel AMT device If you do not your management console might lose connection with the Intel AMT device For systems where this occurs the Intel AMT features will not be available from your management console Also for increased security it is recommended to periodically renew the passwords used by Intel AMT Any password that is not changed regularly causes a risk that it might be discovered by persons without approval If a password is discovered it could be used to get access to the system via the Intel AMT device It is the responsibility of the network administrator to define and schedule the necessary maintenance tasks for their network environment Intel SCS includes two different methods for running maintenance tasks via Jobs or using the CLI It is recommended to select the method that is best for your network environment and use only that method 1 7 1 About Maintenance Tasks This se
31. Console A Console that you can use to connect to RCS installations on any computer Figure 3 5 Select Components Window Intel SCS User Guide 44 Chapter 3 Setting up the RCS 4 Select the check boxes of the components that you want to install on this computer e Remote Configuration Service RCS Installs the RCS e Console Installs the Intel SCS Console You can install this component on any computer that can connect to the computer running the RCS Note When installing the RCS make sure that the Non Database Mode option is selected 5 Click Next If you selected to install the RCS the RCS User Account window opens This window defines the user under which the RCS will run x RCS User Account intel Specify the Windows user account that will run the RCS on this computer Username Network Service Password Figure 3 6 RCS User Account Window In the Username field by default the Network Service account is selected It is recommended to run the RCS using this built in security account see Using the Network Service Account on page 35 6 Optional If you do not want to use the Network Service account a Click Browse The Select Users or Groups window opens b Enter the user that will run the RCS on this computer Enter the username in the format domain username In a Windows Workgroup enter the username in the format computer username c Click OK The Select Users or Groups window closes
32. Console is the user interface to the RCS The Console can be installed on the same computer as the RCS or any other computer that can connect to the RCS When the Console connects to the RCS the database mode of the RCS defines which options are available from the Console Non Database Mode EJ Intel SCS Console i Ta Monitoring A Profiles Profile Details Profile Name Profile1 Profile2 Profile Type Intel AMT Network Settings FQDN will be the same as the Primary DNS FQDN TP will be taken from DHCP Network Configuration WiFi Do not enable synchronization of Intel AMT with host platform WiFi profiles Database Mode EI Intel SCS Console G00 Gm Profiles Profile Details Profilel i Profi a3 Profile Name Profile1 Profile Type Intel AMT Network Settings FQDN will be the same as the Primary DNS FQDN TP will be taken from DHCP Network Configuration WiFi Do not enable synchronization of Intel AMT with host platform WiFi profiles Each window of the Console includes context sensitive help that shows when you press F1 or click the help icon Intel SCS User Guide 70 Chapter 4 Using the Console Table 4 1 This table describes the options available from the Console Sp Prois Intel SCS User Guide To do this To work with profiles when in database mode When selected this button has a green background Delete the profile s selected in the l
33. EEES SSE EE ERESSE 125 6 4 CLEGIODAIOPtONS essre cee el esis Sa ceox cated baa dew Sian a S Eee hts Semon ca bads 125 6 5 Verifying the Status of INtellAM Tone ons cook eee setae tene gece ddeaa a ria E rieti aa a latent 126 6 6 Discovering SySteMS 2 2 22 cee eee eee eee eee eee eee eee PESEE EIE EEKE 126 6 7 Configuring Systems Unified Configuration 0 2 002222 c cece cece cece cece cece cence eeeeee 129 6 8 Configuring Systems using the RCS 2 022 ee cee eect eee ect aaao 130 6 9 Adding a Configured System 2 e cece cece eee cece cece cece eee e estes eee eeeeeeeeeeeees 132 6 10 Creating TLS PSK Pairs scc0 cos cee cides ectiauaieciuindinb aaia E Basi saded Sc AE EE EENE I RETE DNES 133 6 11 Configuring a System using a USB Key 2 022 eee eee cece cece eee eeeee 135 6 11 1 Power Package GUIDS o corces eee ee eee eee ee a 137 6 12 Maintaining Configured SystemS 2 2 22 222 2 c cece ccc eee cee eee eee cence eee eee raaa 138 6 13 Maintaining Systems using the RCS 02 222 o cece ccc ec eee cee ee cee eee ceee ee eeeeeee 140 6 14 Unconfiguring Intel AMT Systems ou nf cssac eee fs bce eo poe adie be dade ee Peed ace bose 142 6 15 Moving from Client Control to Admin Control 2 0 222 22 eee e eee cee e ec eeeeeee 145 Intel SCS User Guide v 6 16 Disabling Client Control Mode 0 2 02222 eee eee cee cence ec nanan 147 6 17 Sending a Hello Message
34. Enterprise CAs you must also make sure that the templates used by Intel SCS are not defined to require approval Make sure that the CA certificate manager approval check box is NOT selected Shown in yellow in this figure Figure 9 1 Request Handling Tab RemoteTemplate Properties 2 x Generel Request Handing SubjectName Issuance Requirements Superseded Templates Extensions Security Require the following for enrollment J This number of authorized signatures p F you require more than one signature autoenrollment is not allowed Policy type required in signature Figure 9 2 Issuance Requirements Tab Intel SCS User Guide 190 Chapter 9 Preparing the Certification Authority 9 2 4 Running the CA on Windows 2003 If the RCS is installed on a server running Windows Server 2008 all x32 64 versions and R2 and the CA is installed on a server running Windows Server 2003 1 On the computer running the CA select Start gt Run gt Dcomcnfg Select Component Services gt Computers Right click My Computer and select Properties Select the COM Security tab In the Access Permissions section click Edit Limits Au AWN Select the RCS user account and grant it these permissions e Local Access e Remote Access 9 2 5 Defining Enterprise CA Templates If you use Intel SCS with an Enterprise CA to configure Intel AMT features to use certificate based authentication you must define certificate templates
35. IP settings can only be set in a device that is in a fully unconfigured state before rebooting with the USB key The subnet mask static IP address to set in the Intel MEBX GatewayAddrip lt ip gt The default gateway static IP address to set in the Intel MEBX DnsAddrIp lt ip gt The preferred DNS static IP address to set in the Intel MEBX Intel SCS User Guide 134 Chapter 6 Using the Configurator SecondaryDnsAddrIp An alternate DNS static IP address to set in the Intel MEBX 6 11 Configuring a System using a USB Key Description Creates a file containing configuration settings When the Intel AMT system is rebooted with a USB key containing this file Intel AMT is configured on the system For more information see SMB Manual Configuration on page 5 The Configurator does not restrict the size of USB key you can use But the computer BIOS must fully support the selected USB key and be able to boot from it Note e The settings you can define are limited If additional settings are required they must be performed by a third party application This command puts the Intel AMT device in the Admin Control mode see Control Modes on page 12 You can use this option to define certain KVM parameters not available in Client Control Syntax ACUConfig exe global options ConfigViaUSB NewMEBxPass lt password gt CurrentMEBxPass lt password gt Note The CLI does not support passwords that start
36. If selected you can use this USB key to configure only systems that have Intel AMT 7 x and higher The data in the USB key is scrambled so it cannot easily be read Make sure that you keep this USB key in a secure location The data in the USB key is NOT encrypted even if it is scrambled In the Configuration Settings section enter the password for the Intel MEBX e Old Intel MEBX Password Intel SCS always puts the default password of unconfigured systems admin in this field If this is not the password currently defined in the Intel MEBX enter the correct password If you do not supply the correct password configuration will fail e New Intel MEBX Password The new password to put in the Intel MEBX For the first configuration it is mandatory to change the password For reconfiguration you must also enter a value here but it can be the same as the Current Password For information about the required format see Password Format on page 9 From the drop down list define in which power states of the host system the Intel AMT device will operate e Always On SO SS5 If the system is connected to the power supply the Intel AMT manageability features are available in any of the system power states This is the recommended setting e Host is On SO The Intel AMT manageability features are available only if the operating system of the Intel AMT system is up and running Optional By default the user cons
37. Intel AMT 4 0 and higher Intel SCS User Guide 96 Chapter 5 Defining Intel AMT Profiles 5 7 Defining Home Domains The Home Domains window of the Configuration Profile Wizard lets you define a list of between one and five home domains If configured these home domains are the only domains in which access to Intel AMT is permitted When Intel AMT detects that the systems is located outside these home domains remote access to Intel AMT is blocked Configuring a system with incorrect home domains might cause remote access to Intel AMT to be permanently blocked If this occurs it will also not be possible to remotely reconfigure Intel AMT on these systems E Configuration Profile Wizard Profile1 re Optional Settings Home Domains Home Domains List Getting Started Profile Scope Optional Settings AD Integration Access Control List Remote Access Transport Layer Security Network Configuration System Settings Finish This is an advanced configuration option and must be used with caution You can use this option to configure between one and five home domains in Intel AMT If configured the home domains are the only domains in which access to Intel AMT is permitted When Intel AMT detects that the system is located outside these home domains remote access to Intel AMT is blocked li Edit WARNING INCORRECT USE OF THIS OPTION MIGHT CAUSE REMOTE ACCESS TO INTEL AMT TO BE PERMANENTLY BLOCKED
38. Kee eke e eases Sense yO eke eee be We Lea eee sense eos 165 7 9 Searching fora SYSTEM 05 fans cc vennsesintesdeadeiaaaiestnadaeeasdebscduissee sie unccedascestscantcseoetGemeae en 166 7 6 Sorting the List of SYStEMS 2240 cses seed ceee senso eeu ssuwbees bisa dung Soaks sa eee Sy eseuncde de UE ee ESS 168 7 7 Changing the Managed State of Systems 2 2 02 2 occ eee cee ee eee cece eee eeee 169 7 8 Detecting and Fixing Host FQDN Mismatches 2 222220 e eee eee ee eee 170 7 9 Getting the Admin Password 22 0 20 20 2 ccc cece eee eee eee ee eee eee eee ee eee ee eeeeeee 172 7 0 Viewing OperationiOgs 22 2226 cn cen access eeeaied ana tau sie Soe a TAREE E eles odes dsssee ads ESS 173 7 11 Viewing Discovery Data 0 00002 o icc ec ee eee eee eee eee a cee eee eee ESEE En 175 7542 COMMOUPALION StAtGS scn ok as east ee den aE A aa a ae aa a Soke deed 177 Chapter 8 Managing Jobs and Operations _ 2 2 02 22 c cece eee eee ee cence eect eee cess 178 8 1 About Jobs and Operations 2 222 ccc eect ee cece cence aoaaa arana 179 8 2 Viewing the List of Jobs 0 00 02 loc ee eee cee eee eee eee e cece eee ee eeee 180 8 3 JOD Operation MY PS e redin wie ctf delete eee tek ie ates Okada brie een ce ee denen ees toe ae 181 84 JOD StatlSCS noes nanan ncaa A mets nea E E E EE 183 O85 Creating IOB 22 22 32 cerssc nce daa cecete eaare de Geddes se tee eeu acd uate deena dcewecetuscssi
39. MPS Server FQDN or IP Address Port eo E Server Authentication The trusted root certificates used by the system to authenticate the MPS must appear in the list below If they do not use the Edit List option Edit List Common Name CN System Authentication System authentication is certificate based Select the method for creating the certificate Request certificate from Microsoft CA ba Certificate Authority Client Certificate Template Refresh CAs amp Templates Common Names CNs in certificate gt DefaultCNs User defined CNs System authentication is password based Username Password i TE Show password Figure 5 10 Management Presence Server Properties Window 2 Inthe Server FQDN or IP Address field enter the FQDN or IP address of the Management Presence Server 3 Inthe Port field enter the Port that the Management Presence Server listens on for connections from Intel AMT systems Intel SCS User Guide 99 Chapter 5 Defining Intel AMT Profiles 4 Click Edit List to define the location of the trusted root certificates that will be used by Intel AMT systems configured with this profile see Defining Trusted Root Certificates on page 102 5 Ifyou entered an IP address in the Server FQDN or IP Address field you need to enter the FQDN in the Common Name field If you entered the FQDN in the Server FQDN or IP Address field the Common Name field is disabled 6 D
40. Pte eaea ia a a ie cake Gane ats 24 2 2 Supported Intel AMT Versions 2 2 2 2 2 cece ec ce cece ce cecccecccceeececeececceecececececeeeceeeeceseeeee 28 2 3 Supported Operating Systems 00222 o oo eee oe eee eee eee eee eet cece ee EE EEr Eai 29 2 4 Support fora Workgroup Environment 0 2 022 222 cece cece cee cece ee eee e eee cece cece ceeeeceeeeeees 30 2 5 Required User Permissions 22 0 222 00 e ccc c cece e cece e eee cece eect cece eee eect cece eeeeeceeeeeees 31 Intel SCS User Guide jii Chapter 3 Setting up the RCS 6 2 20 cee ee eee cee eee cece eee eee 32 Sol Aboutithe E S ccs sce ees eet os ecdacsaeec E ce cae sed sous loedvessencea teases tlcdd edi otcecadeu sees 33 3 2 Selecting the Type of Installation 0 00 0 o ooo ee cece eeeeeee 33 3 3 Using the Installer seerias a cee ating faon tes oe a aa a aaa Ei 34 3 4 RCS User Account Requirements 0 2 20002 e cece cece cee eee eee eee eee cee e eee eeeeeeeeeeees 34 3 5 Using the Network Service ACCOUNL 22 22 ccc ccc eceecccccecccceccccceccceeeccccueececceececceeceeeeeeees 35 3 6 Installing Database Mode 2 2 2 2 eee cence eee e eee eeeeeeeeeeee 36 3 6 1 Supported SQL Server Versions 2 2 2 2 2 cece cece eee cece eee eee eee eee eee eee eeeeeee 36 3 6 2 Installation Permissions in SQL Server 2 2 2 2 oe cece cee cee cece cece ceeceeceeeceeeeeeeees 36 3 6 3 RCS User Permissions in SQL S
41. RCS 3 6 3 RCS User Permissions in SQL Server The RCS requires permissions on the Intel SCS database in SQL Server During installation if you let the Database Tool create the User and Login for the RCS this is what the Database Tool creates e AUser in the Intel SCS database with these Role Member settings e db_datareader e db_datawriter e An explicit Login ID for the User that is mapped to the Default Schema of dbo You have two options for how the RCS will connect to the Intel SCS database e Windows authentication The RCS will use the credentials of the Windows user account that is running the RCS RCSServer exe e SQL Server authentication The RCS will use the credentials of an SQL Server user This method of authentication is considered less secure In addition the Login ID and password of the SQL Server user are saved in the registry of the computer running the RCS the password is encrypted During installation of the RCS you must select the authentication method in the Database Settings window of the installer When using the Database Tool to add the user to the database use the RCSUserWinAuth parameter of the AddUser command to specify the authentication method 3 6 4 Creating the Database In many organizations the company databases are managed by a database administrator DBA Usually the DBA will want to control how the Intel SCS database is installed The DBA or you can use the Database Tool located in the
42. RCS appear in the list and have these permissions Local Launch Remote Launch Local Activation and Remote Activation c Click OK The Launch Permission window closes Click OK The My Computer Properties window closes From the Console Root tree select Component Services gt Computers gt My Computer gt DCOM Config gt RCSServer Right click RCSServer and select Properties The RCSServer Properties window opens Click the Security tab The Security tab opens From the Configuration Permissions section a Select Customize and click Edit The Change Configuration Permission window opens b Make sure that all users that need to connect to the RCS appear in the list and have the Full Control and Read permissions c Click OK The Change Configuration Permission window closes d Click OK RCSServer Properties window closes Close the Component Services window Intel SCS User Guide 48 Chapter 3 Setting up the RCS 3 8 2 Defining WMI Permissions Intel SCS includes four namespaces that control access to the RCS e Intel RCS Give permissions to this namespace to users who need to do operations on Intel AMT systems using the RCS The user account running the Configurator needs permissions on this namespace e Intel RCS Editor Give permissions to this namespace to users who need to connect to the RCS to define profiles or settings in the RCS It is recommended to give permissions to this namespace only to users who ar
43. RCS folder to create the database before you install the RCS The Database Tool DatabaseTool exe is a simple CLI that you can use locally on the SQL Server or remotely When complete the CreateDB command creates a storage encryption key file The file is encrypted with a password that is printed to the screen in the CLI output of the command Make sure that you save this file and password in a secure location You will need them later This is the syntax and parameters for the CreateDB command DatabaseTool exe CreateDB DBServer lt DB server gt DBName lt DB name gt Username lt SQL Login ID gt Password lt SQL password gt KeyFileName lt filename gt The name FQDN or IP address of the SQL Server The name of the database Intel SCS User Guide 37 Chapter 3 Setting up the RCS Username By default the credentials of the user account running the Database Tool are used to authenticate with SQL Server If you want the Database Tool to use SQL Server authentication instead use this parameter to supply the Login ID Password The password of the SQL Server account only necessary if the user was supplied in the Username parameter KeyFileName By default the Database Tool creates an encryption key file named RCSStorage key in the folder where the Database Tool is located You can use this parameter to supply an alternative path and filename Examples Example 1 Cre
44. This procedure shows how to create a template containing the correct settings for Intel AMT For settings specific to your organization such as certificate expiration specify the values you require You must also make sure that the CA and the template are not defined to put certificate requests into the pending status For more information see Request Handling on the previous page To create a certificate template 1 From your Certificate Authority server select Start gt Run The Run window opens 2 Enter mmc and click OK The Microsoft Management Console window opens 3 Ifthe Certificate Templates plug in is not installed perform these steps a Select File gt Add Remove Snap in The Add Remove Snap in window opens b Click Add The Add Standalone Snap in window opens c From the list of available snap ins select Certificate Templates click Add and then click Close The Add Standalone Snap in window closes d Click OK The Add Remove Snap in window closes and the Certificate Templates snap in is added to the Console Root tree Intel SCS User Guide 191 Chapter 9 Preparing the Certification Authority 4 From the Console Root tree double click Certificate Templates The list of templates is shown in the right pane ti Console1 Console Root Certificate Templates f File Action View Favorites Window Help e 2 Console Root QA Certificate Templates Gu Windows 2000 GA subordinate Certification A
45. Transport Layer Security window of the configuration profile see Defining Transport Layer Security TLS on page 104 Note A Certification Authority is a prerequisite for TLS item 6 in this checklist If using Microsoft CA the CA can be an Enterprise CA or a Standalone CA Intel SCS User Guide 26 Chapter 2 Prerequisites Getting Started Checklist for Intel SCS Does your network use the 802 1x protocol If your network uses the 802 1x protocol you must define 802 1x setups in the configuration profile If you do not do this you will not be able to connect to the Intel AMT device after it is configured If you need to define 802 1x setups this is the data that you need to collect e Which 802 1 x protocol is used in your network e Doyou want to verify the certificate subject name of the RADIUS Server You can verify using the FQDN or the domain suffix of the RADIUS server make a note of the correct value that you want to use 802 1x is defined in the Network Configuration window of the configuration profile see Creating 802 1x Setups on page 111 Note These are prerequisites for 802 1x Integration with Active Directory item 5 in this checklist A Certification Authority item 6 in this checklist If using Microsoft CA the CA must be an Enterprise CA Intel AMT does not support 802 1x when using static IP addresses This means that both the host operating system and the Intel AMT device must be configured t
46. User Guide 110 Chapter 5 Defining Intel AMT Profiles 5 11 2 Creating 802 1x Setups The IEEE802 1x network protocol provides an authentication mechanism to devices wishing to attach to a LAN either establishing a point to point connection or preventing it if authentication fails It is used for most wireless 802 11 access points and is based on the Extensible Authentication Protocol EAP You can include the 802 1x setups you define in the profile for wireless and wired connections The EAP GTC protocol can only be used in 802 1x wired setups 802 1x setups require integration with Active Directory see Defining Active Directory Integration on page 90 and an Enterprise root CA To create an 802 1x setup 1 From the WiFi Setup window or the Wired 802 1x Authentication section of the Network Configuration window click Add The 802 1x Setup window opens Gj 802 1x Setup Definition Setup Name Protocol EAP FasT MS CHAP v2 7 Authentication Select the method for creating the certificate Request certificate from Microsoft CA x Certificate Authority 7 z Client Certificate Template Refresh CAs amp Templates Common Names CNs in certificate DefaultCNs User defined CNs I Roaming Identity Select the trusted root certificate used to authenticate the RADIUS server from the list below If it does not appear in the list use the Edit List option D o itis RADIUS Server Verification
47. When you export the profile select the Put locally configured devices in Admin Control mode check box see Exporting Profiles from the Console on page 79 For information about how to use this command see Configuring Systems Unified Configuration on page 129 Intel SCS includes an additional CLI command NotifyRCS that you can use to manually add configured systems to the database If you have systems that are already configured but not in the database you can use this command to add them to the database You can also use this command to add systems that were configured in Client Control mode using ConfigAMT For information about how to use this command see Adding a Configured System on page 132 If necessary you can delete systems from the database For example when computers are moved or changes are made to the network the RCS might lose connection with some systems The Console can only run jobs and operations on systems to which the RCS can connect To delete a system 1 In the Console click Monitoring and select the Systems tab 2 Locate and select the systems using the Views tab or the Search tab 3 Right click and select Delete System You cannot delete a system if it is part of a job and the job is in one of these statuses Aborting In Progress and Loading Intel SCS User Guide 161 Chapter 7 Monitoring Systems 7 3 Creating a View A view is a query defined using the WMI Query Lan
48. a username and password This option is shown only if client certificates are optional for the Protocol selected in step 3 Continue from step 6 Intel SCS User Guide 112 Chapter 5 Defining Intel AMT Profiles 5 Ifthe certificate will be requested from a Microsoft CA do these steps a From the Certificate Authority drop down list select the Enterprise CA that Intel SCS will use to request a certificate that the RADIUS server can authenticate b From the Client Certificate Template drop down list select the template that will be used to create the client certificate The templates shown are templates where the Subject Name is supplied in the request and the usage is Client Authentication For information how to create a template see Defining Enterprise CA Templates on page 191 c Define the Common Names that will be included in the Subject Name of the generated certificate For more information see Defining Common Names in the Certificate on page 198 e Touse this option Intel SCS must have access to the CA during configuration see Required Permissions on the CA on page 189 e Ifyou are creating the profile on a computer that does not have access to the CA the drop down lists will not display the CA or the templates If necessary you can manually supply the CA name in the format FQDN CA Name and the name of the template 6 Optional To enable roaming select the Roaming Identity check box The user will connec
49. and time in the future Jobs in this status can also be recurring jobs that will automatically run according to an interval of days that you define Preparing Job A manual job was created and the RCS is currently preparing the list of systems on which the job will run When complete the status of the job will change to Waiting Waiting The job has not started yet This is the status of all new manual jobs until you start the job see Starting Aborting and Deleting Jobs on page 187 In Progress The job has started to run The job will stay in this status until the operation has run on all systems or the job is aborted Completed The job was run on all systems This does not mean that the job was successful on all the systems The other columns in the list of jobs show the status summary This status is only relevant for non recurring jobs After a recurring job has completed the status of the job will change to Scheduled Aborting The job was aborted but the operation is still running on the systems where it had already started to run before the job was aborted After the operation has run on all systems where it is already running e For non recurring jobs the status of the job will change to Aborted e Forrecurring jobs the status of the job will change to Scheduled Aborted The job was aborted and the operation has run on all the systems where it had already started to run before the job was aborted 8 5 Cre
50. aonn 56 3 41 1 Before Starting the Upgrade 0 oc ose bo tec ece eee dese i sa eset sees sang csedenessseeeeaes 56 3 11 2 Upgrading Non Database Mode 2 2 222222 eeeeeeee 57 3 11 3 Upgrading Database Mode 2 222 2 e eee e eee eeeeee 60 3 11 3 1 Upgrading the Database _ 2 222 22 60 3 11 3 2 Upgrading the RCS and Console 2 2 lec e cece cece cc ceeccceeccceeececeeceees 61 3 212 Silent Install tiOM 622s actos ste shacks faced igen el e ea eee Eee AEE E aeae ee ieee acuh cw eases 65 Chapter 4 Using the Console 2 2 2 0 2 cece ccc ene eee eee eee ra erranaren renren 69 41 Abo tthe Console 2 20 22 dsce cacscestestecs ci ddedddacscasettee elk dlsddedscsscesdesy sea dacdsdescscsssaaenssce dss 70 4 2 Connecting to the RCS lle c cece cece cece eee cceeeecececececeecccceuecececececececececeeeeeeeeeees 72 453 Defining the RCS Settings 2 22 25 2 sores odds sodas n a a bagdecadacenccsaind seaoteseasesoucs 73 4 4 Creating Configuration Profiles 0022 02 22 c ccc ec 0000000000000100 000a cece ee eeeee eee 78 4 5 Exporting Profiles from the Console 2 002 2 2 2c c cece cece eee ee eect cece cece ec eeeeeeeeeees 79 4 6 Defining Manual Configuration Multiple Systems 22 0 222 0222 eee eee cee eee eee eee cece cece eeeee 81 4 7 Importing PSK Keys from a File 22 0022 22 ccc ccc ence ee cee eee cece cece eee aoan 83 Intel SCS User Guide iv C
51. authority example 1 CRL gt lt cert serialnumber 15 27 82 20 00 00 00 00 00 01 gt lt cert serialnumber 15 27 82 20 00 00 00 00 00 02 gt lt cert serialnumber 15278220000000000003 gt lt uri gt lt uri name http certification authority example 2 CRL gt lt cert serialnumber 15 27 82 20 00 00 00 00 00 04 gt lt cert serialnumber 15 27 82 20 00 00 00 00 00 05 gt lt uri gt lt crl gt For the serial number attribute e Use exactly two hexadecimal characters for each byte a byte with a single character will be ignored e The serial number can be represented as a single hexadecimal number If the bytes are separated from each other use any printable non hexadecimal character separator between each pair Intel SCS User Guide 200 Chapter 10 Setting up Remote Configuration This chapter describes the prerequisites and procedures to setup remote configuration For more information see 10 1 10 2 10 3 10 4 10 5 10 6 About Remote ConfiguratioM rosessi re EE E Ea a AEE RE EE E NRE 202 Prerequisites for Remote Configuration 0 0 0222 c cece cece cee e ee cece ee cee eee eee eeeeeeeee 203 Selecting the Remote Configuration Certificate 2 lt i scaagcccceecstanaeacebenantascdsecccamasecscccame 203 Acquiring and Installing a Vendor Supplied Certificate 0 0 00220 c cece ee cece ee 204 Creating and Installing Your Own Certificate 2 2 2002220022 cece eee ee
52. built in Network Service account it is not necessary to create a user account This account is more secure but has some limitations and special considerations see Using the Network Service Account on the next page e Ifyou do not use the Network Service account create a dedicated user account that will be used only for the RCS It is NOT recommended to use a group account You must define a password for this user account and make sure that you always renew the password before it expires If the password expires the RCS will stop working If the RCS is installed on a server running Windows Server 2008 all x32 64 versions and R2 the RCS user account must be a Local Administrator on that server When you install the RCS the installer will automatically give these permissions to the selected user account e Log on asa service permission e Read permission on the folder containing the RCSServer exe file e For non database mode installations only Read Write permissions on the folder RCSConfServer containing the data files used by the RCS see Location of RCS Log Files on page 50 The permissions are given on the computer where the RCS is installed Intel SCS User Guide 34 Chapter 3 Setting up the RCS 3 5 Using the Network Service Account The Windows operating system includes a built in security account named Network Service During installation of the RCS you can select this account to run the RCS When the RCS runs
53. changes to this tab you can no longer change the template name Template name Copy of Computer Validity period Renewal period 1 years Le 6 weeks T J Publish certificate in Active Directory Do not automatically reenrollif a duplicate certificate exists in Active Directory Cancel Apply Figure 10 3 Properties of New Template Window If the CA is installed on a server running Windows Server 2008 all x32 64 versions and R2 the Duplicate Template window opens Make sure that you select Windows Server 2003 Enterprise and click OK Make sure that the Publish certificate in Active Directory check box is NOT selected In the Template display name field enter a name for the template Click the Extensions tab The Extensions tab opens From the list of extensions select Application Policies and click Edit The Edit Application Policies Extension window opens Click Add The Add Application Policy window opens Click New The New Application Policy window opens Enter a policy name and in the Object Identifier field enter this OID for remote configuration 2 16 840 1 113741 1 2 3 Intel SCS User Guide 208 Chapter 10 Setting up Remote Configuration 13 Click OK to return to the Add Application Policy window click OK to return to the Edit Application Policies Extension window and click OK to return to the Properties of New Template window 14 Click the Subject Name tab and select Supply in th
54. completed successfully Intel AMT is already configured on this system Intel AMT is already unconfigured on this system This system does not have Intel AMT or it is disabled in the Intel MEBX or the correct drivers are not installed or enabled This system supports Intel Small Business Advantage Intel SBA and cannot be configured by Intel SCS components Intel SBA systems were specifically designed for small businesses and can only be configured using the software included with Intel SBA The RCS failed to process the request The Intel AMT device does not have a PSK prerequisite for the requested operation Invalid command parameter The system is not in Intel AMT mode check the manageability setting in the Intel MEBX The manageability mode has been changed to AMT You must reboot the system to complete this operation 1 Failed to change to Intel AMT mode check the manageability setting in the Intel MEBX An internal error has occurred in Intel AMT Invalid format used in the new Intel MEBX password parameter refer to the documentation m Invalid format used in the current Intel MEBX password parameter refer to the documentation Cannot write the USB configuration data to file possible reasons the specified path does not exist no write permissions not enough free space Failed to create the USB configuration file invalid IP Failed to create the USB configuration file invalid power package An internal
55. component run the installer again after upgrade is complete Click Next The License Agreement window opens 4 Select I accept the terms of the license agreement and click Next The RCS User Account window opens E Intel SCS Installer RCS User Account Username EXAMPLE Administrator Password Figure 3 12 RCS User Account Window 5 Supply the password of the user account under which the RCS runs on this computer The Network Service account does not require a password Intel SCS User Guide 57 Chapter 3 Setting up the RCS 6 Click Next If the installer detects that the RCS has not been disabled the Disable RCS window opens E Intel SCS Installer Disable RCS The installer has detected that the RCS is not disabled Before starting the upgrade process you must stop and disable the RCS To do this you can Manually stop the Windows service named RCSServer and change the E Startup Type to Disabled 0OR n Click Disable RCS to let the installer attempt to stop and then disable the RCS Disable RCS Figure 3 13 Disable RCS Window If this window is shown you can either e Manually stop the Windows service named RCSServer and change the Startup Type to Disabled It is not necessary to close the installer OR e Click Disable RCS to let the installer attempt to stop and then disable the RCS When the installer detects that the RCS is disabled a message is shown an
56. device possible reasons the network card is disabled the network connection is disabled the network cable is unplugged Failed to connect to the Intel AMT device possible reasons the system does not have Intel R AMT or is not responding user access to it is denied 71 The buffer maximum size supplied in the function is too small Failed to put the system in the Pre Provisioned state you can try to unconfigure the system using the Intel MEBX Full Unprovision option n 62 65 7 6 jo N Ww 74 Failed to complete the Setup operation on this Intel AMT device 75 Failed to complete remote configuration of this Intel AMT device 76 The file supplied in the FileToRun parameter returned an error when it was run 77 Missing mandatory parameter Failed to put the Intel AMT device in the In Provision state The Start Configuration operation failed Examine the Intel MEBX settings to make sure remote configuration is enabled or a TLS PSK pair is defined 79 Failed to connect to the Intel Management Engine Interface PTHI client Failed to complete the System Discovery Failed to run the file supplied in the FileToRun parameter 82 The FileToRun parameter is not permitted for configuration methods using a Remote Configuration lee p Server 83 The Intel Management Engine Interface driver is not installed or cannot be accessed Intel SCS User Guide 156 Chapter 6 Using the Configurator Descrip
57. device through the tunnel For remote access to work the Intel AMT system must first be configured when it is inside the enterprise with the information needed to connect with the MPS Configuration Profile Wizard Profile1 i x Optional Settings Remote Access Management Presence Servers Getting Started Specify at least one management presence server MPS to authenticate systems that are Profile Scope outside of the firewall Optional Settings AD Integration Access Control List Home Domains Remote Access Policy List Transport Layer Security Specify at least one Remote Access policy to allow systems outside the firewall to connect Network Configuration to a management console within the network via an MPS listed above System Settings Finish Figure 5 9 Remote Access Window To define the remote access parameters see these topics e Defining Management Presence Servers on the next page e Defining Remote Access Policies on page 101 Intel SCS User Guide 98 Chapter 5 Defining Intel AMT Profiles 5 8 1 Defining Management Presence Servers You can define up to four Management Presence Servers in a configuration profile To define a management presence server 1 From the Management Presence Servers section of the Remote Access window click Add The Management Presence Server Properties window opens E Management Presence Server Properties Details Specify the location and listening port of the
58. digital certificates that can identify an individual or an organization These topics include information about how and when these protocols are used e Security Before and During Configuration below e Security After Configuration on the next page 1 5 8 Security Before and During Configuration The host based configuration method does not send information to the RCS Configuration is done locally and thus TLS is not necessary and not used But to increase security make sure that the XML files are encrypted see Recommendations for Secure Deployment on page 11 Configuration requests sent from an Intel AMT system to the RCS contain security related information about the network environment Thus Intel AMT uses one of the TLS protocols PSK or PKI before and during the configuration process The type of TLS protocol that can be used depends on the version of Intel AMT e Intel AMT 2 1 2 5 Only support PSK You must change the Intel MEBX password of these Intel AMT systems from the default password After you install a PSK configuration key and change the password you must reboot the Intel AMT system e Intel AMT 2 2 2 6 3 x and higher Support PSK and PKI To use PKI the Intel AMT system must have a Root Certificate Hash pre programmed in the firmware usually by the manufacturer You must also install a client certificate on the computer running the RCS Intel SCS User Guide 13 Chapter 1 Introduction 1 5 9 Security Afte
59. fe The Intel MEBX password of the Intel AMT device The password of the default Administrator admin user in the Intel AMT device String Example fileusername fileuserpassword myhostname myhostname example com 88888888 8887 8888 8888 878888888888 mebxpassword adminpassword Parameters marked with an asterisk are sent to the script in Base64 format 6 19 3 Who Runs the Scripts Scripts are usually run by the component Configurator RCS that does the requested operation But the Intel AMT version the command you use and the control mode can all cause different scripts to run Intel AMT 6 1 and Lower Operations on these systems can only be done remotely by the RCS This means that scripts are always run only by the RCS The Configurator scripts and the FileToRun parameter if supplied are always ignored Intel AMT 6 2 and Higher Operations on these systems can be done by the Configurator or the RCS e Ifyou use the ConfigViaRCSOn1y or MaintainViaRCSOnly commands only the RCS scripts are run e Ifyou use the MaintainAMT command the Configurator scripts will run only if the FileToRun parameter is used The RCS scripts are not supported e Ifyou use the ConfigAMT command e The Configurator scripts will run only if the FileToRun parameter is used e Onunconfigured systems if the control mode setting in the XML profile is defined as Admin Control mode the RCS scripts will run This means that if
60. file gt RCSBusyRetryCount lt retries gt AbortOnFailure Intel SCS User Guide If configuration fails put the Intel AMT device in the Not Provisioned mode This parameter is applicable only for systems that were unconfigured when the command started during reconfiguration this parameter is ignored 130 AdminPassword lt password gt WMIUser lt username gt WMIUserPassword lt password gt ADOU lt ADOU path gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt Intel SCS User Guide Chapter 6 Using the Configurator The current password of the default Digest admin user defined in the Intel AMT device This parameter is NOT necessary if any of these are true The device is in an unconfigured state Intel SCS can find the Digest admin password in one of the profiles or using a Digest Master Password The user account running the RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions The name in the format domain username of a user with WMI permissions on the computer running the RCS This parameter is only required if you run the Configurator with a user account that does not have WMI permissions on the RCS computer The password of the WMI user The path to the Active Directory Organizational Unit ADOU containing the AD object of configured systems If this parameter is supplied the RCS will delete th
61. files or in an SQL database If one of the data files or database tables is damaged or missing the RCS cannot operate correctly Thus it is important to make a regular backup If you need to restore data from a backup make sure that you stop the RCS first After the data is restored restart the RCS If you installed RCS in e Database Mode Schedule a regular backup of the database in SQL Server e Non Database Mode Make regular backups of the data files and store them in a secure location You can use any backup method or application that will let you recover the data files when necessary In non database mode the data used by the RCS is kept in these encrypted files e Profile xml The configuration profiles e PSKsStorage dat PSK keys for the One Touch Configuration method e DMP dat Digest Master Passwords This file only exists if at some time the RCS was set to use the Digest Master Password option see Security Settings Tab on page 76 The data files of non database mode are stored in a folder named RCSConfServer in the user profile directory of the account running the RCS The location of the folder depends on the version of the operating system e Windows 5 x Documents and Settings Username Local Settings Application Data Intel_Corporation e Windows 6 x Users Username AppData Local Intel_Corporation If you install the RCS with the Network Service account e Windows 5 x Documents and Settings NetworkService Local Se
62. for each feature By default Intel SCS puts the DNS Host Name in the Subject Name field In addition the Subject Alternative Name will include these CNs DNS Host Name Host Name SAM Account Name User Principal Name and the UUID of the Intel AMT system Some RADIUS servers require a specific CN in the Subject Name field If you need to define a different CN in the Subject Name field you can do this by selecting the User defined CNs option for each feature How does the CA handle certificate requests Intel SCS does not support pending certificate requests This means that the CA must be setup to issue certificates immediately without requiring approval If you have an Enterprise CA you must create certificate templates in the CA before you define the profile For more information see Defining Enterprise CA Templates on page 191 Note Intel SCS can request certificates from a Microsoft CA or via a CA plugin For more information see e Using Intel SCS with a Microsoft CA on page 189 e Using Intel SCS with the CA Plugin on page 197 Does your management console require the Intel AMT system to use Transport Layer Security TLS When TLS is enabled the Intel AMT device authenticates itself with other applications using a server certificate If mutual TLS authentication is enabled any applications that interact with the device must supply client certificates that the device uses to authenticate the applications TLS is defined in the
63. in the configuration request If the OTPs are not the same the RCS will not start the configuration The RCS always ignores OTPs sent from systems with Intel AMT 3 x and lower By default the RCS is defined to require this OTP validation You can change this default see Defining the RCS Settings on page 73 These are the main reasons that you might want to remove this OTP validation e If you want to use WMI commands to send remote configuration requests without an OTP For increased security the Configurator always sends the OTP in the configuration request e Ifyou want to use jobs to configure unconfigured systems using the RCS see Configuration via Jobs Fails because of OTP Setting on page 222 Simplified One Touch An IT administrator can enter the RCS FQDN or PKI DNS Suffix via the Intel MEBX menu or with a USB key The Intel AMT system verifies that the FQDN in the RCS certificate matches the entered value This feature is also known as Secure DNS since providing an FQDN or PKI DNS Suffix is more secure than depending on DHCP option 15 Bare Metal Setup and Configuration The Intel AMT device can be predefined by the manufacturer to start sending Hello messages as soon as the system is connected to power and to the network This can occur even if an operating system is not installed on the host system thus the name bare metal The RCS then configures the system using a script see Remote Configuration Using Scripts on pa
64. in which you installed the previous version of Intel SCS Click Upgrade The upgrade starts and the Upgrade Progress window opens When the upgrade finishes the Next button is enabled Click Next A window opens with information about the success or failure of the upgrade Click Finish The installer closes Intel SCS User Guide 59 Chapter 3 Setting up the RCS 3 11 3 Upgrading Database Mode This section describes how to upgrade database mode Note Before starting the upgrade process see Before Starting the Upgrade on page 56 3 11 3 1 Upgrading the Database In many organizations the company databases are managed by a database administrator DBA The DBA or you can use the Database Tool located in the RCS folder to upgrade the database The Database Tool DatabaseTool exe is a simple CLI that you can use locally on the SQL Server or remotely When complete the UpgradeDB command creates a storage encryption key file The file is encrypted with a password that is printed to the screen in the CLI output of the command Make sure that you save this file and password in a secure location You will need them later This is the syntax and parameters for the UpgradeDB command DatabaseTool exe UpgradeDB RCSisDisabled DBServer lt DB server gt DBName lt DB name gt Username lt SQL Login ID gt Password lt SQL password gt KeyFileName lt filename gt RCSisDisabl
65. log e KeepLogFile Appends the current log to the existing log file e Output Console File lt logfile gt Silent Defines where errors and other log messages will be recorded e Console Shows log messages only on the Console screen e File lt logfile gt Lets you change the default name and location of the log file Supply the full path and name for the log file in the lt Logfile gt parameter e Silent Do not record any log messages Console or log file To save log messages to a file and also display them on the Console screen use the Output parameter twice For example Output File lt logfile gt Output Console Intel SCS User Guide 125 Chapter 6 Using the Configurator 6 5 Verifying the Status of Intel AMT ommend Provides details about the status of Intel AMT ACUConfig exe global options Status global options See CLI Global Options on the previous page 6 6 Discovering Systems Description Gets data about the Intel AMT device and the host platform The data can be saved in an XML file on the system and or in the registry You can also send the data to the database via the RCS in database mode If saved in the registry the data is saved in each system at this location e 32 bit and 64 bit operating systems HKLM SOFTWARE Intel Setup and Configuration Software SystemDiscovery In addition on 64 bit operating systems HKLM SOFTWARE Wow6432Node Intel Setup and Configura
66. modified Intel SCS User Guide 85 Chapter 5 Defining Intel AMT Profiles 5 2 Creating a Configuration Profile for Intel AMT This procedure describes how to create an Intel AMT configuration profile To create a configuration profile for Intel AMT F 7 In the Console click Profiles and then click L j The Profile Wizard window opens From the Profile Type drop down list select Intel AMT In the Profile Name field enter a name for this profile The profile name e Can bea maximum of 32 characters e Cannot be empty or include only whitespace characters e Must include only 7 bit ASCII characters in the range of 32 126 not including these characters YACEN C2 lt gt OD GD CBC CO TD 4 Optional In the Description field enter a description for the profile This field is for informational purposes only 5 Click OK The Getting Started window of the Configuration Profile Wizard opens E Configuration Profile Wizard Profile1 Getting Started Getting Started Profile Scope Welcome Optional Settings This wizard creates a profile to configure multiple systems that are enabled with Intel AMT The profile r determines the management settings of the systems These settings will be applied to all systems AD Integration configured with this profile Access Control List Home Domains This profile will be used for Configuration Reconfiguration All Intel AMT settings on the system will be set exactly
67. more information refer to the documentation of the Intel PROSet Wireless Software Optional By default connection to the Intel AMT device via the WiFi connection is available only when the operating system is in the SO power state Enabling WiFi connection in all power states uses more battery power If you want to enable the WiFi connection in all SO S5 power states select Enable WiFi connection also in S1 S5 operating system power states If required from the 802 1x Setup Name drop down list select the 802 1x setup to use on a wired LAN This setup will be used when the Intel AMT device is active in S3 S4 or S5 power states Optionally you can also edit an existing 802 1x setup by clicking Edit or create a new 802 1x setup by clicking Add see Creating 802 1x Setups on page 111 Intel SCS User Guide 108 Chapter 5 Defining Intel AMT Profiles 5 Optional Define advanced wired 802 1x authentication options a Click Advanced The Advanced Wired 802 1x Settings window opens E Advanced Wired 802 1x Settings lel xj Enable 802 1x for Intel AMT even if host is not authorized for 802 1x E Keep 802 1x session after boot to allow PXE boot for o 4 minutes Figure 5 17 Advanced Wired 802 1x Settings Window b Select the check boxes of the options you want to enable e Enable 802 1x for Intel AMT even if host is not authorized for 802 1x Manageability traffic is enabled even if the host is unable to complete 8
68. of how many keys were successfully imported If the file contains invalid or corrupted records the keys will not be imported Only keys that do not exist in the RCS are imported Intel SCS User Guide 83 Chapter 5 Defining Intel AMT Profiles This chapter describes how to define configuration profiles for Intel AMT The information in this section is only relevant for Intel AMT profiles For more information see Bal About Imtel AMI Promles 00 2 2 cadede ss cocresenscecaceddencceued eeneniteadedie cele eas etl EEO 85 5 2 Creating a Configuration Profile for Intel AMT 02 00022 c cece ce eee cece ec cee eee ce cece ceeeeee 86 5 3 Defining the Profile SCOPE ono oa cuids bo cee eben nancodaddemosdiacs ne eveecidasuateacsccaabebesiecasegeneecd 88 5 4 Defining Profile Optional Settings 0 22 c occ cece ccc eeeeeeeeeeeee eee ee cece eeeee 89 55 DefiningActiva Directory Imteqraviom o3 cccee 2s ose s eceae ciao eeteascasd sews i ccosskehesazcateesedousse 90 5 6 Defining the Access Control List ACL 000 000220 c cece eee eee eee eee ee eee eeeee ee 93 5 7 Defiming Home DOING apes seide niena e a gan aa ee he cesisieting iaei eeii 97 58 Defining Remote Access 2 cc esac iss cos cee le ined cctennce sand acsad a E Ee E e ae E a EE hie ie gens 98 5 9 Defining Trusted Root Certificates cnisesesc renien aaa e en i Eade ee nae Eiei 102 5 10 Defining Transport Layer Security TLS
69. only available if you have installed the optional CA plugin For information about this option see Using Intel SCS with the CA Plugin on page 197 If you select this option enter the necessary settings as defined by the plugin provider and continue from step 3 Intel SCS User Guide 104 Chapter 5 Defining Intel AMT Profiles 2 Ifthe certificate will be requested from a Microsoft CA do these steps a From the Certificate Authority drop down list select the certification authority Intel SCS automatically detects if the selected CA is a Standalone root CA or an Enterprise root CA b If you are using an Enterprise root CA you must select the template that will be used to create the certificate From the Server Certificate Template drop down list select the template that you defined for TLS For information how to create a template for TLS see step 15 of Defining Enterprise CA Templates on page 191 c Define the Common Names that will be included in the Subject Name of the generated certificate For more information see Defining Common Names in the Certificate on page 198 e Touse this option Intel SCS must have access to the CA during configuration see Required Permissions on the CA on page 189 e Ifyou are creating the profile on a computer that does not have access to the CA the drop down lists will not display the CA or the templates If necessary you can manually supply the CA name in the format FQDN CA Name and the na
70. see e Configuring a System using a USB Key on page 135 e Defining Manual Configuration Multiple Systems on page 81 This method is not available for systems with Intel AMT 2 x and 3 x because they cannot read the Setup bin file Intel SCS User Guide 5 Chapter 1 Introduction 1 4 3 One Touch Configuration using PSK The One Touch Configuration method uses a Pre Shared Key PSK and the RCS The PSK is put in the Intel AMT device and the RCS to make sure communication is secure during the configuration process Usually physical access to the Intel AMT system is necessary if you want to use this method These are the main steps of this configuration method 1 Use the Configurator CLI to create the PSK The Configurator puts the PSK in an output file and in the RCS see Creating TLS PSK Pairs on page 133 2 Reboot the Intel AMT system with a USB key that contains the file This puts the key in the Intel MEBX of the system 3 Use the Configurator CLI to send a configuration request to the RCS see Using the Configurator on page 123 If the manufacturer has installed PSK keys in the Intel AMT devices you can configure them remotely The manufacturer must supply you with a file containing the PSK keys that were installed in the devices Then instead of steps 1 and 2 you import the keys into the RCS from the file see Importing PSK Keys from a File on page 83 1 4 4 Remote Configuration using PKI The Remote Configur
71. ssw0rd E RCSStorage key STORAG G z KEY FIL Example 6 Upgrading using SQL Server authentication IntelSCSInstaller msi qn l v log txt UPGRAD User LOGON PASS LOGON USE E RNAME Example RCS STORAGE G KEY FI E RCSStorage key STORAG R 1 p a S ERVIC T E SQL US ER sa S VORD P ssw0rd KEY FIL X G ERVICE_ SQL PASSWO Intel SCS User Guide RD MySQOLP ssw0rd PASSWORD FileP ssw0rd E PASSWORD FileP ssw0rd 68 Chapter 4 Using the Console This chapter describes how to use the Intel SCS Console For more information see 4 1 4 2 4 3 4 4 4 5 4 6 4 7 Apouttne Console aiseee sin daemn dance danwate E E nea doeaweainke a 70 Commecting tothe RCS ix nn sa un the ee eel eos Me hare ot eee bs Sead ih eae mae eles 72 DefimimgtheReS Settings 252225525 00s acacaed esa oneneaa a saad Meeeeacde sbanerawesesecace 73 Creating Configuration Profiles sos cists cen taleded cn eae ea ii iea a Vesela nE iee 78 Exporting Profiles from the Console _ 0 222 2222 eee eee one ieee eea eo EE Eens E Enis 79 Defining Manual Configuration Multiple Systems 002 22 0222 c eee e eee eee eee cece ceeeeeee 81 Importing PSK Keys from a File cons oe setettg ence neea i ce aclead e a E i secede abated gees 83 Chapter 4 Using the Console 4 1 About the Console The
72. support passwords that start with a forward slash Runs specific maintenance tasks on Intel AMT based on settings in the lt profilename gt All maintenance tasks are done remotely by the RCS ACUConfig exe global options MaintainViaRCSOnly lt RCSaddress gt lt profilename gt lt task gt lt task gt AdminPassword lt password gt WMIUser lt username gt WMIUserPassword lt password gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt Parameters global options lt RCSaddress gt lt profilename gt Intel SCS User Guide See CLI Global Options on page 125 The IP or FQDN of the computer running the RCS The profile in the RCS containing the original configuration settings that were used to configure Intel AMT Settings in the profile not related to the specified maintenance tasks are ignored 140 lt task gt AdminPassword lt password gt WMIUser lt username gt WMIUserPassword lt password gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt Intel SCS User Guide Chapter 6 Using the Configurator Define at least one of these maintenance tasks e SyncAMTTime Synchronizes the clock of the Intel AMT device with the clock of the computer running the RCS This task is performed automatically when any of the other tasks are performed SyncNetworkSettings Synchronizes network settings of the Intel A
73. the 32 bit and 64 bit installers for this client 3 6 1 Supported SQL Server Versions In database mode the data is stored in an SQL database You can install the database on a computer running any of these Enterprise versions of SQL Server e Microsoft SQL Server 2008 x32 x64 SP1 e Microsoft SQL Server 2008 R2 x64 SP1 e Microsoft SQL Server 2005 x32 SP4 Note Intel SCS supports case sensitive and case insensitive installations 3 6 2 Installation Permissions in SQL Server The database is created using the Database Tool The Database Tool can also give the RCS permissions on the Intel SCS database To do these tasks the Database Tool requires these Server Roles in SQL Server e dbcreator Always required to create the database e securityadmin Only required if you want the Database Tool to create the User and Login ID in SQL Server for the RCS The Database Tool creates this User and Login ID specifically for the Intel SCS database that you define They do not have permissions in any other database in SQL Server You have two options for giving these Server Roles to the Database Tool e Windows authentication Run the Database Tool with a Windows user account that has the required Server Roles e SQL Server authentication During installation supply the credentials of an SQL Server user that has the required Server Roles using the Username parameter Intel SCS User Guide 36 Chapter 3 Setting up the
74. the Intel SCS database exactly as it is defined in the SQL Server By default the RCS is configured to use Windows authentication to connect to the database If you prefer to use SQL Server authentication define these properties The Login ID on the SQL Server ERVICE PASSWORD The password on the SQL Server These are additional optional parameters you can use when installing not upgrading INSTALLDIR The default installation folder is C Program Files Intel SCs9 If you want to change this location use this property and supply the full path to the installation folder Intel SCS User Guide 66 Chapter 3 Setting up the RCS Command Property Description WMI ADMIN ACCOUNT You can use these properties to give WMI permissions on the RCS namespaces to the user accounts or groups that you specify Each property gives permissions on different namespaces e WMI ADMIN ACCOUNT Gives permissions to all the namespaces that control access to the RCS see Defining WMI Permissions on page 49 It is recommended to use this property only for user accounts who are administrators WMI_ACCESS_ ACCOUNT Gives permissions only to the Intel_RCS namespace You can specify the accounts by supplying the Security Identifier SID or the username in this format domain username To specify multiple user accounts separate each user account with a semi colon Examples WMI AC
75. the certificate expiration date Intel SCS User Guide 17 Chapter 1 Introduction Replacing Active Directory Object Passwords If an Intel AMT device is configured to use Active Directory AD Integration an object is created in the AD Organizational Unit specified in the profile The object contains a password that is set automatically not user defined If the ADOU has a maximum password age password policy defined in AD the password must be replaced before it expires Intel recommends that you schedule this maintenance task to start a minimum of 10 days before the password is set to expire Changing the Default Admin User Password For increased security it is recommended to change the password of the default Digest admin user at regular intervals During maintenance Intel SCS changes the password according to the password method defined in the profile For more information about these methods see Default Admin User Digest on page 15 Changing the ADOU Location If you change the location of the ADOU containing the objects representing the Intel AMT devices you must reconfigure the systems This makes sure that all settings that use the object are reconfigured to use the new object To change the ADOU location 1 Define the new ADOU in the configuration profile see Defining Active Directory Integration on page 90 2 Use one of these CLI commands to reconfigure the systems e Configuring Systems Unified Configur
76. the registry Configuration reconfiguration maintenance and unconfiguration tasks will complete but with warnings If the registry keys do not exist the first time the AutoMaintain parameter is used all the maintenance tasks will be done according to the profile Intel SCS User Guide 20 Chapter 1 Introduction 1 8 Support for KVM Redirection Intel AMT 6 0 and higher includes support for third party applications to operate Intel AMT systems using remote Keyboard Video and Mouse KVM Redirection KVM Redirection lets you remotely operate a system as if you are physically located at the remote system KVM Redirection uses Virtual Network Computing VNC to share the graphical output of the remote system The results of keyboard and mouse commands transmitted to the remote system over the network are displayed on the screen of the local system VNC includes two main components e VNC Server An application located on the remote managed system that permits the VNC Client to connect to and operate the system From Intel AMT 6 0 a VNC Server component is embedded in the Intel AMT device e VNC Client An application usually located on a management server used to connect to and operate the remote managed system To use KVM Redirection with Intel AMT requires that 1 KVM is enabled in the Intel MEBX of the Intel AMT system If disabled in the Intel MEBX KVM cannot be enabled by Intel SCS during configuration it
77. the time out period defined by Intel SCS If your script requires more than 60 seconds to complete you must make sure that your script returns a success code 0 within 60 seconds To do this you can wrap your script with a batch file like this Start Myscript bat 1 2 Exit 0 If you do this your script will be responsible to handle any subsequent errors if they are generated by your script Subsequent script errors will not be recorded in the log 6 19 6 Parameters Sent in Base64 Format Some of the parameters sent by the Configurator RCS are sent in Base64 format The number of characters sent in the Base64 value representing the parameter must be divisible by 4 If it is not additional characters are added to the end of the Base64 value For example if the Base64 value includes only 6 characters two characters are automatically added n When Base64 values are sent to a batch file the command line interpreter removes these additional characters This means that the parameter value cannot be decoded correctly To solve this problem add the missing characters to the Base64 value before decoding it Intel SCS User Guide 153 Chapter 6 Using the Configurator 6 20 Configurator Return Codes This table describes the return codes that are shown and recorded in the log file when running Configurator CLI commands Table 6 5 Configurator Return Codes Description The requested operation
78. those systems the status of the job is changed to Aborted or Scheduled if the job is a recurring job If an operation is in the Pending Retry status aborting the job will cancel the operation on those systems Intel SCS User Guide 187 Chapter 9 Preparing the Certification Authority This chapter describes the prerequisites and procedures for using a Certification Authority CA with Intel SCS For more information see 9 1 About Certification Authorities 00 0 cccc ccc sevens eens eccddeestncaesceuesceceessdeseescsecdeseececeeees 189 9 2 Using Intel SCS witha Microsoft CA oc ceccceun danse cocsdsndeeadcsciesnebaacteecuuddddcuwesxcseerecd be 189 9 3 Using Intel SES with there PIJN 22 222 022223 aaa a a E a eegerccae seccaageeses nes 197 9 4 Defining Common Names in the Certificate 2200 0 0000022 198 9 5 IRIE Pe FO IRN VA a capes Sencha tt zjc ce Ss cnc anche a a eaae E Seca chess e Sic a3 eE aea aea 200 Chapter 9 Preparing the Certification Authority 9 1 About Certification Authorities A CA is necessary if you want to configure any of these settings in an Intel AMT device e Remote Access e Transport Layer Security e 802 1x Setups e End Point Access Control During configuration of these settings Intel SCS sends a request to a CA software application to generate a certificate Intel SCS puts the generated certificate in the Intel AMT device Intel SCS can request certificates e From a M
79. unconfiguration the default is partial unconfiguration ADOU lt ADOU path gt During unconfiguration the Configurator deletes the Active Directory AD object that was created to represent the Intel AMT system The object was created by Intel SCS only if AD integration was enabled By default the Configurator uses the settings configured in the Intel AMT device to find the location of the AD Organizational Unit ADOU containing the object In large enterprise networks the search for the ADOU can take some time If you supply this parameter the Configurator will only look for the object in the Organizational Unit that you define in lt ADOU path gt DomainUser The name in the format domain username of a domain user with lt username gt permissions to delete the AD object representing the Intel AMT system If you supply this parameter the AD object is deleted using the credentials of this user Note e For Intel AMT 6 2 and higher systems by default the credentials of the user running the Configurator are used to delete the AD object For Intel AMT 6 1 and lower systems the credentials of the user running the RCS are always used to delete the AD object DomainUserPassword The password of the domain user lt password gt DeleteADObjectViaRCs If you supply this parameter the AD object is deleted using the credentials of the user running the RCS Note e For Intel AMT 6 2 and higher systems by default the credentials o
80. unconfiguration on a system this sets the system back to the default which uses an IP address from the DHCP server To fix this problem it is recommended to run this command on the Intel AMT system to immediately update the IP address ipconfig renew After the IP address is correctly defined in the Intel AMT device all remote connections should work without any problems In database mode to change the Connection Status you can run a job on these systems for example a maintenance job When the job finishes the RCS will test the connection again and then update the Connection Status Intel SCS User Guide 215 Chapter 11 Troubleshooting 11 6 Error with XML File or Missing SCSVersion Tag Errors 37 or 38 are returned by the Configurator if problems exist with the configuration profile XML file These errors usually occur when the Configurator cannot find the file or read the data that it contains Solutions e Inthe command line make sure that you supplied the correct name for the XML file For example if the filename contains spaces you must supply the filename in quotes like this My Profile e Make sure that the profile is a valid profile Profiles created using Intel SCS 7 0 are NOT supported These profiles do not have the mandatory lt SCSVersion gt tag Even if you add the missing lt SCSVersion gt tag the profile is still invalid because it contains tags and values not supported by Intel SCS 9 0 Profiles created u
81. 02 1x authentication to the network e Keep 802 1x session open after boot to allow PXE boot for minutes The 802 1x session remains active after a PXE boot for the number of minutes that you specify up to 1440 minutes 24 hours This is the period allowed for completion of an 802 1x authentication This parameter can be set only when an 802 1x profile has been selected If the 802 1x profile is deleted this value will be reset to zero c Click OK The Advanced Wired 802 1x Settings window closes and the settings are saved 6 If required define the End Point Access Control EAC parameters see Defining End Point Access Control on page 114 5 11 1 Creating WiFi Setups The WiFi setups defined in the Intel AMT device are required to enable communication with the Intel AMT device over a wireless network These WiFi setups can also be used to enable Remote Access via a Management Presence Server MPS even when the computer is not in the enterprise network The total number of WiFi setups including 802 1x WiFi setups that can be configured depends on the version of Intel AMT e Intel AMT 8 x and lower Up toa maximum of 15 e Intel AMT 9 0 and higher Up toa maximum of 7 To create a WiFi setup 1 From the WiFi Connection section of the Network Configuration window click Add The WiFi Setup window opens Intel SCS User Guide 109 Chapter 5 Defining Intel AMT Profiles axi General Setup Name ssiD Data Encr
82. CESS ACCOUNT WMI ACC ESS ACCOUNT example myuserl example myuser2 WMI ADMIN ACCOUNT S 1 5 21 725345543 602162358 527237240 205384 example myuser2 Note e In addition to WMI permissions the user accounts will also automatically be given the DCOM permissions necessary to connect to the RCS If the user accounts did not have any DCOM permissions on the computer running the RCS you will need to restart the computer This is because of a Microsoft limitation the first time that a user account is granted DCOM permissions on a computer When using these properties any existing default or specific WMI permissions of users groups on these namespaces are replaced About the Storage Key File When using the silent install option to install the RCS you must supply the storage key file in the STORAGE _ KEY FILE property This file is created using the Database Tool DatabaseTool exe located in the RCS folder The command that you need to use depends on the type of installation CI e Database mode The file is created when you create the database using the CreateDB command see Creating the Database on page 37 e Non database mode Use the CreateStorageKey command For more information refer to the CLI help of the Database Tool Intel SCS User Guide 67 Examples Chapter 3 Setting up the RCS Example 1 Installing database mode using Windows authentication IntelSCSInstaller msi qn 1 v log txt AD
83. Example RCSUser LOGON PASS LOGON US F F RNAME STORAGE G DLOCAL A11 VORD P sswO0rd KEY FIL G RV T SQL S R sq12 G K E RCSStorage key STORAGE E IntelSCs EY FI 003 example com DB NAM E PASSWOR D B MOD Example 2 Installing database mode using SQL Server authentication E 1 D FileP ssw0rd IntelSCSInstaller msi qn l v log txt ADDLOCAL A11 LOGON_USERNAME Example RCSUser LOGON PASSWORD P ssw0rd DB MODE 1 STORAGE KEY FILE RCSStorage key STORAGE KEY FILE PASSWORD FileP sswOrd SQL _SERVER sql2003 example com DB NAME IntelSCS SERVICE SQL USER sa SERVICE SQL PASSWORD MySQLP ssw0rd Example 3 Uninstalling the RCS and the Console IntelSCSInstaller msi qn l v log txt REMOVE A1 1 Example 4 Installing non database mode IntelSCSInstaller msi qn l v log txt ADDLOCAL A11 LOGON_USERNAME Example RCSUser LOGON PASSWORD P ssw0rd DB MODE 0 STORAGE KEY FILE RCSStorage key STORAGE KEY FILE PASSWORD FileP ssw0rd Example 5 Upgrading using Windows authentication IntelSCSInstaller msi qn 1 v log txt UPGRAD Example RCSUser LOGON PASS LOGON US F F RNAME STORAGE G KEY FIL E 1 VORD P
84. FQDN is DNS However ifthe NetworkSettingsFile parameter is supplied and FQDN data is included in the file the FQDN is taken from the file NetworkSettingsFile This parameter tells the Configurator to get the IP and or the FQDN from a lt file gt dedicated network settings file For information about the required XML format see the NetworkSettings xml example file located in the sample files folder RCSBusyRetryCount Defines the number of times to resend the request to the RCS if the RCS lt retries gt returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 Intel SCS User Guide 128 Chapter 6 Using the Configurator 6 7 Configuring Systems Unified Configuration pra a Description Configures Intel AMT with settings in a configuration profile XML file Configured systems are reconfigured You can use this command with the unified configuration process If the Intel AMT device supports host based configuration the configuration is done locally If not configuration is done remotely by the RCS For more information see Unified Configuration Process on page 7 Syntax ACUConfig exe global options ConfigAMT lt filename gt DecryptionPassword lt password gt AbortOnFailure AdminPassword lt password gt ADOU lt ADOU path gt NetworkSettingsFile lt file gt Note The CLI does n
85. Intel AMT device Path to XML file Browse Encrypt the XML file using this password ej Confirm Password Credentials If you do not want to give the user running the Configurator access to the RCS enter the credentials of a user with the necessary permissions Username Password 7 Show password Control Mode AAA The default Client Control mode of host based configuration includes security related limitations To remove this protection you can put these devices in Admin Control mode T Put locally configured devices in Admin Control mode Figure 4 7 Export Profile to XML File Window 3 Inthe Path to XML file field define a name and location for the exported file 4 Inthe Encrypt the XML file using this password field enter a password that will be used to encrypt the profile For information about the required format see Password Format on page 9 Remember this password You will need to supply it to the Configurator in the CLI command using the DecryptionPassword parameter Intel SCS User Guide 79 Chapter 4 Using the Console 5 Optional If you enter credentials of a user in the Username and Password fields the Configurator will use that user to communicate with the RCS By default the credentials of the user running the Configurator are used Use this option only if you do not want to give the Configurator WMI permissions on the RCS For more information see User Permiss
86. Listor System S a fa ee ecieen er ar Sica E E a a a E neice ud accinta hu ieS 168 Changing the Managed State of Systems 22 222 2 oe cece cece cee ee eee ee cece e eens 169 Detecting and Fixing Host FQDN Mismatches 202 22222 c cece eee eee eee eee eee cece eee ee 170 Getting tine Ag inti Password 2 es pees heh rc cll elit eae ae ec dM aca mea teense bosentan bei 172 Mewng OperatioMm LOJS Seaman a a e PoP CEE 173 viewing Discovery Data acs ctets i asc e aae lates A E 3a Ge aaa ai ae aeaee E75 Solni elule nET EA E EEEE AA AE E E E EE AEE SE EEE 177 Chapter 7 Monitoring Systems 7 1 About Monitoring Intel AMT Systems In database mode during configuration data about each Intel AMT system is stored in the database You can use the Monitoring options in the Console to send WMI Query Language WQL queries to the database about these systems E Intel SCS Console Host FQDN Mismatch 1 Example View 1 2 Example View 2 a 1 m H o Figure 7 1 Example of Views This table describes the options available from the Monitoring gt Systems tab Table 7 1 Monitoring Options Use thee To do this Views To define and save multiple queries also known as Views You can use these views to filter Intel Tab AMT systems into logical groups For more information see e Creating a View on page 162 e Viewing Systems on page 165 The Views tab also includes these built in default views e
87. MT device as defined in the lt NetworkSettings gt tag of the lt filename gt XML file see Defining IP and FQDN Settings on page 120 ReissueCertificates Reissues the certificates stored in the Intel AMT device If the device contains 802 1x certificates the RenewADPassword task is automatically done as well RenewADPassword Changes the password of the Active Directory object representing the Intel AMT system RenewAdminPassword Changes the password of the default Digest admin user in the Intel AMT device according to the password setting defined in the profile AutoMaintain Automatically does only the maintenance tasks listed here that are necessary for this Intel AMT system For more information see e About Maintenance Tasks on page 17 e Manual Automatic Maintenance using the CLI on page 19 The current password of the default Digest admin user defined in the Intel AMT device This parameter is NOT necessary if any of these are true e The RCS can find the Digest admin password in one of the RCS profiles or using a Digest Master Password The user account running the RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions The name in the format domain username of a user with WMI permissions on the computer running the RCS This parameter is only required when running the Configurator under a user without WMI permissions on the RCS computer The password of the WMI u
88. MT system with the USB key will not complete successfully The name of the file and the path to the location where you want to save it If this parameter is not used by default the file is created in the same folder as the Configurator Note e The file is NOT encrypted Make sure that you restrict access to it e The Configurator overwrites any existing file with the same name without giving a warning Defines the number of times to resend the request to the RCS if the RCS returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 The name in the format domain username of a user with WMI permissions on the computer running the RCS This parameter is only required when running the Configurator under a user without WMI permissions on the RCS computer The password of the WMI user By default the output file is created in a version 1 0 supported by Intel AMT 2 1 and higher If you use these optional parameters the output file is created in a version 2 1 that is supported only by Intel AMT 4 0 and higher UsingDhcp LocalHostIp lt ip gt SubnetMaskIp lt subnet_mask gt Sets the DHCP mode to enabled in the Intel MEBX The static IP address IPV4 to set in the Intel MEBX If you supply this parameter the SubnetMaskIp parameter is mandatory the remaining static IP parameters are optional Note Static
89. O S3 AC S4 5 AC Intel SCS User Guide GUID Hex 32 763997110B56504388709812F391B560 30800DEE09C07843AF287868A2DBBE3A 944F8312FB104FDC968E1E232B0C9065 7322734623DC432FA98A13D37982D855 944F8312FB104FDC968E1E232B0C9065 A18600AB9A7F4C42A6E6BB243A295D9E 7286ABAC96B448E29B9E9B7DF91C7FD4 7B32CD4D6BBE4389A62A4D7BD8DBD026 7322734623DC432FA98A13D37982D855 C519A4BA6E6F8D4DB227517F7E4595DB D60BE3ED04C52C46B772D18018EE2FC4 763997110B56504388709812F391B560 26D31C768708C74BBB5F38744315A5FF 530E08DB6COFD948B2D28958D3F1156E 137 Supported Power Package Chapter 6 Using the Configurator GUID Hex 32 ON in SO ME Wake in S3 AC 055DD5B64CA4874DA5A8B47C14DEDA5F ON in SO ME Wake in S3 AC S4 5 AC 30800DEE09C07843AF287868A2DBBE3A 6 12 Maintaining Configured Systems Description Syntax Note The CLI does not support passwords that start with a forward slash Parameters global options lt filename gt Intel SCS User Guide Runs specific maintenance tasks on Intel AMT based on settings in the lt filename gt XML file If the Intel AMT device supports host based configuration the maintenance tasks are done locally If not the tasks are done remotely by the RCS ACUConfig exe global options MaintainAMT lt filename gt lt task gt lt task gt DecryptionPassword lt password gt AdminPassword lt password gt NetworkSettingsFile lt file gt FileToRun lt filenam
90. Optional The default installation folder is C Program Files Intel scs9 If you want to change this location in the Install path field enter a new path or click Browse to select it Click Install The Installation Progress window opens When installation is complete a message is shown Click Next The Completed Successfully window opens Click Finish The installer closes The RCS is installed with default settings If necessary you can change these settings see Defining the RCS Settings on page 73 Intel SCS User Guide 43 Chapter 3 Setting up the RCS 3 7 Installing Non Database Mode This procedure describes how to install the RCS and Console in non database mode Before starting the installation make sure that this is the mode that you require see Selecting the Type of Installation on page 33 To install in non database mode 1 Double click IntelSCSInstaller exe The Welcome window opens 2 Click Next The License Agreement window opens 3 Select I accept the terms of the license agreement and click Next The Select Components window opens E Intel SCS Installer Select Components Select the Intel SCS components that you want to install on this computer l Remote Configuration Service RCS A Windows based service for discovering configuring and maintaining the settings of Intel products and capabilities on your systems Select the installation mode Database Mode Non Database Mode I
91. RCS You can use the Console to create and edit configuration profiles for supported Intel products and capabilities In database mode the Console also lets you view data about Intel products that was sent to the RCS Database mode also includes additional options for Intel AMT These options include monitoring Intel AMT systems and creating and running Jobs on multiple Intel AMT systems For more information see Using the Console on page 69 Intel SCS Configurator The Configurator ACUConfig exe is used to configure Intel AMT only and runs locally on each Intel AMT system You can use the Configurator to configure the system locally or send a configuration request to the RCS For more information see Using the Configurator on page 123 Intel Solutions Framework In previous versions Intel SCS was capable of discovering and configuring only Intel AMT But the platforms in your organization can include many other Intel products some of which you might not even know about The Framework was created to extend the discovery and configuration capabilities of Intel SCS to other Intel products For more information refer to the documentation in the Solutions Framework folder Intel SCS Platform Discovery Utility See What are the Discovery Options on the next page Intel SCS Discovery Utility The Discovery Utility SCSDiscovery exe can be used to get detailed data about Intel AMT only This utility does not interface with the RCS
92. S on page 56 e Innon database mode this command will also upgrade the data files e In database mode this command only upgrades the RCS and the Console Before you can use this command to upgrade database mode you must first upgrade the database see Upgrading the Database on page 60 Intel SCS User Guide 65 Chapter 3 Setting up the RCS Command Property Description If installing upgrading the RCS you must define these properties LOGON USERNAMI The user under which the RCS will run in the format Domain Username In a Windows Workgroup enter the username in the format ComputerName Username If you want to use the Network Service account supply only the username NetworkService Note If upgrading you must supply the credentials of the user account that was used to run the RCS of version 8 x LOGON PASSWORD The password of the RCS user Do not supply this property if you are using the Network Service account The database mode Valid values e 0 Non database mode e 1 Database mode Note If upgrading do not supply this property The full path to the encryption key file used to encrypt the data stored and used by Intel SCS see on the next page STORAGE KEY FILE The password of the encryption key file PASSWORD If installing the RCS in database mode you must also define these properties SQL SERV The name of the SQL Server where the Intel SCS database is installed DB NAME The name of
93. SCS User Guide 41 Chapter 3 Setting up the RCS 6 Click Next The Database Settings window opens This window defines the location of the database and how the RCS will authenticate with the database xi Database Settings intel Specify the location of the Intel SCS database sau senee Database Name Specify how the RCS will authenticate with the database Windows Authentication using account EXAMPLE administrator O SQL Server Authentication Login ID Password Figure 3 3 Database Settings Window 7 Specify the location of the database a Inthe SQL Server field enter the name of the SQL Server where the Intel SCS database was installed b Inthe Database Name field enter the name of the Intel SCS database exactly as it was defined during installation of the database 8 Specify the authentication method that the RCS will use e Windows Authentication e SQL Server Authentication If you select this option enter the Login ID and the password of the SQL Server account The account that you specify MUST have a password SQL Server authentication using an account without a password is not supported For more information see RCS User Permissions in SQL Server on page 37 9 Click Next The installer will try to connect to the database If the installer cannot locate the database a new window named Create Intel SCS Database opens If this window opens you have two choices e If you know that the database
94. The RCS updates the value of the Host FQDN State property of the system e Synchronized If the settings match e Mismatch If the settings do not match These systems are shown in the Host FQDN Mismatch view see Viewing Host FQDN Mismatches on the previous page e New mismatches can occur at any time The RCS is only updated with new mismatches when you run the SystemDiscovery command with the ReportToRCS parameter Thus it is recommended to run this command and parameter at regular intervals e Forinformation about how to fix the mismatches see Fixing Host FQDN Mismatches below Fixing Host FQDN Mismatches Host FQDN mismatches are fixed using jobs To fix host FQDN mismatches using a job 1 Create a job In the Job Definition window select these options e From the drop down list in the Filter section select Host FQDN Mismatch e From the Operation drop down list select Fix host FQDN mismatch e Fix host FQDN mismatch is the only job operation type that can always correctly fix Host FQDN mismatches e You can create a recurring job that will automatically run and fix mismatches on any systems that are added to the Host FQDN Mismatch view 2 Complete the rest of the job definitions that you want to define for this job see Creating a Job on page 183 Intel SCS User Guide 171 3 Chapter 7 Monitoring Systems When the job runs the RCS tries to configure the correct FQDN in each Intel AMT device When a misma
95. User Guide Chapter 6 Using the Configurator The current password of the default Digest admin user defined in the Intel AMT device This parameter is NOT necessary if any of these are true e The Configurator RCS can find the Digest admin password in one of the RCS profiles or using a Master Password The user account running the Configurator RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions When the Move ToACM command starts the Configurator sends all the hashed root certificates located in the Intel AMT device to the RCS The RCS looks in the certificate store of the user account running the RCS for a remote configuration certificate that traces to one of the hashes For authentication to succeed the domain suffix of the Common Name CN in the Subject Name field of the certificate must match the Connection specific DNS Suffix assigned to the Intel AMT device This suffix can be assigned to the device using option 15 of the DHCP server DNS Domain Name By default the RCS tries to authenticate using only the first certificate it finds that matches one of the hashes If this is not the correct certificate for example in networks using multiple remote configuration certificates with different domain suffixes authentication will fail You can use this parameter to specify the correct DNS Domain Name that is assigned to the Intel AMT device If supplied the RCS examines each remot
96. User Guide 118 Chapter 5 Defining Intel AMT Profiles 3 Optional Select Synchronize Intel AMT clock with the operating system When this check box is selected the Intel AMT clock will automatically synchronize with the operating system clock This option is available only from Intel AMT 9 0 and higher This option can make it possible for attackers via a compromised operating system to change the Intel AMT clock An unsynchronized clock can cause Kerberos based authentication to Intel AMT to fail Select this option only if you are sure that the operating systems in your organization are sufficiently secured 4 Optional Select Enable Intel AMT to respond to ping requests When this check box is selected the Intel AMT device will respond to a ping if the host platform does not respond 5 Optional You can define which interfaces are open for the local Fast Call for Help feature If the computer is inside the enterprise network the user can initiate a connection request to connect to a management console By default the user can access this option from the operating system and from the BIOS To change this setting do one of these e To close both interfaces clear the Enable Fast Call for Help within the enterprise network check box e To select which interface to open click Fast Call For Help Settings and select the interface from the Fast Call for Help interfaces window E Fast Call for Help Interfaces T 5 xj Def
97. User Guide 222
98. address of the on board wired LAN interface To use this option the DNS must be configured correctly with Reverse Lookup Zones HOST Takes the hostname from the host operating system The suffix is blank Note When this parameter is not supplied the default source for the FQDN is DNS However if the NetworkSettingsFile parameter is supplied and FQDN data is included in the file the FQDN is taken from the file This parameter tells the Configurator to get the IP and or the FQDN from a dedicated network settings file For information about the required XML format see the NetworkSettings xml example file located in the sample files folder Defines the number of times to resend the request to the RCS if the RCS returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 144 Chapter 6 Using the Configurator 6 15 Moving from Client Control to Admin Control Description This command modifies the Intel AMT device by changing it from Client Control mode to Admin Control mode When complete the security related limitations of the Client Control mode no longer apply to this system see Control Modes on page 12 To use this command e Thesystem must be configured in Client Control mode e The Intel AMT system and the RCS must be setup for authentication using remote configuration certificates For more information
99. aedasieedon ges 183 8 6 Viewing Job ItemS 2 02 0 22 e eee e eee teeeeeeeeeees 185 8 7 Starting Aborting and Deleting Jobs 00 0 2 ee eee eeeeee 187 Chapter 9 Preparing the Certification Authority 0 00000000000 ccc cece eee e eee eee 188 9 1 About Certification Authorities 2 220022 elec lll cece eee ee cece cece eee eee eee econ ee eee ee EnEn 189 9 2 Using Intel SCS with a Microsoft CA 2 02 2 occ cece eee eee eee cee e cece eee eeee 189 9 2 1 Standalone or Enterprise CA 2 0022 2 22 ccc ccc ceeeece ee ee eee cece eee eeeeee 189 9 2 2 Required Permissions on the CA 2 0 22 2 0222 c cece eee eee cece ee cee ee eee ee cece eee eeeeeee 189 9 2 3 Request Handling 0 2 0222 eee cee ee cece eee e eee aaan 190 9 2 4 Running the CA on Windows 2003 2 0000000000000 000000000000000 eee cee eee cee ee ceeeeeeeeeee 191 Intel SCS User Guide vi 9 2 5 Defining Enterprise CA Templates 2 2 2 02 0 0222 c cece eee cece cece eee eceeeee 191 9 3 Using Intel SCS with the CA Plugin 00222022 ee cece eeee cece 197 9 4 Defining Common Names in the Certificate 20 2 2222 e ects 198 OS ICRE XM ROMMaAG x2 tos caste ere neces att etn acces atest ere Ae eee archer iteere ee eho ates chee aes 200 Chapter 10 Setting up Remote Configuration 2 0 2222 c cece e eee 201 10 1 About Remote Configuration 0 02 0222 ccc ence cece c
100. ain username of a user with WMI permissions on username gt the computer running the RCS This parameter is only required if you run the Configurator with a user account that does not have WMI permissions on the RCS computer But only if you want to connect to the RCS WMIUserPassword The password of the WMI user lt password gt Intel SCS User Guide 127 Chapter 6 Using the Configurator SourceForAMTName Defines how the FQDN hostname suffix for the Intel AMT device is lt source gt constructed Valid values e DNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Primary DNS Suffix from the host operating system This is the default setting and is correct for most network environments SpecificDNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Connection specific DNS Suffix of the on board wired LAN interface AD The hostname part of the FQDN is the hostname from the host operating system The suffix is the AD domain of which the host operating system is a member DNSLOOKUP Takes the FQDN returned by an nslookup on the IP address of the on board wired LAN interface To use this option the DNS must be configured correctly with Reverse Lookup Zones HOST Takes the hostname from the host operating system The suffix is blank Note When this parameter is not supplied the default source for the
101. aller The installer has detected that at least one Intel SCS component is already installed on this computer Select one of these options Add or remove components O Remove all components Figure 3 9 Welcome Window 2 Select one of these e Add or remove components Lets you make changes to an existing installation Continue to step 3 e Remove all components Removes all Intel SCS components installed on this computer Continue to step 5 Intel SCS User Guide 51 Chapter 3 Setting up the RCS 3 Click Next The Modify Components window opens Ey Intel SCS Installer Modify Components Select only the modifications that you want to make Install I Console A Console that you can use to connect to RCS installations on any computer Remove I Remote Configuration Service RCS Figure 3 10 Modify Components Window 4 Select the modifications that you want to make e Inthe Install section select only the check boxes of the components that you want to install e In the Remove section select only the check boxes of the components that you want to uninstall Intel SCS User Guide 52 5 10 Chapter 3 Setting up the RCS Click Next The Storage Key Extraction window opens This window is only shown if you are uninstalling the RCS This window lets you extract and save a copy of the encryption key that was used by the RCS to encrypt data It is highly recommended to extract and save this key in a secu
102. already exists because you or the DBA created it using the Database Tool click Close and correct the values you specified in the Database Settings window e Ifyou did not create a database click Create Database The installer will try to create the database and also automatically create and install the storage encryption key If you select this option follow the instructions in the windows that are shown and then continue from step 12 Intel SCS User Guide 42 10 11 12 13 14 15 16 Chapter 3 Setting up the RCS If the installer successfully located the database the Storage Encryption Key window opens This window installs the encryption key for the RCS to use when accessing the database xi Storage Encryption Key intel Data stored by the RCS is encrypted using a storage encryption key This key must be installed on the computer running the RCS Load and install the key from this file Encryption Key OO File ad File Password Figure 3 4 Storage Encryption Key Window Click Browse and select the storage encryption key file that was created by the Database Tool utility when the database was created In the File Password field you must also enter the password that was used to encrypt the key file This is the random password that was shown in the CLI when the CreateDB command completed Click Next The Confirmation window opens This window shows information about the selections you made
103. as defined in this profile Remote Access Transport Layer Security Network Configuration System Settings C Delta Configuration Finish For configured systems you can limit the profile scope so that only some Intel AMT settings will be changed All other settings will remain in their current condition Figure 5 1 Getting Started Window 6 Select the task for which you want to use this profile e Configuration Reconfiguration Systems configured using this profile will be set with the Intel AMT settings exactly as they are defined in this profile Optional settings that are not defined in this profile will be removed from the systems during configuration e Delta Configuration After a system is configured you can use this option to make changes to specific settings only Only settings defined in the Profile Scope window will be changed on the systems during configuration All other settings will stay in their current condition on the systems Intel SCS User Guide 86 Chapter 5 Defining Intel AMT Profiles 7 Click Next to continue in the Configuration Profile Wizard and define the settings as described in these topics e Defining the Profile Scope on the next page e Defining Profile Optional Settings on page 89 e Defining Active Directory Integration on page 90 e Defining the Access Control List ACL on page 93 e Defining Home Domains on page 97 e Defining Remote Access on page 98 e Defining Transport Layer Security TLS o
104. ata that they contain e Remote Contains data collected remotely by the RCS Intel SCS User Guide 175 4 Chapter 7 Monitoring Systems To view get remote discovery data select the Remote tab The Remote tab opens ich ESEE Remote UUID 00000000 0001 0000 0000 000001000501 FQDN intelamt 6 example domain Intel AMT last discovery time 1 21 2013 3 45 24 PM foie systemDiscovery GeneralInfo ManageabilityInfo ConfigurationInfo el Figure 7 11 Remote Tab If data does not exist click Discover to send a new query to the system via the RCS and update the database When the query has completed the data is shown in a tree view You can expand the nodes to see the data that they contain Each time that you click Discover a new query is sent to the system To get data for multiple systems 1 2 3 In the Console create a job See Creating a Job on page 183 When you create the job select the Get discovery data option from the Operation drop down list After you run the job you can also view the discovery data of each system in the List of Systems in Job window see Viewing Job Items on page 185 Intel SCS User Guide 176 Chapter 7 Monitoring Systems 7 12 Configuration States Each Intel AMT system stored in the database can be in one of these configuration states Configured The system is configured Configuration Failed The RCS failed to configure the system Con
105. atabase 3 10 3 Moving the RCS to a Different Computer Some of the data used by the RCS is sensitive for example passwords To protect this data the RCS encrypts sensitive data before storing it in the SQL database database mode or data files non database mode The data is encrypted using an encryption key If you want to move the RCS to a different computer you must supply the key when installing the RCS These are the required steps 1 Make sure that you have the Storage Encryption Key file and file password for that database If you do not have the key file you can export it 2 Install the RCS on the target computer During installation select the key file in the Storage Encryption Key window of the installer To export the encryption key 1 Inthe Console select Tools gt Settings gt Storage The Storage tab opens 2 Inthe Storage Security section click Export The Save As window opens 3 By default the name of the exported key is RCSStorage key You can change this name if you want Specify the location where you want to save the key file and click Save The Enter Passphrase window opens 4 Enter a password that will be used to encrypt the certificate file and click OK Click OK to close the Settings window Make sure that you keep this key file and password in a secure location Intel SCS User Guide 54 Chapter 3 Setting up the RCS 3 10 4 Deleting the Database The installer does not uninstall the databa
106. ate a custom certificate request using the MMC Certificate snap in If you use this option make sure that this option is NOT selected in the Template drop down list No Template CNG Key The CNG Key option is selected by default in the Certificate Enrollment wizard but is not supported by Intel SCS You must change the selected Template to be No Template Legacy Key 10 3 Selecting the Remote Configuration Certificate Intel AMT validates the RCS remote configuration certificate by comparing a domain suffix or FQDN against the CN in the certificate Different Intel AMT versions perform this comparison in different ways This can have an impact on the certificate that an organization acquires If your network includes a mixture of Intel AMT versions you must acquire a certificate that is appropriate for all the versions that will be configured For more information and guidelines about how to select this certificate refer to this document An Introduction to Intel AMT Remote Configuration Certificate Selection available at https downloadcenter intel com Detail_Desc aspx agr Y amp DwnldID 21729 Intel SCS User Guide 203 Chapter 10 Setting up Remote Configuration 10 4 Acquiring and Installing a Vendor Supplied Certificate Contact one of the vendors whose root certificate hashes are built into the Intel AMT firmware A list of the hashes should be provided by the system vendor Go to the vendor s website and purchase an SSL certi
107. ating a Job You can create two types of jobs Manual This type of job only runs once and must be started manually Automatic This type of job is automatically started by the RCS at the time and date that you specify in the job You can define this type of job to run once or at specified intervals a recurring job Intel SCS User Guide 183 Chapter 8 Managing Jobs and Operations To create a job 1 Inthe Console click Monitoring E J 2 Select the Jobs tab and click CSI The Job Definition window opens E Job Definition Status New job Use a filter from an existing View x C petne nae fer Manually On this date Feb21 2012 13 24 z I Runjobevery 80 4 days Figure 8 2 Job Definition Window In the Job Name field enter a name for this job 4 Optional In the Description field enter a description for this job This field is for informational purposes only Intel SCS User Guide 184 Chapter 8 Managing Jobs and Operations 5 Inthe Filter section define on which systems this job will run e Use a filter from an existing View Select this option to use a filter from an existing view Select the view from the drop down list e Define a unique filter Select this option to define a filter that will be used in this job only Click Define to define the filter see Defining a System Filter on page 163 6 Inthe Start Job section select when the job will start e Manual
108. ating a database on the local SQL Server DatabaseTool exe CreateDB DBServer local DBName TestDB Example 2 Creating a database on a remote SQL Server DatabaseTool exe CreateDB DBServer 192 168 1 10 DBName TestDB Example 3 Creating a database using SQL Server authentication DatabaseTool exe CreateDB DBServer 192 168 1 10 DBName TestDB Username MySQLUser Password P ssw0rd 3 6 5 Adding the RCS User to the Database After creating the database you or the DBA must define how the RCS will access the database and which user account it will use To do this use the AddUser command of the Database Tool This is the syntax and parameters for the AddUser command DatabaseTool exe AddUser DBServer lt DB server gt DBName lt DB name gt Username lt SQL Login ID gt Password lt SQL password gt RCSUserWinAuth lt 0 1 gt RCSUsername lt username gt RCSPassword lt password gt The name FQDN or IP address of the SQL Server The name of the database Username By default the credentials of the user account running the Database Tool are used to authenticate with SQL Server If you want the Database Tool to use SQL Server authentication instead use this parameter to supply the Login ID Password The password of the SQL Server account only necessary if the user was supplied in the Username parameter Intel SCS User Guide 38 Chapter 3 Setting up
109. ation on page 129 e Configuring Systems using the RCS on page 130 Make sure that you include the ADOU parameter with the path to the old ADOU so that Intel SCS can delete the old objects 1 7 2 Manual Automatic Maintenance via Jobs If you installed the RCS component in database mode you can run maintenance tasks via jobs Jobs are run by the RCS and do not require the Configurator to be sent out to the Intel AMT systems in a deployment package You can create jobs that do all the specific maintenance tasks that you select or create jobs that automatically do only the necessary tasks You can also define recurring jobs that will automatically run according to an interval of days that you define For more information see Managing Jobs and Operations on page 178 Intel SCS User Guide 18 Chapter 1 Introduction 1 7 3 Manual Automatic Maintenance using the CLI The Command Line Interface CLI of the Configurator includes two commands that you can use to do most of the maintenance tasks To use this method you must send the Configurator out to the Intel AMT systems in a deployment package These are the CLI commands e MaintainAMT See Maintaining Configured Systems on page 138 e MaintainViaRCSOn1y See Maintaining Systems using the RCS on page 140 For more information about the Configurator see Using the Configurator on page 123 The MaintainAMT and the MaintainViaRCSOn1ly commands include a parameter named AutoMain
110. ation method uses the Public Key Infrastructure PKI of the Transport Layer Security TLS protocol and the RCS To use this method the Intel AMT device must have at least one active hash certificate defined in the Intel MEBX If the manufacturer does this before he sends the computer out then you can configure these computers remotely These are the main steps of this configuration method 1 Prepare the systems and the network for remote configuration see Setting up Remote Configuration on page 201 2 Use the Configurator to send a configuration request to the RCS see Using the Configurator on page 123 1 4 5 Configuration of Mobile Platforms Remote configuration of Intel AMT both PKI and PSk is done Out of Band via the onboard wired LAN interface This means that mobile platforms can only be configured remotely if both these conditions are true 1 In addition to the wireless interface they also have an onboard wired LAN interface 2 Before configuration starts the platform is directly connected to your organizations network via the wired LAN interface not via VPN Some of the latest Intel vPro platforms do not include an onboard wired LAN interface It is not possible to configure these platforms remotely Instead use the host based configuration method Intel SCS User Guide 6 Chapter 1 Introduction 1 4 6 Unified Configuration Process Intel SCS includes a Unified Configuration process This process lets y
111. ault Digest admin user in the Intel AMT device according to the password setting defined in the profile AutoMaintain Automatically does only the maintenance tasks listed here that are necessary for this Intel AMT system For more information see e About Maintenance Tasks on page 17 e Manual Automatic Maintenance using the CLI on page 19 Mandatory if any of the files that the Configurator will use are encrypted see File Encryption on page 9 The current password of the default Digest admin user defined in the Intel AMT device This parameter is NOT necessary if any of these are true e Intel SCS can find the Digest admin password in one of the RCS profiles or using a Digest Master Password e The user account running the Configurator RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions The path to a file that contains the network settings FQDN and or IP to put in the Intel AMT device Only use this parameter if you defined the source for at least one of these settings as a dedicated network settings file For more information see Defining IP and FQDN Settings on page 120 The Configurator can use these parameters to run a script after the command has completed successfully For more information see Scripts Run by the Configurator on page 151 139 Chapter 6 Using the Configurator 6 13 Maintaining Systems using the RCS Description Syntax Note The CLI does not
112. ave installed the optional CA plugin For information about this option see Using Intel SCS with the CA Plugin on page 197 If you select this option enter the necessary settings as defined by the plugin provider and continue from step 6 5 Ifthe certificate will be requested from a Microsoft CA do these steps a From the Certificate Authority drop down list select the Enterprise CA that Intel SCS will use to request a certificate for EAC posture signing b From the Certificate Template drop down list select the template that will be used to create the client certificate The templates shown are templates where the Subject Name is supplied in the request For information how to create a template see Defining Enterprise CA Templates on page 191 c Define the Common Names that will be included in the Subject Name of the generated certificate For more information see Defining Common Names in the Certificate on page 198 e Touse this option Intel SCS must have access to the CA during configuration see Required Permissions on the CA on page 189 e Ifyou are creating the profile on a computer that does not have access to the CA the drop down lists will not display the CA or the templates If necessary you can manually supply the CA name in the format FQDN CA Name and the name of the template 6 Click OK The Configure End Point Access Control window closes Intel SCS User Guide 115 Chapter 5 Defining Intel AMT Profiles
113. because the administrator password is missing in the profile Failed to read data from the registry A possible reason is that the registry value does not exist or access to it is denied Failed to verify the hash of the file supplied in the FileToRun parameter against the Hash supplied in the FileHash parameter Intel SCS User Guide 157 Chapter 6 Using the Configurator Description The Notify RCS operation failed This Intel AMT system already exists in the database Failed to connect to the RCS Failed to verify the file signature chain Either connect the computer to the Internet or manually download and install the root certificate update package from the Microsoft update catalog Intel SCS User Guide 158 Chapter 7 Monitoring Systems This chapter describes how to use the monitoring options available from the Console when working in database mode For more information see TA 7 2 7 3 7 4 715 7 6 dish 7 8 7 9 7 10 Zaki 7 12 About Monitoring Intel AMT SystemS 2 00 0000000000000000000000000000000000000 0000000000020122 160 About Adding and Deleting Systems 000000000000000000000000 000000000000000 00000000 cece eceeeeees 161 Creating AVEW en nee ta eet eet A ae EEEE 162 MIGWIMIG SVSUCINS 125052528 coc ei is Sh Beato eh ed ete alate hel ot cocina eas 165 Searching fora System 25 222523223 6 lt ses acecaunisciehet ves eatescacsiad dieser seseaeaceve caus aulgee awl 2 s 166 SOminG the
114. c ceeeccccecccccecccceeecceceeecs 219 11 12 Error The Callers Unauthorized sedene rE NEN I ESE tei cdes 219 11 13 Error when Removing AD Integration Error in SetKerberos 2 0222 02022 ecee eee eee cece ee 220 11 14 Failed Certificate Requests via Microsoft CA 02 20 222 c cece ccc ccc eee cece cece cece eeeeeeeee 220 11 15 Delta Profile Fails to Configure WiFi Settings 0 00 0 0222 c cece cece cee eee eee eee cece eee 221 11 16 Disabling the Wireless Interface 2 0 22 o loc cee cece eee cee cece e cece eee ee eeeeeeee 221 11 17 Configuration via Jobs Fails because of OTP Setting 0022 c cece c cece c cece ce eee eeee 222 Chapter 11 Troubleshooting 11 1 Damaged RCS Data Files If one of the data files used by the RCS in non database mode is damaged or missing e The Console shows a login failure message when trying to connect to the RCS e When you try to save a profile the Console shows an error message Solution Restore the latest backup version of the data files to the correct location see Backing up Data on page 50 If you did not create a backup do one of these e Uninstall and then reinstall the RCS non database mode This creates new empty copies of all the required data files OR e In the registry of the computer running the RCS add a DWORD key with the name Recover to this key e 32 bit operating systems HKLM SOFTWARE Intel Intel R Setup and C
115. ce and the profile are the same e Mismatch The FQDN setting in the device does NOT match the FQDN setting currently defined in the profile associated with that system These systems will remain in this state until the mismatch is fixed After the mismatch is fixed the system will be moved to the Unknown state Even if mismatches exist the Host FQDN Mismatch view will remain empty until you send discovery data from the Configurator To do this see Detecting Host FQDN Mismatches on the next page Intel SCS User Guide 170 Chapter 7 Monitoring Systems Detecting Host FQDN Mismatches Host FQDN mismatches are detected using the ReportToRCS parameter of the Configurator CLI SystemDiscovery command For example ACUConfig exe SystemDiscovery ReportToRCS AdminPassword lt password gt RCSAddress lt RCSAddress gt For the full syntax of this command see Discovering Systems on page 126 This is what occurs for each system when you use this parameter 1 The discovery data is sent to the RCS and added updated in the record of the Intel AMT system in the database This data includes all the network related settings that are currently defined in the host operating system and the Intel AMT device You can view this data in the Host Based tab of the Discovery Data window in the Intel AMT entry 2 The RCS uses the discovery data to compare the FQDN setting in the device with the FQDN setting defined in the profile 3
116. cececececeees 99 5 8 2 Defining Remote Access Policies 2 2 0 2 22 c cece cee ccc eee cee eee cence cee cece cece ceeeeeee 101 5 9 Defining Trusted Root Certificates 20 0 0 22 c cece cece eee eee eee ee eee ee ence eens 102 5 10 Defining Transport Layer Security TLS 22 0002 22 0 c eee eeeceeeeeee cece eee norna 104 5 10 1 Defining Advanced Mutual Authentication Settings 0 0222 02222 c eee eee eee eee 105 5 21 Defining Network Setups 2 0 2 csseshsascssacacsseoic degeusesceasseanssescacsaansancecsdessabasaaaascenss 107 5 11 1 Creating WiFi SetupsS c2 2 2 eee c 2 ccc due rer dodvepciwsssccuwt eb ccigudageveseeceuectes 109 5 12 Creating 802 x Setups esnie e sce adade lasek Secs becca Ee n EE EE REER DES 111 5 11 3 Defining End Point Access Control 0 0 cee cece cece cece cee ce ence cece eceeeneeeeeeeeeees 114 5 12 Defining System Settings on occa es coon wach onde cres iiorec rS ND eyes ae yadee cso EEEN EPE STEATE En oE 116 5 12 1 Defining IP and FQDN SettingS ccccc ccc cecc cece ce ccceeeeacecseeecciccsecucssdeceseceeesteces 120 Chapter 6 Using the Configurator 2 2 22 22 c cece cece cece eee eee eee eect eee ee eeee 123 6 1 About the Configurator 2 2 22 c cece cece cece cece cccecccceeecceeececeeececeeececeeeeecececececececeeeceees 124 60 2 SCID SCN a sc se seed ee ee ee eee 124 6 3 Configurator Log Files 22 00 002 o cece ccc eee eee eee ee EE
117. ck Add The Add Trusted Root Certificate window opens E Add Trusted Root Certificate loj x From Certificate Authority z From File Figure 5 13 Add Trusted Root Certificate Window 3 Select one of these e From Certificate Authority From the drop down list select the Enterprise Certification Authority CA e From File Enter the path to the file or click Browse to locate and select a certificate The file must be in base64 PEM format You can only add a certificate from a CA if the certificate is self signed and the CA is a root CA You cannot add a certificate from a subordinate CA 4 Click OK The Path to Root Certificate window closes and the certificate shows in the Trusted Root Certificates Used In Profile window Select the check box of at least one of the trusted root certificates in the list 6 Click OK The Trusted Root Certificates Used In Profile window closes Intel SCS User Guide 103 Chapter 5 Defining Intel AMT Profiles 5 10 Defining Transport Layer Security TLS The Transport Layer Security TLS window of the Configuration Profile Wizard lets you define TLS settings to apply to the Intel AMT system When TLS is enabled the Intel AMT device authenticates itself with other applications using a server certificate If mutual TLS authentication is enabled any applications that interact with the device must supply client certificates that the device uses to authenticate the applicati
118. ck the Security tab The Security tab opens 14 Make sure that the user running the Configurator or the group the user is in is included in the list of users and has the Read and Enroll permissions Intel SCS User Guide 195 15 16 17 18 19 20 21 Chapter 9 Preparing the Certification Authority If this is a template for TLS do these steps a Click the Extensions tab The Extensions tab opens b From the list of extensions select Application Policies and click Edit The Edit Application Policies Extension window opens c Click Add The Add Application Policy window opens d From the list of Application policies select Server Authentication and click OK the Server Authentication policy contains this OID 1 3 6 1 5 5 7 3 1 e Click OK to return to the Properties of New Template window If you define Mutual TLS in the configuration profile each application that needs to communicate with the Intel AMT device will need a certificate In addition to the Server Authentication OID added in step 14 d the certificate must contain these OIDs e For remote access 2 16 840 1 113741 1 2 1 e For local access 2 16 840 1 113741 1 2 2 You can add these OIDs to this template by clicking New in the Add Application Policy window You must then install a certificate based on this template in the certificate store of the user running the application Click OK The Properties of New Template window closes Sel
119. ct the check boxes of the components that you want to install on this computer e Remote Configuration Service RCS Installs the RCS e Console Installs the Console You can install this component on any computer that can connect to the computer running the RCS Note When installing the RCS make sure that the Database Mode option is selected Intel SCS User Guide 40 Chapter 3 Setting up the RCS 4 Click Next If you selected to install the RCS the RCS User Account window opens This window defines the user under which the RCS will run x RCS User Account intel Specify the Windows user account that will run the RCS on this computer Username Network Service Password Figure 3 2 RCS User Account Window In the Username field by default the Network Service account is selected It is recommended to run the RCS using this built in security account see Using the Network Service Account on page 35 5 Optional If you do not want to use the Network Service account a Click Browse The Select Users or Groups window opens b Enter the user that will run the RCS on this computer Enter the username in the format domain username In a Windows Workgroup enter the username in the format computer username c Click OK The Select Users or Groups window closes d Inthe Password field enter the password of the user you selected only the Network Service account does not require a password Intel
120. ction describes the main maintenance tasks and when they are necessary The maintenance tasks described in this section are not applicable to systems configured using the SMB Manual configuration method Synchronizing the Clock The Intel AMT device contains a clock that operates independently from the clock in the host operating system For devices configured to use Kerberos authentication it is important to synchronize the device clock with the clock of a computer in the network The clock of that computer must also be synchronized with the Key Distribution Center This is not done by Intel SCS When the clock is not synchronized Kerberos authentication with the device might fail For Kerberos enabled devices Intel recommends to synchronize the clock at two week intervals Synchronizing Network Settings After configuration the Intel AMT device contains IP and FQDN settings that management consoles use to connect to the device Changes in the network environment or the host operating system might make it necessary to change the settings in the device Reissuing Certificates Intel AMT devices can be configured to use certificates for authentication when using TLS EAC Remote Access or 802 1x When certificates are issued by a Certification Authority they are valid for a specified time These certificates must be reissued before they expire Intel recommends that you schedule this maintenance task to run a minimum of 30 days before
121. d Configuration 1 Do steps 1 and 2 as described in Method 1 2 Export the profile to XML In the Export Profile to XML File window supply the username and password of a user that has permissions to connect to the AD CA 3 Use the ConfigAMT command of the Configurator CLI use MaintainAMT for maintenance tasks For more information see Unified Configuration Process on page 7 Intel SCS User Guide 30 Chapter 2 Prerequisites 2 5 Required User Permissions The permissions required by the user account running the Configurator depend on the state of the Intel AMT device Unconfigured Systems The local user account running the Configurator must have administrator permissions in the operating system On operating systems with User Account Control UAC the Configurator must be Run as administrator If the Configurator will be required to request certificates from a Certification Authority CA or create Active Directory AD objects the user account must have sufficient permissions to do these tasks Configured Systems After an Intel AMT device is configured reconfiguration and maintenance tasks can only be done by a user defined in the device with administrator permissions The user account running the Configurator is not required to have administrator permissions in the operating system If the Intel AMT device is in Client Control mode you can unconfigure Intel AMT without requiring administration privileges in the
122. d in the configuration profile Intel SCS User Guide 129 NetworkSettingsFile lt file gt LleToRun ileHash LleUser LlePassword Chapter 6 Using the Configurator The path to a file that contains the network settings FQDN and or IP to put in the Intel AMT device Only use this parameter if you defined the source for at least one of these settings as a dedicated network settings file For more information see Defining IP and FQDN Settings on page 120 The Configurator can use these parameters to run a script after the command has completed successfully For more information see Scripts Run by the Configurator on page 151 6 8 Configuring Systems using the RCS Description Syntax Note The CLI does not support passwords that start with a forward slash Sends a configuration request to the RCS The RCS remotely configures Intel AMT using a profile located in the RCS Configured systems are reconfigured The RCS uses one of the TLS protocols PSK or PKI during the configuration process see Security Before and During Configuration on page 13 Note This command puts the Intel AMT device in the Admin Control mode see Control Modes on page 12 ACUConfig exe global options ConfigViaRCSOnly lt RCSaddress gt lt profilename gt AbortOnFailure AdminPassword lt password gt WMIUser lt username gt WMIUserPassword lt password gt ADOU lt ADOU path gt NetworkSettingsFile lt
123. d the Next button is enabled Intel SCS User Guide 58 7 10 11 12 Chapter 3 Setting up the RCS Click Next The Storage Encryption Key window opens This window installs the encryption key for the RCS version 9 0 to use when accessing the data files E Intel SCS Installer Storage Encryption Key Data stored by the RCS is encrypted using a storage encryption key This key must be installed on the computer running the RCS Generate Storage Key file Load and install the key from this file Encryption Key File Browse File Password Figure 3 14 Storage Encryption Key Window Select one of these e Generate storage key file Select this option to automatically create and install the storage encryption key e Load and install the key from this file You can select this option if you already have a storage encryption key created by Intel SCS 9 0 for example you already upgraded an RCS on another computer If you select this option click Browse and select the storage encryption key file In the File Password field you must also enter the password that was used to encrypt the key file Click Next The Confirmation window opens This window shows the location of the installation folder If the previous version was installed in the default location version 9 0 will be installed in the new default location C Program Files Intel SCS9Q If not version 9 0 will be installed in the same folder
124. d to the job e For automatic jobs the systems are added to the list just before the job starts This means that the job will run on systems that match the filter at the time that the job starts e Forrecurring jobs the list of systems in the job is automatically updated each time the job starts Intel SCS User Guide 185 Chapter 8 Managing Jobs and Operations To view the job items 1 Inthe Console click Monitoring and select the Jobs tab 2 Right click the job and select View Systems The List of Systems in Job window opens iix Use the below options to narrow your search within the list of systems included in this job UUID OOo o Vv Waiting M In Progress M completed Successfully Intel AMT FQDN i M Aborted M Pending Retry M Failed maara _ Intel AMTFQDN a Status intelamt 7 example domain Completed Successfully intelamt 7 1 example domain In Progress intelamt 6 2 example domain In Progress intelamt 6 0 example domain In Progress intelamt 5 4 example domain In Progress Figure 8 3 List of Systems in Job Window e You can show hide systems in the list using the check boxes and the search fields columns and then clicking Search If the job status is Waiting you can delete systems from the list by right clicking them and selecting Delete Item from List If a system is deleted the operation will not run on that system when the job starts After a job starts you cannot delete a system from the j
125. deployment packages that include maintenance or configuration requests that will be sent to the RCS 2 In database mode make sure that no jobs will be running during the upgrade When you are ready to start the upgrade stop and disable the RCS To do this stop the Windows service named RCSServer and change the Startup Type to Disabled If you do not disable the RCS any configuration requests that are received during the upgrade process might cause the upgrade to fail and even corrupt the existing data 4 Make a full backup of the Intel SCS data e In database mode make a full backup in SQL Server e In non database mode refer to the User Guide of the version of Intel SCS that is currently installed The upgrade process does not include a rollback process If the upgrade fails and the data is corrupted the only way to recover is by restoring a full backup of the original data Intel SCS User Guide 56 Chapter 3 Setting up the RCS 3 11 2 Upgrading Non Database Mode This procedure describes how to upgrade from non database mode of Intel SCS version 8 x To upgrade from non database mode of Intel SCS version 8 x 1 Make sure that you have made a full backup and disabled the RCS see Before Starting the Upgrade on the previous page 2 Double click Intel1SCSInstaller exe The Welcome window opens This window shows the currently installed components that the installer will upgrade on this computer If you want to add a
126. device To do this you must run the Configurator with a local user account with administrator permissions on the Intel AMT system On operating systems with UAC the Configurator must be Run as administrator Intel SCS User Guide 31 Chapter 3 Setting up the RCS This chapter describes how to set up the Intel SCS Remote Configuration Service For more information see Sul 32 3 3 3 4 3 5 3 6 3 7 3 8 3 9 3 10 3 11 3 12 PEE TEE E a E A A 33 Selecting the Type of Installation 22dcccc vaceaxecescscecexadedsaunsaeeeassecessddaeassesdaduavessonseusen 33 WSinqvehieimStalle hss EEEE 22 s022222c0 2 eg oansen sear Saecacde st oheaeas EEEE EEE EEEE E EE 34 RCS User Account REQUIFCMMCIMES oi cio sects pleas cele o E a E GERE NEEE 34 Using the Network Service Account 02 22 0022 ccc cece eee cee eee cee eee cee ee eee ee cece aroro 35 Tinstalling Database Mode lt ace siete ces 2 cee cieiaareogs ce eenn aeaea ia eE eai sisiawladies eeii i 36 Installing Non Database Mode 2 22 000 22 222 c eee ee eee eee eee ee cee ee eiai Sneek 44 User Permissions Required to Access the RCS ecaa o ae i aia 47 latalo inene oA EY e at etched ea ec siege as Saw a A EE TEESE EANA EE e aUaleeeSe gee 50 Modifving ain Existing IMStalla tO cccicc cnc ceccaisiees ce oc daciisaunadnssanlaueddelduslaane oc neeealss enai 51 Uporading MtelS CS iina E hin nseacearehoieaaaeaesauacicaeaekece 56 Silent instalat Omsen O EEr E oan eee a
127. does not need to save these admin passwords because they can be recalculated when necessary After configuration applications that need to use the default admin user must recalculate the password themselves or ask the RCS to calculate it for them Before you can use the Digest Master Password method you need to 1 Install the RCS see Setting up the RCS on page 32 2 Define the Digest Master Password see Defining the RCS Settings on page 73 Intel SCS User Guide 15 Chapter 1 Introduction 1 6 2 User Defined Admin User Kerberos If your network has Active Directory AD you can also define your own administrative user in the device that will be authenticated using Kerberos You can then use this user instead of the default admin user To use a dedicated Active Directory Admin User Kerberos 1 Define an AD user in the Intel AMT device with the PT Administration realm see Defining the Access Control List ACL on page 93 2 Define a password for the default admin user See Default Admin User Digest on the previous page The application communicating with the Intel AMT device using the AD user will not use or require this password 3 Run the Configurator RCS using the credentials of the user defined in step 1 e When using a Kerberos user always make sure that this Kerberos user exists in the ACL of the profile you use to do reconfiguration e When using a Kerberos user and the host based configuration method e The
128. dow 2 From the Profile Type drop down list select the type of profile for the Intel product that you want to configure The profile type is the name of the Intel product 3 Inthe Profile Name field enter a name for this profile The profile name e Can be a maximum of 32 characters e Cannot be empty or include only whitespace characters e Must include only 7 bit ASCII characters in the range of 32 126 not including these characters C1 ND CD DC OS CF DO Ge C8 CLCC 4 Optional In the Description field enter a description for the profile This field is for informational purposes only 5 Click OK The relevant wizard for the selected profile type opens Continue in the wizard and define the settings that you want to configure with the profile Intel SCS User Guide 78 Chapter 4 Using the Console 4 5 Exporting Profiles from the Console To use unified configuration see Unified Configuration Process on page 7 you must export the Intel AMT profile in the Console to an XML file You must then put this exported profile in your deployment package To export the profile 1 In the Console click Profiles and then select the Intel AMT profile you want to use to configure the systems 2 Click Export to XML The Export Profile to XML File window opens Et Export Profile to XML File fe Export this profile to an XML file and use it to automatically select the configuration method remote or host based supported by the
129. e administrators e Intel RCS Master Password Give permissions to this namespace to users who need to use the RCS to calculate or get the Digest Master Password e Intel RCS Systems Give permissions to this namespace to users who need to use the monitoring options of the RCS in database mode For each namespace these are the necessary WMI permissions e Execute Methods e Full Write e Remote Enable These permissions are set in the Security tab of the WMI Control Local Properties window Intel SCS includes a utility that you can use to give these permissions to the relevant user and group accounts The RCS Utility RCSUtils exe is located in the Utils folder Example 1 Adding a user named MyUser to the Intel RCS namespace only RCSutils exe Permissions Add MyUser Example 2 Adding a user to all the RCS namespaces RCSUtils exe Permissions Add MyUser RCSNamespace All You must run the RCS Utility on the computer where the RCS is installed and running The local user account running the RCS Utility must have administrator permissions on the computer On operating systems with User Account Control UAC the utility must be Run as administrator For more information refer tothe Intel R SCS RCSUtility pdf also located in the Utils folder Intel SCS User Guide 49 Chapter 3 Setting up the RCS 3 9 Backing up Data The type of installation you selected causes the RCS to store data in
130. e e 1 The device has a Private Share Key defined PID PPS e 2 The device is set for PKI authentication e CS_AMT_PID The PID of the TLS PSK key for PSK only 10 6 2 Preparing to Use Scripts To use the script option e The RCS must be set to listen for Hello messages and to use the script that you supply see Defining the RCS Settings on page 73 e The Intel AMT system must be prepared for configuration using one of these methods that use the TLS protocol e One Touch Configuration using PSK on page 6 e Remote Configuration using PKI on page 6 e The Intel AMT system must send a Hello message This will happen automatically if the system was prepared for Bare Metal Setup and Configuration by the manufacturer If not you can send a Hello message using the Configurator CLI see Sending a Hello Message on page 147 10 6 3 Defining a Script Script functionality is the responsibility of the IT organization The script can retrieve the information from an external source or from the host containing the Intel AMT device For example e The script can send a Windows Management Instrumentation WMI query to get the FQDN from the host using the IP address sent in the Hello message This requires the host to be operational and running a version of Microsoft Windows that can process WMI queries e The script can get the FQDN from a pre prepared database or file containing the UUID and FQDN of each Intel AMT device Sample Script
131. e configuration certificate in the store until it finds a certificate with this suffix in the CN Defines how the FQDN hostname suffix for the Intel AMT device is constructed Valid values e DNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Primary DNS Suffix from the host operating system This is the default setting and is correct for most network environments SpecificDNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Connection specific DNS Suffix of the on board wired LAN interface AD The hostname part of the FQDN is the hostname from the host operating system The suffix is the AD domain of which the host operating system is a member DNSLOOKUP Takes the FQDN returned by an nslookup on the IP address of the on board wired LAN interface To use this option the DNS must be configured correctly with Reverse Lookup Zones HOST Takes the hostname from the host operating system The suffix is blank Defines the number of times to resend the request to the RCS if the RCS returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 146 Chapter 6 Using the Configurator 6 16 Disabling Client Control Mode Command DisableClientControlMode Description Permanently disables the Client Con
132. e continue from step 10 e If you have already upgraded the database continue from step 11 10 Ifthe database has not already been upgraded the Upgrade Intel SCS Database window opens If you want the installer to do the upgrade now a Click Upgrade Database and wait for the database upgrade to complete b When complete click Close to close the Upgrade Intel SCS Database and then continue from step 12 Intel SCS User Guide 63 Chapter 3 Setting up the RCS 11 Ifthe database has already been upgraded to version 9 0 the Storage Encryption Key window opens x Storage Encryption Key intel Data stored by the RCS is encrypted using a storage encryption key This key must be installed on the computer running the RCS Load and install the key from this file Encryption Key OS File ik File Password Figure 3 18 Storage Encryption Key Window a Click Browse and select the storage encryption key file that was created when the database was upgraded by the Database Tool In the File Password field you must also enter the password that was used to encrypt the key file b Continue from step 12 12 Click Next The Confirmation window opens This window shows the location of the installation folder If the previous version was installed in the default location version 9 0 will be installed in the new default location C Program Files Intel scs9 If not version 9 0 will be installed in the same folder in which yo
133. e ACL e Create a new user by clicking Add See Adding a User to the ACL on the next page e Edit an existing user by clicking Edit e Remove a user from the list by clicking Remove Intel SCS User Guide 93 Chapter 5 Defining Intel AMT Profiles 5 6 1 Adding a User to the ACL The User Group Details window lets you add a new user or user group to the profile s Access Control List To add a user 1 From the Access Control List ACL window click Add The User Group Details window opens aioIx User Type Digest User Active Directory User Group User Group Name Browse AccessType Remote SSCS Realms Redirection PT Administration Hardware Asset Remote Control Storage Event Manager Storage Administration Agent Presence Remote Figure 5 7 User Group Details Window 2 Inthe User Type section select the required type of user e Digest User Enter the username and password see Password Format on page 9 The usernames admin and administrator are not permitted these names are reserved for the default admin user The username must be unique in this profile a maximum of 16 characters and cannot contain these characters C amp lt or gt Usernames starting with are not permitted e Active Directory User Group Click Browse and select the user or group You cannot select the default user groups from
134. e FQDN defined in the Intel AMT device The UUID of the Intel AMT device Intel SCS User Guide 150 Chapter 6 Using the Configurator 6 19 2 Scripts Run by the Configurator Scripts run by the Configurator are only run on Intel AMT systems that support host based configuration Intel AMT 6 2 and higher The script must be put in a location that the Configurator can access from the Intel AMT system The Configurator can run a script after configuration reconfiguration and maintenance operations done with these commands e ConfigAMT e MaintainAMT This table describes the CLI parameters of these commands used to run scripts Table 6 3 CLI Parameters Parameter Description ileToRun If this parameter is supplied the Configurator will run this executable file batch script i lename gt or executable after the command has completed If the FileToRun parameter is used without the LowSecurity global option the file must be digitally signed see Digital Signing of Files on page 10 If the file is not signed the Configurator will NOT run the CLI command or the file In addition if the LowSecurity parameter is not used the file must be located in the same folder as the ACUConfig exe file These additional optional parameters are valid only if FileToRun was specified FileHash When this parameter is supplied the Configurator runs a hash function on the file lt SHA256 hash gt supplied in the FileToRun parameter The r
135. e FQDN setting in the Intel AMT device is not updated with these changes problems can occur For example many organizations use the name of the computer user as part of the hostname When re assigning a computer to a different user they reconfigure the hostname in the operating system with the name of the new user During support calls the support personnel use this hostname to locate and identify the computer in the network If the FQDN setting of the Intel AMT device contains the old hostname they might not be able to locate or connect to the correct device Intel SCS includes options that you can use to detect and fix these mismatches The options described in this section are not available if you are using a dedicated network settings file to set the FQDN Viewing Host FQDN Mismatches The Monitoring gt Views tab includes a default view named Host FQDN Mismatch This view only includes systems in the database that match this filter e Managed State Managed e Host FQDN State Mismatch For each system in the database the Host FQDN State can be one of these values e Unknown This is the value of all systems when they are first added to the database or after a mismatch was fixed These systems will remain in this state until discovery data is sent from the Configurator When the discovery data is updated the system will be moved to the Synchronized or the Mismatch state e Synchronized The FQDN setting in the devi
136. e eee eee e eee ee 206 Remote Configuration Using Scripts 0 00 0 0002 c cece ccc eee eee eee cece ee eee cence ee 210 10 Chapter 10 Setting up Remote Configuration 1 About Remote Configuration This section describes concepts and terms related to the remote configuration option of Intel AMT Embedded Hashed Root Certificates The Intel AMT system contains one or more root certificate hashes from worldwide SSL certificate providers in the firmware image When the RCS authenticates to the Intel AMT system it must do so with a certificate compatible with one of the hashed root certificates Self signed Certificate The Intel AMT system produces a self signed certificate from which the public key can be passed to the RCS Limited Network Access The Configurator opens the network interface of the Intel AMT system to send the configuration request After 24 hours the interface automatically closes if the setup and configuration is not completed One Time Password OTP This optional feature can be used to make sure that the RCS will only respond to legitimate remote configuration requests Before the configuration request is sent to the RCS an OTP can be set in the Intel AMT device This OTP can then be sent to the RCS as part of the configuration request If the RCS is defined to require an OTP the RCS asks the device to provide the OTP that was set The RCS compares the OTP sent from the device with the OTP that was sent
137. e existing AD object representing the system A new AD object is created in the ADOU defined in the configuration profile The path to a file that contains the network settings FQDN and or IP to put in the Intel AMT device Only use this parameter if you defined the source for at least one of these settings as a dedicated network settings file For more information see Defining IP and FQDN Settings on page 120 Defines the number of times to resend the request to the RCS if the RCS returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 131 Chapter 6 Using the Configurator 6 9 Adding a Configured System Description Sends a request to the RCS to add a configured Intel AMT system to the database The RCS then tries to connect to the Intel AMT device If successful the system is added to the database in the Managed state If not the system is added to the database in the Unmanaged state To understand when this command is necessary and the limitations of the Unmanaged state see e About Adding and Deleting Systems on page 161 e Changing the Managed State of Systems on page 169 Note After running this command some information in the database record for the added system might be missing for example details about the configuration profile To update this information run the SystemDiscovery command see Discover
138. e gt FileHash lt SHA256 hash gt FileUser lt username gt FilePassword lt password gt See CLI Global Options on page 125 The XML file containing the original configuration settings that were used to configure Intel AMT Settings in the XML file not related to the specified maintenance tasks are ignored 138 lt task gt DecryptionPassword lt password gt AdminPassword lt password gt NetworkSettingsFile lt file gt LleToRun ileHash LleUser LlePassword Intel SCS User Guide Chapter 6 Using the Configurator Define at least one of these maintenance tasks e SyncAMTTime Synchronizes the clock of the Intel AMT device with the clock of the computer running the RCS If the device supports host based configuration the clock is synchronized with the clock of the host This task is performed automatically when any of the other tasks are performed SyncNetworkSettings Synchronizes network settings of the Intel AMT device as defined in the lt NetworkSettings gt tag of the lt filename gt XML file see Defining IP and FQDN Settings on page 120 ReissueCertificates Reissues the certificates stored in the Intel AMT device If the device contains 802 1x certificates the RenewADPassword task is automatically done as well RenewADPassword Changes the password of the Active Directory object representing the Intel AMT system RenewAdminPassword Changes the password of the def
139. e request 15 Click the Request Handling tab and select the Allow private key to be exported check box 16 Click OK The Properties of New Template window closes 17 Select Start gt Program Files gt Administrative Tools gt Certification Authority The Certification Authority window opens 18 From the tree in the left pane select Certificate Templates 19 Right click in the right pane and select New gt Certificate Template to Issue 20 Inthe Enable Certificate Templates window select the template that you just created and click OK The template is now included in the right pane with the other certificate templates 21 Restart the CA to publish the new template into Active Directory 10 5 2 Requesting and Installing the Certificate This procedure describes how to request and install the certificate on the computer running the RCS RCSServer exe To install the certificate 1 Onthe computer running the RCS open an internet browser and connect to Certificate Services for the Root CA using this naming convention http CA_FQDN certsrv If the CA requires an SSL connection use this naming convention instead https CA_FQDN certsrv Click Request a certificate Click advanced certificate request Click Create and submit a request to this CA no A U N From the Certificate Template drop down list select the certificate template that you created see Creating a Certificate Template on page 206e 6 Inthe Ident
140. e set in the Intel AMT device Get the IP from the DHCP server Use the same IP as the host for static IP only Get the IP from the dedicated network settings file DNS Define how the device will update the DNS with the FQDN and IP Do not update Update only via DHCP option 81 Update the DNS directly or via DHCP option 81 Figure 5 23 Network Settings Window Intel SCS User Guide 120 Chapter 5 Defining Intel AMT Profiles To define the IP and FQDN settings 1 From the FQDN section select the source for the FQDN hostname suffix e Use the following as the FQDN e Primary DNS FQDN The hostname part of the FQDN is the hostname from the host operating system The suffix is the Primary DNS Suffix from the host operating system This is the default setting and is correct for most network environments e On board LAN connection specific DNS FQDN The hostname part of the FQDN is the hostname from the host operating system The suffix is the Connection specific DNS Suffix of the on board wired LAN interface e Host Name Takes the host name from the operating system The suffix is blank e Active Directory FQDN The hostname part of the FQDN is the hostname from the host operating system The suffix is the AD domain of which the host operating system is a member e DNS Look Up FQDN Takes the name returned by an nslookup on the IP address of the on board wired LAN interface To use
141. ebaaadaaaagasetaaesoakeaaseredensnes 3 3 Whatis Unicel A e229 scr gat oe se ed Sega toe Ane ual epee a lA Agee tne chien ete GN 4 1 4 Configuration Methods and Intel AMT Versions 022 002 2 2222 e cece eee e eee cece eee ee eee eeeee 4 125 IntebAMiT and Security Considerations s ssamen e stakes duane e 9 1 6 Admin Permissions inthe IntellAMT DeViGei2 222 2d 225208 sot a aa a dene 15 due Maintenance Policies for Intel AMT sc ccossee gies ia neAghetw ssi a dach ee bua etasi aA A 17 1 8 Support for KYM RedirectiOM ssa tae hock toad ae st hace cue hate E ota ae ies 21 1 9 Supportfor Integration with Intel SBA c 2scascsccsssce eset ce deousadean sees a e EE S ne 22 Chapter 1 Introduction 1 1 What is Intel SCS Intel Setup and Configuration Software Intel SCS is a collection of software components and utilities developed by Intel You can use Intel SCS to discover configure and maintain Intel products and capabilities on the platforms in your network Intel SCS includes these components Intel SCS Remote Configuration Service The RCS is a Windows based service that runs ona computer in the network The RCS can process configuration requests sent by the other Intel SCS components In database mode the RCS also handles storage of data collected and sent to the RCS by other Intel SCS components For more information see Setting up the RCS on page 32 Intel SCS Console The Console is the user interface to the
142. ece cece eee cece eee eeeceeeeeees 202 10 2 Prerequisites for Remote Configuration 0022 c cece cece cee cece eee cece eect eee ceeeeeees 203 10 3 Selecting the Remote Configuration Certificate 2 2 0 2 0 0 22 e eee eee 203 10 4 Acquiring and Installing a Vendor Supplied Certificate 2 002200 o occ ccc eee eee eee eee 204 10 4 1 Installing a Vendor Certificate 22 22 c ee ccc cece cece ccceeccceeecccececceceeeteceeees 204 10 4 2 Installing a Root Certificate and Intermediate Certificates 000 0002 222222222 206 10 5 Creating and Installing Your Own Certificate 0 202202 20 o ec ccceeceeeceeeeecee eee eee 206 10 5 1 Creating a Certificate Template 2 2222 ccc eee eee eee eee eee 206 10 5 2 Requesting and Installing the Certificate 2 02 0 occ eee eee eee 209 10 5 3 Entering a Root Certificate Hash Manually in the Intel AMT Firmware 209 10 6 Remote Configuration Using Scripts 00 0020 2 eee eect cece eee eeeeeeee 210 10 6 1 How the Script Option Works 22 000 c occ cece cece eee ee ee ee eee ee eee eee eeeeee 210 10 6 2 Preparing tolWSe SGripts secesie derase rE ei ar e EA Ee eSa SEERE deedes 211 10 6 3 Definnga Script essere es e a a aet a ee el es 2h ce aean eE 211 Chapter 11 Troubleshooting 0 002 222 cece eect eee ee cece eee eee eeeee 212 11 1 Damaged RCS Data Files a occcs cosy a ee os ee a eh a te
143. ect Start gt Programs gt Administrative Tools gt Certification Authority From the Console Root tree select Certificate Authority gt Certificate Templates Right click in the right pane and select New gt Certificate Template to Issue The Enable Certificate Templates window opens Select the template that you just created and click OK The Enable Certificate Templates window closes and the template is added to the right pane with the other certificate templates Restart the CA to publish the new template in the Active Directory Intel SCS User Guide 196 Chapter 9 Preparing the Certification Authority 9 3 Using Intel SCS with the CA Plugin By default Intel SCS requests certificates from a Microsoft CA Intel SCS can also request certificates from other types of CA by using a CA plugin The plugin is installed on the computer running the RCS Each time that the RCS starts the plugin is automatically loaded only one CA plugin can be loaded After the plugin is loaded these fields are shown in each profile window that contains certificate based authentication options Remote Access TLS 802 1x EAC Select the method for creating the certificate Request certificate via CA plugin Certificate Authority Certificate Info ej Certificate Secure Info oj Common Names CNs in certificate Default CNs User defined CNs e The RCS only loads plugins that are compatible with Intel SCS e Y
144. ecute permissions on the scripts and the folder where the scripts are located e Scripts 2 and 3 will NOT run on systems with Intel AMT 6 2 and higher if they are configured in Client Control mode This is because for these systems unconfiguration is always done locally by the Configurator Also the Unconfigure command does not support the FileToRun parameter used by the Configurator to run scripts locally This table describes the parameters and the sequence in which the RCS sends them to script 1 Intel SCS User Guide 149 Chapter 6 Using the Configurator Table 6 1 Parameters Sent by the RCS to Script 1 Description The type of operation that was done on the Intel AMT device 1 Configuration e 2 Reconfiguration e 3 Maintenance The status of the operation e 0 Succeeded e 32 Completed with warnings The FQDN defined in the Intel AMT device fe renane OO The password of the default Administrator admin user in the Intel AMT device The RFB password defined in the Intel AMT device for port 5900 String Example 1 0 myamtname example com 192 168 1 10 88888888 8887 8888 8888 878888888888 mebxpassword adminpassword rfbpassword Parameters marked with an asterisk are sent to the script in Base64 format This table describes the parameters and the sequence in which the RCS sends them to scripts 2 and 3 Table 6 2 Parameters Sent by the RCS to the Scripts 2 and 3 Description Th
145. ed This parameter is mandatory and exists to remind you that you must disable the RCS before using the UpgradeDB command The name FQDN or IP address of the SQL Server The name of the database Username By default the credentials of the user account running the Database Tool are used to authenticate with SQL Server If you want the Database Tool to use SQL Server authentication instead use this parameter to supply the Login ID Password The password of the SQL Server account only necessary if the user was supplied in the Username parameter KeyFileName By default the Database Tool creates an encryption key file named RCSStorage key in the folder where the Database Tool is located You can use this parameter to supply an alternative path and filename Intel SCS User Guide 60 Chapter 3 Setting up the RCS Examples Example 1 Upgrading a database on the local SQL Server DatabaseTool exe UpgradeDB DBServer local DBName TestDB Example 2 Upgrading a database on a remote SQL Server DatabaseTool exe UpgradeDB DBServer 192 168 1 10 DBName TestDB Example 3 Upgrading a database using SQL Server authentication DatabaseTool exe UpgradeDB DBServer 192 168 1 10 DBName TestDB Username MySQLUser Password P ssw0rd 3 11 3 2 Upgrading the RCS and Console This procedure describes how to upgrade from database mode of Intel SCS version 8 x To upgrade from database mode of Intel SCS ver
146. ed to access the Internet Digital certificates contain data about the organization from which they were issued This data forms a certificate chain that ends in a trusted root certificate of a known CA If the trusted root certificate is not installed in the operating system Windows uses an automatic update mechanism to download the necessary root certificate from Microsoft Some versions of Windows for example Windows 8 do not include all the trusted root certificates necessary to validate time stamped digital signatures If these systems also do not have Internet access the automatic update mechanism will fail Solutions e Make sure that host operating system has access to the Internet This is the easiest solution because the certificate will be downloaded automatically e Ifyou cannot connect the Intel AMT system to the Internet manually download and install a root certificate update package from the Microsoft update catalog Select the relevant package for the operating system from this website http catalog update microsoft com v7 site Search aspx q root 20certificate 20update Intel SCS User Guide 214 Chapter 11 Troubleshooting 11 5 Remote Connection to Intel AMT Fails During configuration an IP address is set in the Intel AMT device This IP address is used by management consoles and Intel SCS to remotely connect to Intel AMT If the IP address is incorrect these problems might occur e Your management co
147. ee cecceeeecce eee eee eee cece eee cece eeeeeeeeeeeees 147 Sending a Hello Message 22 0222 oe cece ccc eee ee ee ee ee ee ee eee ee eee eee ee ee eeeeeees 147 Disabling the EHBC Optio wis cscs oseeeensecaaaceuseecneeccduseceseecee gees svaduwaracuusdebayeeeecageuseness 148 Running Scripts with the Configurator RCS 22 2 cece ee ccc cece cece ccceeccececcccccecccceccceeeeers 149 Configurator Return Codes 2 22 2 2c cece eee ee ee ee eee ee ee eee eee eee ee eee eeeeeeeee 154 Chapter 6 Using the Configurator 6 1 About the Configurator The Command Line Interface CLI of the Configurator component lets you automatically do tasks on multiple Intel AMT systems The Configurator is run locally on the Intel AMT system using a script or a batch file If possible the Configurator does the necessary task locally on the system If not the Configurator sends the task to the RCS The CLI also includes commands that make the Configurator send the task to the RCS even if it can be done locally The Configurator ACUConfig exe is located in the Configurator folder The Configurator folder also contains dll files that are necessary for the Configurator to operate 6 2 CLI Syntax The Configurator CLI is not case sensitive To view a list of the available CLI commands type ACUConfig with no parameters and press lt Enter gt This is the general syntax ACUConfig exe global options command command arguments and opti
148. efine the required type of authentication e To define authentication based on a password select System authentication is password based enter a username and password and continue from step 9 e To define authentication based on certificates select System authentication is certificate based and continue from step 7 7 From the Select the method for creating the certificate drop down list select the source for the certificate that will be installed in the Intel AMT device e Request certificate from Microsoft CA By default the settings for this option are displayed If you are using a Microsoft CA continue from step 8 e Request Certificate via CA plugin This option is only available if you have installed the optional CA plugin For information about this option see Using Intel SCS with the CA Plugin on page 197 If you select this option enter the necessary settings as defined by the plugin provider and continue from step 9 8 Ifthe certificate will be requested from a Microsoft CA do these steps a From the Certificate Authority drop down list select the Enterprise CA that Intel SCS will use to request a certificate that the MPS can authenticate b From the Client Certificate Template drop down list select the template that will be used to create the client certificate The templates shown are templates where the Subject Name is supplied in the request and the usage is Client Authentication For information how t
149. eft pane Note Make sure that you do not delete a profile that is currently being used see About Deleting and Modifying Profiles on page 85 Export a profile to an XML file to use with unified configuration For more information see e Exporting Profiles from the Console on page 79 e Unified Configuration Process on page 7 Use the monitoring options available in database mode When selected this button has a green background For more information see e Monitoring Systems on page 159 e Managing Jobs and Operations on page 178 For information about the options included in the Tools menu see Connecting to the RCS on the next page Defining the RCS Settings on page 73 Importing PSK Keys from a File on page 83 Defining Manual Configuration Multiple Systems on page 81 71 Chapter 4 Using the Console 4 2 Connecting to the RCS If you install the Console on a computer where RCS is running the Console is automatically set to connect to the RCS on that computer You can also install the Console on other computers in the network and then select to which RCS to connect You can change this setting at any time for each Console you install To define the service location for the Console 1 Inthe Console select Tools gt Connect to a different RCS The Connect to RCS window opens Peles Specify the location of the Remote Configuration Service RCS Connect to the RCS running on this computer Connect to the RCS on a r
150. eke cereale tee 213 11 2 Connecting to an RCS behind a Firewall 2 20 0222 elec e cee ce eee cece cc cccecccceccccecncccecececeeees 213 11 3 Exit Code gE 0 0022 cuduebeldidedader cect ached Gib odcundunestageueeoubs asegese cles eeudt eboddedvesdiecisadens 214 Pas EXi Code E EO cece ge EEEE EEEE EEE TEET ETETE ah ate ate E ee gee ein asec 214 11 5 Remote Connection to Intel AMT Fails 2 2 0 000220 e cece cece eee cee cence eee nerion 215 11 6 Error with XML File or Missing SCSVersion Tag 222 2 2222 c eee cee cece eee cece eee ee eee ceeeeeeee 216 11 7 Reconfiguration of Dedicated IP and FQDN Settings 2 0222 c cece eee eee ce eee e eee 216 11 8 Disjointed Namespaces 2 0 22 eee cee eee eee cece ao anaa 217 11 9 Disjointed Hostnames and AD Objects 22 2222 2c cee eee eee eee cece cece eens 218 11 10 Kerberos Authentication Failure 0 222222 oc eee cece cece eee eee cece eee e cnet EERE 219 11 11 Error Kerberos User is not Permitted to Configure 2 02 2 2 222 222 cece eee ee eee cece cess 219 11 12 Error Whe Calleris Unauthorized v 02 lt 2 lt 2 cecddectu settee vec ocdexescciccgeeeeoeecs Or ASERRE SEREUS SCALES 219 11 13 Error when Removing AD Integration Error in SetKerberos 2 022 22222 ee eee eee eee cece 220 11 14 Failed Certificate Requests via Microsoft CA 22 22 2002 2 coon e eect eee eeeeeee 220 11 15 Delta Profile Fails to Configure WiF
151. emote computer Computer name IP Z Login as current user Username Password Figure 4 1 Connect to RCS Window 2 Select one of these e Connect to the RCS running on this computer If the RCS to which you want to connect is installed on this computer make sure that it is running and then select this option The next time you start the Console on this computer the Console will automatically connect to the RCS e Connect to the RCS on a remote computer Select this option if the RCS runs on a different computer in the network Enter the name of the computer running the RCS or the IP address The Console will login using the current user credentials Optionally you can clear the Login as current user check box and enter credentials of a different user 3 Click Login When connection is established the Connect to RCS window closes and the Console opens Intel SCS User Guide 72 Chapter 4 Using the Console 4 3 Defining the RCS Settings The RCS is installed with default settings If necessary you can change these settings Before you can change the RCS settings the Console must be connected to the RCS see Connecting to the RCS on the previous page To change the default RCS settings 1 Inthe Console select Tools gt Settings The Configuration Options tab of the Settings window opens E Settings Configuration Options ConfigurationSept Secty Stings Storge Network Timeout for c
152. ent feature is not enabled for systems configured using this configuration method see User Consent on page 12 If you want to define that user consent is mandatory for redirection sessions select User consent required for redirection sessions From the USB Drive drop down list select the drive letter of the USB key you cannot select a USB key if you are using it to run the Console Click Next The Formatting USB drive window opens Click Yes if you are sure you want to continue and format the USB key After formatting completes Intel SCS creates the configuration file on the USB key Intel SCS User Guide 82 Chapter 4 Using the Console 4 7 Importing PSK Keys from a File If the manufacturer has installed PSK keys in the Intel AMT devices you can configure them remotely The manufacturer must supply you with a Setup bin file containing the PSK keys that were installed in the devices After the keys are imported into the RCS you can use the Configurator to configure the systems remotely For more information see One Touch Configuration using PSK on page 6 To import keys from a file 1 Before you can import the keys into the RCS the Console must be connected to the RCS see Connecting to the RCS on page 72 2 Select Tools gt Import PSK Keys from File The Open window opens 3 Navigate to the folder where the Setup bin file is located select the file and click Open The keys are imported and a message shows with details
153. error occurred when creating the USB configuration file An internal exception occurred when processing the request p Intel SCS User Guide 154 Chapter 6 Using the Configurator Description The system is already in Intel AMT mode The UsingDHCP parameter was supplied but DHCP is not active on the host operating system Access denied Make sure that the user has administrator permissions on the local host or in the Intel AMT device This Intel AMT device does not support host based configuration This Intel AMT device is in a state that does not support the ConfigAMT command The requested operation completed but with warnings Failed to configure this Intel AMT device p Failed to do the requested operation The flash wear out protection mechanism limits consecutive operations in a certain time period Try the operation again later A certificate request was sent to the Certification Authority but the created certificate was put into Pending Requests waiting for approval Intel SCS does not support pending requests 36 Failed to request the certificate Failed to parse the XML file possible reasons the file does not exist or access to it is denied the file contains incorrect parameters incorrect or missing encryption password parameter Ww N Error with XML file possible reasons the file does not exist or access to it is denied the file contains incorrect parameters incorrect or missing encryption password
154. erver 2 2 2 ooo eect e eee e eee e eee 37 3 6 4 Creating the Database _ 2 2 222 eee ee ee eee s eee eee ee 37 3 6 5 Adding the RCS User to the Database 2 222 22 cece eee 38 3 6 6 Installing the RCS and Console 2 22 22 c cece eee eect eee cee eee naaa 40 3 7 Installing Non Database Mode 2 2 2 2 22 cccc cece cece cc cecccceecccceeccccecccceenceececcecceeceeeeneees 44 3 8 User Permissions Required to Access the RCS 0 022 02 cece cece cece eee eee ee eee eee eee eeeeeeee 47 3 8 1 Defining DCOM PerMiSSlON Ss esiie4 coe rniddel renee t tlle deen ii Ea 47 3 8 2 Defining WMI Permissions 2 022 0202 e cece cece eee cece cece eect cece eee ecceeeeeeeeeeee 49 3 9 Backing up Data sse de cecal ees See kthcnd aaa atch ceteteetedeld intake re oa eira a decides 50 3 920 Location OF RES Log Files psenice aere A EES wees AEE 50 3 10 Modifying an Existing Installation 0000000000000000000000 cece cee cee eee cee eee anoano 51 3 10 1 Removing Adding Components 002 0 noresi ee cee cece ee cece eee IO E RESSE ioei 51 3 10 2 Changing the Database 2 22 c eee eee ccc cece ceececeeeeccceecccecececeeececeeeeees 54 3 10 3 Movingthe RCS toa Different Computer a 0000000000000000 00000000000 e eee ee eee 54 3 10 4 Deleting the Database _ 22 0 2 2 llc eee eee ee eee eee cece e eee 55 3 11 Upgrading Intel SCS ooo llc ccc cee eee cece eee cence eee cece
155. es 5 5 2 Defining Additional Object Attributes The object created for the Intel AMT device is automatically assigned all the attributes and values necessary for AD integration If necessary you can also define additional attributes and values for the AD object You can only define attributes of the String type To define additional object attributes 1 Click Advanced This additional field is shown Active Directory Object Attributes This is an advanced option and must be used with caution You can use the following field to define a list of additional attributes for the object a Note Each line in the list must contain only one attribute entered in LDIF syntax RFC 2849 All the attributes in the list must exist in the AD schema and the specified values must be valid The Distinguished Name attribute must not be defined in this list Invalid entries in this list will cause configuration to fail the list is not validated against the AD schema 2 Inthe text field define the list of attributes and values that you want to add to the object Each line in the list must contain only one attribute entered in the Lightweight Directory Interchange Format LIDF described in RFC 2849 For example attributeNamel attributeValuel attributeName2 attributeValue2 3 When the list is complete click Next to continue If the list contains invalid entries an error message will show the lines with the
156. es on the next page e Power Management Settings on page 118 e Network and Other Settings on page 118 Intel SCS User Guide 116 Chapter 5 Defining Intel AMT Profiles Management Interfaces 1 Select the interfaces you want to open on the Intel AMT system e Web UI Enables you to manage and maintain Intel AMT systems using a browser based interface e Serial Over LAN Enables you to remotely manage Intel AMT systems by encapsulating keystrokes and character display data in a TCP IP stream e IDE Redirection IDE R enables you to map a drive on the Intel AMT system to a remote image or drive This functionality is generally used to reboot an Intel AMT system from an alternate drive e KVM Redirection Opens the KVM Redirection interface For more information about KVM see Support for KVM Redirection on page 21 2 Optional When the KVM Redirection check box is selected the RFB Password for KVM Sessions field is enabled This password is only necessary if your VNC client uses port 5900 see VNC Clients on page 21 If you enter a password it must be EXACTLY eight characters see Password Format on page 9 3 Optional By default user consent is necessary before a KVM redirection session can begin see User Consent on page 12 If you want to change the user consent settings for KVM redirection sessions a Click KVM Settings The KVM Redirection Settings window opens oix M User consent required before beginning KVM ses
157. esult of the hash function is then compared with the original hash value of the file supplied in this parameter If the values of the hashes are different the Configurator will NOT run the CLI command or the file If any change was made to the file the hash values will not be the same Before you can use this option you must generate a SHA256 hash value from the lt filename gt file The sample files folder includes an application SHA256 exe that you can use to generate the hash value For example SHA256 exe MyFile bat will return the hash value of MyFile bat The hash value is marked in blue Copy the value and supply it in the lt SHA256 hash gt parameter FileUser It is recommended to use this parameter to supply a user with the minimum permissions lt password gt required to run this file FilePassword Contains the password required to run the file Valid only if FileUser was also lt password gt specified This table describes the parameters and the sequence in which the Configurator sends them to the file that you specify in the FileToRun parameter Intel SCS User Guide 151 Chapter 6 Using the Configurator Table 6 4 Parameters Sent by the Configurator to the Script Description The user defined in the FileUser parameter The password defined in the FilePassword parameter The hostname defined in the Intel AMT device The FQDN defined in the Intel AMT device The UUID of the Intel AMT device
158. etna 65 Chapter 3 Setting up the RCS 3 1 About the RCS The Remote Configuration Service RCS is used to configure remotely and maintain Intel AMT devices The RCS is a Windows based service RCSServer that runs on a computer in the network You must install and set up the RCS component if you want to do any of these e Put Intel AMT devices in the Admin Control mode e Use the One Touch Configuration method e Use the Remote Configuration method e Use Digest Master Passwords e Create configure profiles for Intel products supported by the Intel Solutions Framework e Use the Intel Solutions Framework to publish data to the RCS You do not need the RCS if you want to configure all the Intel AMT devices in your network using only these configuration methods e SMB Manual Configuration on page 5 e Host based Configuration on page 5 in the default Client Control mode Intel SCS does not support multiple instances of the RCS working in the same network environment and connected to the same database 3 2 Selecting the Type of Installation The RCS can operate in one of two different modes defined during installation e Database Mode In this mode data about each Intel AMT system is stored in an SQL database This includes data that can be used to connect to the system and the admin password that was put in the Intel AMT device You can then use the Console to monitor the systems and do reconfiguration maintenance tasks on them This
159. etween 8 32 characters with at least one number one non alphanumeric character one lowercase Latin letter and one uppercase Latin letter For increased security change the DMP at regular intervals and then reconfigure the systems The RCS saves the last 10 DMPs that were set in an encrypted file If the file is full when a new DMP is set the oldest entry is deleted For more information about this option and when to use it see Admin Permissions in the Intel AMT Device on page 15 Keep a record of each DMP you set You might need to supply them to third party applications Certification Authority Plugin This section shows the status of the optional CA plugin as reported by the RCS For more information see Using Intel SCS with the CA Plugin on page 197 Intel SCS User Guide 76 Chapter 4 Using the Console Storage Tab The Storage tab contains settings that define where the RCS stores data and how that data is encrypted aox Storage Settings Database Server EXAMPLE SQLSERVER z Refresh Database Name fintelscs Authentication gt Windows Authentication SQL Authentication Storage Security Encryption Key Import J Export Figure 4 5 Storage Tab Storage Settings These settings are only shown if the RCS is in database mode Only make changes to these settings if you want the RCS to connect to a different SQL database For more information see Changing the Database on page 54 Storage Security
160. f the user running the Configurator are used to delete the AD object For Intel AMT 6 1 and lower systems the credentials of the user running the RCS are always used to delete the AD object WMIUser lt username gt The name in the format domain username of a user with WMI permissions on the computer running the RCS This parameter is only required when running the Configurator with a user without WMI permissions on the RCS computer WMIUserPassword The password of the WMI user lt password gt Intel SCS User Guide 143 SourceForAMTName lt source gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt Intel SCS User Guide Chapter 6 Using the Configurator Defines how the FQDN hostname suffix for the Intel AMT device is constructed Valid values e DNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Primary DNS Suffix from the host operating system This is the default setting and is correct for most network environments SpecificDNS The hostname part of the FQDN is the hostname from the host operating system The suffix is the Connection specific DNS Suffix of the on board wired LAN interface AD The hostname part of the FQDN is the hostname from the host operating system The suffix is the AD domain of which the host operating system is a member DNSLOOKUP Takes the FQDN returned by an nslookup on the IP
161. f the enterprise If you need to define Remote Access this is the data that you need to collect e What is the location FQDN or IP address and listening port of the MPS e Doyou want to use certificate based authentication or password based authentication Remote Access is defined in the Remote Access window of the configuration profile see Defining Remote Access on page 98 Note A Home Domain is a prerequisite for Remote Access item 3 in this checklist 2 2 Supported Intel AMT Versions You can use Intel SCS to configure Intel AMT on systems that have Intel AMT 6 2 and higher Each system that you want to configure using Intel SCS must have these drivers and services installed and running in the operating system e Intel MEI The Intel Management Engine Interface Intel MEI driver also known as HECI is the software interface to the Intel AMT device This driver is usually located under System devices e LMS The Local Manageability Service LMS exe enables local applications to send requests and receive responses to and from the device The LMS listens for and intercepts requests directed to the Intel AMT local host and routes them to the device via the Intel MEI The Intel MEI andthe LMS are usually installed by the manufacturer If they are missing or you need to reinstall them contact the manufacturer of your system to get the correct versions for your system Support for versions of Intel AMT lower than
162. ficate These settings are necessary for the certificate to be compatible for remote configuration use The OU or the OID must match the values defined in Selecting the Remote Configuration Certificate on the previous page the OU is the usual value entered when purchasing a certificate commercially The CN must match the Intel AMT system domain suffix see Selecting the Remote Configuration Certificate on the previous page The keys should be exportable to support IT key backup policies The request type should be PKCS10 After completion export the acquired certificate in p7c format 10 4 1 Installing a Vendor Certificate You can install more than one certificate into the certificate store of the user account running the RCS RCSServer exe The RCS selects the certificate suitable for the specific Intel AMT system To install a certificate in the RCS users certificate store 1 On the computer where the RCS is installed log in as the user running the RCS 2 Open a command prompt window enter mmc and press lt Enter gt The Microsoft Management Console window opens 3 Ifthe Certificates plug in is not installed perform these steps a b Select File gt Add Remove Snap in The Add Remove Snap in window opens Click Add The Add Standalone Snap in window opens From the list of available snap ins select Certificates and click Add The Certificates snap in window opens Select My user account and click Finis
163. figuration Update Failed The RCS failed to perform a configuration update on the system Unconfiguration Failed The RCS failed to unconfigure the system and the system s configuration status is not known Missing Configuration Data A configuration request was received but it is missing some data such as a profile Pending Configuration A configuration request exists but has not yet been performed on the system Pending Configuration Update A configuration update request exists but has not yet been performed on the system Pending Unconfiguration An unconfiguration request exists but has not yet been performed on the system Unconfigured The system is unconfigured Pending Hello Message An entry for the system has been added to the database The system will be configured when the Service receives a Hello message sent by the system or the Activator Repeated Hello messages sent from the same IP address within 10 seconds are ignored FQDN in use by other system An Intel AMT system with a different UUID has been configured with this FQDN Unknown The RCS does not know the status of the system Intel SCS User Guide 177 Chapter 8 Managing Jobs and Operations This chapter describes how to use the jobs options available from the Console when working in database mode 8 1 8 2 8 3 8 4 8 5 8 6 8 7 About Jobs and Operations 2 2 22 2 22 eee cece eee cee EE EEEIEE IEAS REEE 179 Viewing the L
164. figure the system But reconfiguration does not always disable the wireless interface This is a known limitation of some versions of the Intel AMT Firmware Solution If reconfiguration did not close the wireless interface 1 Unconfigure the system 2 Reconfigure the system using a profile containing the settings that you want Intel SCS User Guide 221 Chapter 11 Troubleshooting 11 17 Configuration via Jobs Fails because of OTP Setting A configuration operation defined in a job will fail on a system when all of these conditions are true 1 Thesystem is in the Unconfigured status 2 Thesystem is defined to use PKI authentication during configuration 3 The RCS is defined to require a One Time Password OTP when a system is configured using PKI authentication This setting is defined in the Configuration Options tab see Defining the RCS Settings on page 73 The failure occurs because the RCS cannot remotely set the OTP in the Intel AMT device This is usually done by the Configurator when it sends the configuration request to the RCS Solution Remove the requirement for an OTP To do this select None in the Advanced Configuration Options section of the Configuration Options tab Changing this setting to None will also cancel the OTP requirement for all future remote configuration requests sent from the Configurator For more information about OTP see About Remote Configuration on page 202 Intel SCS
165. files or executables created using scripting languages Before the script starts to run the Configurator RCS sends parameter values about the Intel AMT system to the script The script can then use these parameter values For example you could use a script to send data to your management console about each Intel AMT system after it is configured The parameter values are sent as a string Parameters without values are sent as empty strings Each parameter value is separated by a space The Configurator and the RCS support scripts differently the RCS also sends additional parameters to the scripts For more information see e Scripts Run by the RCS below e Scripts Run by the Configurator on page 151 e Who Runs the Scripts on page 152 e What if a Failure Occurs on page 153 e Script Runtime and Timeout on page 153 e Parameters Sent in Base64 Format on page 153 6 19 1 Scripts Run by the RCS The RCS supports three different scripts e Script 1 Runs after configuration reconfiguration and maintenance operations e Script 2 Runs before unconfiguration operations e Script 3 Runs after unconfiguration operations You can define which of these scripts the RCS will use and where they are located The scripts can be located on any computer in the network that the RCS can access The scripts are defined via the Console in the Configuration Scripts tab see Defining the RCS Settings on page 73 e Make sure that the RCS has read and ex
166. fined the SOL and IDE interfaces to be closed by default then unconfiguration operations will close them and they cannot be reopened without physical access to the Intel MEBX This is a known Firmware limitation e If auditing was enabled on the Intel AMT system you cannot run unconfiguration operations unless it is permitted by the auditor Intel SCS User Guide 181 Chapter 8 Managing Jobs and Operations Maintenance This operation runs maintenance tasks on the systems e Synchronize the clock Synchronizes the clock in the Intel AMT device with the clock of the computer running the RCS This task is always performed e Renew the Digest Admin password Renews the password of the Digest admin user according to the password setting defined in the profile This task is always performed e Re issue certificates Re issues PKI certificates that are close to the expiry date This task is only run if you select the check box e Renew AD password Changes the passwords of the ADOU objects representing the Intel AMT systems This task is only run if you select the check box For some of these tasks the RCS needs data stored in the configuration profile By default the RCS uses the profile that was last used to configure the system If you select a different profile from the drop down list the data from the selected profile is used instead Automatic Maintenance This operation runs the maintenance tasks described in the Main
167. fining the ADOU For information about the Use OS Host Name for the new AD object check box see Disjointed Hostnames and AD Objects on page 218 For more information about the remaining optional settings see e Defining Additional Security Groups on the next page e Defining Additional Object Attributes on page 92 Intel SCS User Guide 90 Chapter 5 Defining Intel AMT Profiles 5 5 1 Defining Additional Security Groups The AD Object created for the Intel AMT device is by default automatically added to the AD Security group named Domain Computers If necessary it is also possible to define additional Security groups to which the object will be added For example some RADIUS servers require objects to be members of a specific Security group To add the object to additional Security groups 1 Next to the Specify any additional Security groups for the object field click The Active Directory Security Groups window opens E Active Directory Secuity Groups 2 5 x Select the Security groups for the object and add them to the list zi Currently selected Figure 5 5 Active Directory Security Groups Window 2 From the drop down list select a Security group and click Add The group is added to the list If required repeat step 2 to add additional Security groups to the list 4 Click OK The Active Directory Security Groups window closes Intel SCS User Guide 91 Chapter 5 Defining Intel AMT Profil
168. forms and which software or hardware updates are required For more information refer to the documentation in the Solutions Framework folder Discovery Using the Intel SCS Framework Each Intel product that is supported by the Intel SCS Framework includes a Host Plugin After installing the Framework and the host plugin DLLs on the platform you can use supplied scripts and API to get data about the products Data will be returned for each product that has a plugin on the host platform The data that is returned is defined by the host plugin of each product For more information refer to the documentation in the Solutions Framework folder Discovery Using the Configurator The Configurator includes a command named SystemDiscovery This command gets data from the Intel AMT device and the host platform of the system You can save the data in an XML file on the system and or in the registry You can also send the data to the database via the RCS in database mode When using this command you have two options e Collect the data from the XML files or the registry and add it to your own database using a third party application To do this refer to the documentation of your hardware software inventory application e Ifyou are using the RCS in database mode you can send the data collected by the Configurator to the Intel SCS database The data is added to the database record of the system You can then view this data from the Console For the sy
169. g and select the Systems tab 2 Locate the umanaged systems using the Views tab or the Search tab In the Views tab umanaged systems are shown in the Unmanaged column To view only these systems right click this column and select Show Systems this column only 3 Select the system or systems right click and select Move to Managed State E List of Systems Intel AMT FQDN Intel AMT IPv4 Status Connection status intelamt 7 example domain 192 168 1 10 Wi Unknown amp Connected Get Configured Password Delete System Del Move to Managed State Figure 7 7 Move to Managed State Option The systems are moved to the Managed state and you can use all the options available from the Console If the system is already in the Managed state this menu option is not shown Intel SCS User Guide 169 Chapter 7 Monitoring Systems 7 8 Detecting and Fixing Host FQDN Mismatches The source used to configure the FQDN setting hostname suffix in the Intel AMT device is defined in the configuration profile The profile includes several options that you can use to define how the FQDN of the device will be constructed see Defining IP and FQDN Settings on page 120 When changes are made to the host computer or the network environment the basis on which the FQDN setting was constructed might change These changes can include changing the hard disk replacing the operating system or re assigning the computer to a different user If th
170. g for is not in the list modify the query and click Search ff Intel SCS Console 192 168 1 10 B Configured Connected Intel AMT FQDN intelamt 7 l example domain 192 168 1 11 iw Unknown Connection status unknown intelamt 7 example domain Configured Intel AMT IPv4 192 168 1 10 UUID 00000000 000 1 0000 0000 00000 1000501 Configuration status Configured Last configuration time 2 21 2012 11 43 58 AM View Log Connection status Connected Last connection time 2 21 2012 11 45 31 AM Configuration profile Profile1 Intel AMT version 6 1 0 Intel AMT SKU Intel vPro Discovery data Connected to a Remote Configuration Service running on this computer Figure 7 6 Example of Search Results 4 Click asystem in the list Data for the selected system is shown in the bottom section of the Systems pane The profile that was used during the last configuration reconfiguration operation is shown as a link You can view the profile details by clicking the link For information about other options available from the List of Systems see e Sorting the List of Systems on the next page e Getting the Admin Password on page 172 e Viewing Operation Logs on page 173 For a list of the possible statuses see Configuration States on page 177 Intel SCS User Guide 167 Chapter 7 Monitoring Systems 7 6 Sorting the List of Systems You can define which columns are shown in the list of systems by right clicking the col
171. ge 210 Intel SCS User Guide 202 Chapter 10 Setting up Remote Configuration 10 2 Prerequisites for Remote Configuration Before remote configuration can begin these initial conditions must be met e The Intel AMT device must have at least one active hash certificate defined in the Intel MEBX e The Intel AMT system must be configured to receive its IP address from a DHCP server The DHCP server must support option 15 and return the local domain suffix e The computer running the RCS must have a certificate with the Server Authentication Certificate OID 1 3 6 1 5 5 7 3 1 and also contain one of these e An OID in the Extended Key Usage field with this value 2 16 840 1 113741 1 2 3 Or e Inthe Subject Name field an OU with this value OU Intel R Client Setup Certificate In the Certification Path of this certificate the thumbprint of the root certificate must be enabled in the Intel AMT hash table e The Suffix of the Common Name CN in the Subject Name of the RCS certificate must match the domain suffix of the Intel AMT system see Selecting the Remote Configuration Certificate below e For Bare Metal Setup and Configuration only The computer running the RCS must have an alias record with the name Provisionserver in the DNS server or the name defined by the manufacturer in the Intel MEBX The Intel AMT system must be able to access this DNS server e Windows Server 2008 and higher include an option to cre
172. gs Finish access Control List ACL MM Home Domains OM Remote Access and Fast Call for Help Transport Layer Security TLS wifi Connection wired 802 1x Authentication End Point Access Control EAC selectall Clear all Figure 5 2 Profile Scope Window To limit the profile scope 1 Select the check boxes of all the settings that you want to configure unconfigure on the systems using this profile Settings that are not selected will not be shown in the Configuration Profile Wizard when you continue to edit the profile 2 Click Next to continue to the Optional Settings window Intel SCS User Guide 88 Chapter 5 Defining Intel AMT Profiles 5 4 Defining Profile Optional Settings The Optional Settings window of the Configuration Profile Wizard lets you select which optional settings to configure unconfigure in the Intel AMT device using this profile E Configuration Profile Wizard Profile1 Optional Settings Select the settings that you want to configure On configured systems settings that are not selected will be removed from the system during configuration Getting Started Profile Scope I Active Directory Integration Allow the Intel AMT systems to use security features of the Active Directory Optional Settings IT Access Control List ACL AD Integration Assign customized access levels to the systems based on users and groups Access Control List Home Domains Home Domains Defi
173. guage WQL You can create several views using different conditions to filter the Intel AMT systems into logical groups To create a view 1 Inthe Console click Monitoring J 2 Select the Systems gt Views tab and click CSN The View Definition window opens EJ View Definition Description Define a collection of systems that match the criteria you specify below View Name I Search Filter ID Operator Field Field Operator Value A uuo x starts with 7 I Customize operator precedence Fh e g A OR B AND C Figure 7 2 View Definition Window In the View Name field enter a descriptive name for this view Define the filter conditions as described in Defining a System Filter on the next page Click OK The View Definition window closes and the view is added to the list of views Intel SCS User Guide 162 Chapter 7 Monitoring Systems 7 3 1 Defining a System Filter The search filter defines which systems are included in a view A job can be defined based on an existing view or a search filter that you define in the job When you create a view or a job the systems that match the filter are added to the view job To define a system filter 1 Define the filter condition in row A as described in this table Table 7 2 System Filter O Field UUID Intel AMT FQDN Intel AMT IPv4 Last Configuration Time Last Connection Time Managed State Host FQDN State Intel SCS User Guide
174. guration profiles e The Intel AMT Configuration Utility can also be used to create XML configuration profiles But the profiles can only be used to configure systems that have Intel AMT 6 2 and higher About Deleting and Modifying Profiles When you configure an Intel AMT system the system is configured with the settings that exist in the configuration profile at the time of configuration A profile does not contain a version number This means that e A profile in the Console is only a reference You cannot guarantee that systems configured with a profile were configured with the current settings shown in the profile e When aconfiguration request is sent to the RCS the current settings in the profile defined in the request are used to configure the system Configuration requests containing a profile that was deleted from the Console will fail e In database mode when a job is started the selected profile for Configuration or Maintenance operations is loaded into memory The operation will run on all the systems with the profile settings that existed when the job was started The job will continue to run with these profile settings on all systems defined in the job even if you modify or delete the profile If the RCS crashes the profile is reloaded into memory when the RCS restarts After the RCS restarts operations on the remaining systems will fail if the profile was deleted or use the new profile settings if the profile was
175. h The Certificates snap in window closes Click Close The Add Standalone Snap in window closes Click OK The Add Remove Snap in window closes and the Certificates snap in is added to the Console Root tree 4 From the Console Root tree right click Certificates gt Personal and select All Tasks gt Import The Certificate Import Wizard opens Click Next The File to Import window opens 6 Enter the path and file name of the certificate to be imported or click Browse and navigate to the file Intel SCS User Guide 204 Chapter 10 Setting up Remote Configuration 7 Click Next The Password window opens If the check box named Enable strong private key protection can be selected make sure that it is NOT selected Certificate Import Wizard ot pa ong private key protection You will be prompted every time tie VSL by ar Wis Used by an application inyouenable this option Figure 10 1 Certificate Import Wizard Enter the password for the private key Select the Mark this key as exportable check box 10 Click Next 11 Select Place all certificates in the following store The Personal certificate store should already be selected 12 Click Next and Finish Intel SCS User Guide 205 Chapter 10 Setting up Remote Configuration 10 4 2 Installing a Root Certificate and Intermediate Certificates If the SSL certificate comes from a CA whose chain of trust certificates are not automatically included in
176. hapter 5 Defining Intel AMT Profiles 000 22 cece cece cee eee cece eect cece eee 84 5 1 About Intel AMT Profiles 22 202 2202 c ccc c lee eee cece ee eee ce eee nce e ce ee ee eee ceceeceeeeeeesees 85 5 2 Creating a Configuration Profile for Intel AMT 00 22 0222 c cece eee ee eect cece eeeeeeee 86 5 3 Defining thie Profil Scope srez hse sn oe te ate ak le dae ese ltd Set a a ihe ee 88 5 4 Defining Profile Optional Settings 0 0 0222 c eee ccc cee cece eee eee cence cee eee eeeeeee 89 5 5 Defining Active Directory Integration 0 2 cece eee cece cceeccccceccceecceccecceccenceceeceeceeeeees 90 5 5 1 Defining Additional Security Groups 0 222 0022 c cece eee cee eee eee cee e ee eeeeeee 91 5 5 2 Defining Additional Object Attributes 0 2 2222 l ccc cee eee eee eect eee 92 5 6 Defining the Access Control List ACL 2 2 002 022 cece cece cece cee ee eee ee eee eee eee eee eee ees 93 5 6 1 Adding a User to the ACL 2 00 l ieee cece ce ene ce eect aa aonana aaan 94 5 6 2 Using Access MONITOR cao en ssc sae a e a PE aee e A a e AE ndei ERRESA 96 5 7 Defining Home Domains l 00000000000000000000000000 0000000000000000 0000000000000000 00000020 eeeeeeeeeeeee 97 5 8 Defining Remote AcceSS 1 22 2 cee ee eee ee eee eee eee ee eee ee eee orron 98 5 8 1 Defining Management Presence Servers 12 2 ee eee eee cc eeccccceccccceccccceccce
177. hapter 8 Managing Jobs and Operations 8 3 Job Operation Types The operation that you define in a job is run on all systems that are defined in the job You can define only one operation per job These are the available types of operation Configuration This operation reconfigures the systems with the settings defined in the profile that you select from the drop down list e Ifthe Network Settings IP and FQDN were changed in the profile this operation type will NOT make those changes in the device This is because the RCS cannot get the necessary information from the host operating system If you need to reconfigure a device with new network settings use the configuration commands available from the Configurator In certain conditions this operation might fail on unconfigured systems see Configuration via Jobs Fails because of OTP Setting Full Unconfiguration This operation deletes all the Intel AMT setup and configuration settings from the systems and disables the Intel AMT features on the systems This operation type also deletes any root certificate hashes that were entered manually into the Intel MEBX Partial Unconfiguration This operation removes the configuration settings from the systems and disables the Intel AMT features on the systems The systems and the RCS can still communicate since the PID PPS admin ACL settings host name domain name and the RCS IP and port number are not deleted e Ifthe OEM de
178. he USB key When a system is configured using the host based configuration method it is put in the Client Control mode Client Control mode does not support changing the Intel MEBX password This means that systems configured in Client Control mode will remain with the default Intel MEBX password if it is not changed manually If you use the Unified Configuration process you can define the control mode for Intel AMT systems that support host based configuration For these systems the RCS will only replace the default Intel MEBX password if you select this check box when exporting the profile Put locally configured devices in Admin Control mode Intel SCS User Guide 14 Chapter 1 Introduction 1 6 Admin Permissions in the Intel AMT Device This section describes how administrator permissions are defined in the Intel AMT device 1 6 1 Default Admin User Digest Each Intel AMT device contains a predefined administrative user named admin referred to in this guide as the default admin user Intel AMT uses the HTTP Digest authentication method to authenticate the default admin user The default admin user e Has access to all the Intel AMT features and settings on the device e Is not contained in the Access Control List with other Digest users and cannot be deleted Thus for security reasons it is important how you define the password for this user even if you do not use it The password is defined in the Network Settings secti
179. i Settings 0022 02 cece ccc cece eee cee eee ee eee cceeeeee 221 11 16 Disabling the Wireless Interface 2 002002 ce cece cece cesses 221 11 17 Configuration via Jobs Fails because of OTP Setting 0 222 c cece eee eee ece eee ceeeeee 222 Intel SCS User Guide vii Chapter 1 Introduction This guide describes how to use Intel Setup and Configuration Software Intel SCS Support for additional Intel products solutions was added to Intel SCS version 9 0 with the addition of the Intel Solutions Framework Most of the information in this guide is related to using Intel SCS to configure and maintain Intel Active Management Technology Intel AMT This is because in this release of Intel SCS Intel AMT is not fully supported as a solution by the Intel SCS Framework Configuration and maintenance of Intel AMT is still done using the legacy methods and components developed in previous versions of Intel SCS The Intel Solution Framework folder contains documentation describing how to use the Framework to discover and configure other Intel products That documentation includes references back to this guide where necessary This chapter describes Intel SCS and other important background information For more information see Lr Whare TINGS SCS ec 5 siesta eter eauiees ara daddies 0 dacemumstice at Salemi AES 2 i2 Wihetare the Discovey OD ONST lt 22 52 ccccce vos ns carta aga citeisetcei
180. icate Revocation List CRL Specify whether you want to apply a CRL for Mutual Authentication The CRL file selected will be loaded into the Intel AMT device and overwrite any existing CRL I Use CRL Current CRLs taken from Trusted Domains Increase security by matching the suffixes in the certificate subject with the domains listed below New Remov Figure 5 15 Advanced Mutual Authentication Settings Window 2 Optional Define the CRL you want to use in this profile a b C Select Use CRL Click Load File The Open window opens Browse to the location of the CRL XML file select it and click Open The information in the file is imported into the configuration profile and the name of the file is added to the list 3 Optional Define the trusted domains to use in mutual authentication To add a domain to the list click New and specify the domain in the Domain Properties window The Intel AMT system will validate that any client certificates used by the management consoles have one of the listed suffixes in the certificate subject If no FQDN suffixes are defined the Intel AMT system will not validate client certificate subject names 4 Click OK The Advanced Mutual Authentication Settings window closes Intel SCS User Guide 106 Chapter 5 Defining Intel AMT Profiles 5 11 Defining Network Setups The Network Configuration window of the Configuration Profile Wizard lets you define several
181. ick Browse to select it 11 Click Install The Installation Progress window opens When installation is complete a message is shown 12 Click Next The Completed Successfully window opens 13 Click Finish The installer closes The RCS is installed with default settings If necessary you can change these settings see Defining the RCS Settings on page 73 14 If you selected the Generate storage key option you must create a backup of the storage encryption key that the installer created and installed automatically You can export this encryption key to a file as described in the procedure in Moving the RCS to a Different Computer on page 54 Intel SCS User Guide 46 Chapter 3 Setting up the RCS 3 8 User Permissions Required to Access the RCS Configuration methods that use the RCS require these users to have permissions to connect to the RCS e The user account running the Configurator e All users that want to use the Console If a user has administrator permissions on the computer running the RCS they will be able to connect to the RCS Users with administrator permissions can use all the options available in the Console If you do not want to give a user administrator permissions you can do these procedures instead e Defining DCOM Permissions below e Defining WMI Permissions on page 49 3 8 1 Defining DCOM Permissions This procedure describes how to define DCOM permissions To define DCOM permissions 1 On the computer runni
182. icrosoft CA This is the default option e Via a CA Plugin This option is only available after a plugin is installed 9 2 Using Intel SCS with a Microsoft CA This section describes the prerequisites necessary to use Intel SCS with a Microsoft CA 9 2 1 Standalone or Enterprise CA Intel SCS supports the Standalone and Enterprise versions of Microsoft CA An Enterprise CA can be configured only in conjunction with Active Directory A Standalone CA can operate with or without Active Directory If Active Directory is not present there can be only one RCS instance and the Standalone CA must be installed on the same server as the RCS The Microsoft CA can have a hierarchy of CAs with subordinate CAs and a root CA This is beyond the scope of this guide These features require a Standalone root CA or an Enterprise root CA e Transport Layer Security including mutual authentication e Remote Access with password based authentication These features require an Enterprise root CA e Remote Access with certificate based authentication e 802 1x setups Wired or WiFi e EACsettings 9 2 2 Required Permissions on the CA These permissions are required on the CA by the user account running Intel SCS component doing the configuration e Issue and Manage Certificates e Request Certificates For an Enterprise root CA you also need to grant this user account the Read and Enroll permissions on the templates you want to select in the configuration p
183. iew data collected by the Configurator and the RCS For more information about the discovery options see What are the Discovery Options on page 3 The data collected by the Configurator and the RCS is stored separately in the database for each system This means that there can be duplicate data for the same system and even contradicting data The last date and time that each of the Intel SCS components got data from the system is shown in the Console To view discovery data of a single system 1 Inthe Console click Monitoring and select the Systems tab 2 Locate and select the system using the Views tab or the Search tab Data for the selected system is shown in the bottom section of the window You can also view the discovery data in the List of Systems in Job window see Viewing Job Items on page 185 3 Click Discovery Data The Discovery Data window opens Pair Host Based fR UUID 00000000 0001 0000 0000 000001000501 FQDN intelamt 6 example domain Intel AMT last discovery time 1 21 2013 3 48 40 PM E SystemDiscovery Generalinfo ManageabilityInfo OSInfo NetworkiInfo ConfigurationInfo Figure 7 10 Discovery Data Window The Discovery Data window includes two tabs e Host Based This tab contains data collected locally on the system and sent to the RCS If data exists click Expand to show the data In the tree view expand the nodes to see the d
184. if you want to 3 802 1x Setups configure settings 2 3 or 4 3 Settings 3 and 4 also need access to a CA 4 Endpoint Access Control EAC g 5 Transport Layer Security TLS Access to a Certification Authority CA Note If you define Remote Access to use password Remote Adcess based authentication access to a CA is not necessary In a Workgroup without access to a Domain you cannot configure settings 1 4 on Intel AMT systems You can configure settings 5 and 6 but only on systems with Intel AMT 6 2 and higher In a Workgroup that has access to a Domain you can configure settings 1 6 on all versions of Intel AMT Users in a Workgroup do not have the necessary permissions to connect to the AD or the CA This means that the Intel SCS component which is running on a computer in the Workgroup cannot access the AD CA Thus to configure these settings in a Workgroup you must use one of these methods Method 1 Use the permissions of the user running the RCS 1 Install the RCS component on a computer in the Domain that computers in the peer to peer network can access Make sure that the user running the RCS has the necessary permissions to access the AD CA 2 Use the Console to create a profile in the RCS and define the settings that you want to configure Use the ConfigViaRCSOn1y command of the Configurator CLI to send the configuration task to the RCS use MaintainViaRCSOn1y for maintenance tasks Method 2 Unifie
185. ifying Information for Offline Template section enter the domain name where the certificate will be used the domain suffix or FQDN of the computer running the RCS in the Name field Leave all the other default values and click Submit Install the certificate in the RCS user s certificate store and then restart the RCS 10 5 3 Entering a Root Certificate Hash Manually in the Intel AMT Firmware Normally the certificate hashes are programmed in the Intel AMT system firmware by the manufacturer Alternatively there is an option to enter the root certificate s hash manually via the Intel MEBX The names and locations of menu options might vary slightly in different Intel AMT versions Intel SCS User Guide 209 Chapter 10 Setting up Remote Configuration To enter the certificate hash via the Intel MEBX 1 Open the Root certificate and tab to Details Keep the Root certificate thumbprint from the thumbprint field for use in step 7 Power on the Intel AMT system and press lt Ctrl P gt during boot When the Intel MEBX menu is displayed do a full unconfiguration unprovision From the Intel MEBX menu select Setup and Configuration gt TLS PKI Select Manage Certificate Hashes Press lt Insert gt and enter a name for the hash Enter the Root certificate thumbprint from step 1 Answer Yes to the question about activating the hash Exit the Intel MEBX and reboot the Intel AMT system 10 6 Remote Configuration Using Scripts
186. ile Systems Desktop Systems Specify the Intel AMT version for which to create the configuration USB key All systems are version 6 0 and higher All systems are version 7 0 and higher Configuration Settings The configuration settings below will be applied to Intel AMT after inserting the USB key with these definitions and rebooting the system Old Intel MEBX Password eesse T Show password New Intel MEBX Password ri Confirm Intel MEBX Password i Specify the system power states in which the Intel Management Engine is operational ays On 50 55 z User consent required for redirection sessions USB Drive Select the relevant USB drive from the list below USB Drive fe zi Refresh List of USB Drives Note Ensure that the USB drive is supported by the systems BIOS Figure 4 8 Settings for Manual Configuration of Multiple Systems Window Intel SCS User Guide 81 10 Chapter 4 Using the Console If you have mobile and desktop systems you must prepare a different USB key for each type This is because mobile and desktop systems have different power settings Select the type of system that this USB key will configure e Mobile Systems e Desktop Systems Select the versions of Intel AMT that this USB key will configure e All systems are version 6 0 and higher If selected you can use this USB key to configure all systems that have Intel AMT 6 x and higher e All systems are version 7 0 and higher
187. ile that disabled WiFi in the Intel AMT device the profile did not include WiFi Connection settings e The system was then reconfigured using a Delta profile that included WiFi Connection settings but did NOT include Power Management settings e The Delta profile was created in a version of Intel SCS earlier than Intel SCS 8 1 Solution A check box was added to the Network Configuration window of the profile Enable WiFi connection also in S1 S5 operating power system states This solves the problem because the power management settings for the wireless NIC can now be configured using a delta profile During upgrade migration this check box is not added to delta profiles to support backwards compatibility To add the check box and reconfigure the system 1 Open the delta profile in Intel SCS 9 0 When you open the profile the check box is added 2 Inthe Network Configuration window verify that the status of the new check box is what you require selected not selected Save the profile 4 Reconfigure the system using the Delta profile 11 16 Disabling the Wireless Interface Intel AMT includes a wireless interface that can be enabled or disabled during configuration You can define this setting in the profile using the WiFi Connection check box see Defining Profile Optional Settings on page 89 To disable the interface after it has been enabled you can remove the WiFi Connection settings from the profile and then recon
188. iles on page 84 Because this method has less security related requirements than earlier configuration methods by default the Intel AMT device is put in the Client Control mode see Control Modes on page 12 You can change this setting when you export the profile For more information see e Exporting Profiles from the Console on page 79 e Configuring Systems Unified Configuration on page 129 If all your systems have Intel AMT 6 2 and higher and you do not need to put them in Admin Control mode you do not need the RCS or Console Instead you can use the Intel AMT Configuration Utility For more information refer to the Intel AMT Configuration Utility User Guide 1 4 2 SMB Manual Configuration The SMB Manual configuration method lets you configure the Intel AMT device with basic configuration settings Configuration is done locally at the Intel AMT system with a USB key containing a configuration file Setup bin After configuration the Intel AMT device is put in one of these modes e Small Medium Business SMB Mode Intel AMT 4 x and 5 x devices are put in this mode Advanced optional Intel AMT features are not available to devices in this mode e Manual Mode Intel AMT 6 x and higher devices are put in this mode All Intel AMT features are available to devices in this mode if a third party application can configure them You can use the Configurator or the Console to create the Setup bin file For more information
189. in the DNS to find the correct name that can be resolved using DNS resolution This name needs to be inserted into the FQDN of the Intel AMT device 2 Use Intel SCS to configure reconfigure the Intel AMT device with the required FQDN Intel SCS includes several options for the source it can use when inserting the FQDN into the Intel AMT device see Defining IP and FQDN Settings on page 120 Intel SCS User Guide 217 Chapter 11 Troubleshooting 11 9 Disjointed Hostnames and AD Objects A disjointed hostname occurs when the hostname in the Domain Name System DNS is not the same as the hostname assigned in Windows This can occur when the hostname in DNS contains characters that are not valid characters in a Windows hostname Disjointed hostnames usually occur when the network environment is using a DNS hierarchy and needs to support different DNS zones To support this hierarchy the hostname in DNS can be defined by joining the DNS zones and using periods as a separator Because periods are not valid in the Windows hostname the FQDN in Windows must be defined differently For example by using underscores instead of periods as shown in this table where the hostname part of the FQDN is marked in yellow Example Record in DNS FQDN in Host Operating System 10 0 0 7 SYM TDNST DDC com C oc com 10 0 0 8 SSEM TDNSZ DDC com Sy t mDNS2 DDC com If integration with Active Directory AD is enabled during configuration Intel SCS sends a
190. ine the interfaces where Fast Call for Help will be enabled OS interface BIOS Interface OS and BIOS interfaces e You cannot make changes to this setting if a Fast Call For Help trigger was defined in a Remote Access policy The setting in the policy will be used for remote and local connection requests e To enable the Fast Call for Help feature from outside the enterprise network see Defining Remote Access on page 98 6 Optional Click Set to define the source that Intel SCS will use to define the IP and FQDN of the Intel AMT device This step is only required if you need to change the default settings see Defining IP and FQDN Settings on the next page The default network settings that Intel SCS puts in the device will operate correctly for most network environments Intel SCS User Guide 119 Chapter 5 Defining Intel AMT Profiles 5 12 1 Defining IP and FQDN Settings Each Intel AMT device can have its own IP and FQDN settings The IP and FQDN settings are usually the same as those defined in the host operating system but they can be different Intel SCS puts these settings into the Intel AMT device E Network Settings FQDN Specify the source of the FQDN that will be set in the Intel AMT device Use the following as the FQDN Primary DNS FQDN Get the FQDN from the dedicated network settings file M The device and the OS will have the same FQDN Shared FQDN IP Specify the source of the IP that will b
191. ing Systems on page 126 Syntax ACUConfig exe global options NotifyRCS lt RCSaddress gt Note The CLI doesnot adminPassword lt password gt support passwords that start with a forward slash Parameters WMIUser lt username gt WMIUserPassword lt password gt RCSBusyRetryCount lt retries gt global options See CLI Global Options on page 125 lt RCSaddress gt The IP or FQDN of the computer running the RCS AdminPassword The current password of the default Digest admin user defined in the Intel AMT lt password gt device After adding the system to the database the RCS will try to connect to the system using the password If you use this parameter make sure that you supply the correct password If the password is not correct the RCS might not be able to connect to the system after it is added to the database WMIUser The name in the format domain username of a user with WMI permissions on lt username gt the computer running the RCS This parameter is only required if you run the Configurator with a user account that does not have WMI permissions on the RCS computer WMIUserPassword The password of the WMI user lt password gt RCSBusyRetryCount Defines the number of times to resend the request to the RCS if the RCS returns a lt retries gt status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this para
192. invalid syntax All the attributes in the list must exist in the AD schema and the specified values must be valid e The Distinguished Name attribute must NOT be defined in this list e Invalid entries in this list will cause configuration to fail The list is not validated against the AD schema e Ifthe list includes attributes configured by Intel SCS the value defined in the list will replace the value usually configured by Intel SCS Intel SCS User Guide 92 Chapter 5 Defining Intel AMT Profiles 5 6 Defining the Access Control List ACL The Access Control List ACL window of the Configuration Profile Wizard lets you define users and their access privileges in the Intel AMT device If you enable ACL you must define at least one user or group but no more than seven digest users and 32 Active Directory users groups User identification and realm selection must be coordinated with the requirements and instructions of third party management consoles EI Configuration Profile Wizard Profile1 15 x Optional Settings Access Control List ACL Access Control List ACL i Use the following list to customize the level of system access for specific users or groups Profile Scope Optional Settings Add AD Integration Edit Home Domains Remote Access Transport Layer Security Network Configuration System Settings Finish Figure 5 6 Access Control List ACL Window You can do these tasks to define the users in th
193. ion reconfiguration operation is shown as a link You can view the profile details by clicking the link For information about other options available from the List of Systems see e Sorting the List of Systems on page 168 e Getting the Admin Password on page 172 e Viewing Operation Logs on page 173 For a list of the possible statuses see Configuration States on page 177 Intel SCS User Guide 165 Chapter 7 Monitoring Systems 7 5 Searching for a System The Search tab lets you quickly send a query to the database to find a specific Intel AMT system or systems To search for systems 1 Inthe Console click Monitoring and select the Systems gt Search tab The Search tab opens Views w mearra maano Gun Figure 7 5 Search Tab 2 Inthe available fields enter the data that you want to use in the query The query is constructed using these operators e Contains This means that in each field you can enter any part of the data that you have For example if you enter 555 in the UUID field the query will get data for all systems that have 555 as part of the UUID e And This means that if you enter values in more than one field the query only gets data of systems that have both those values Intel SCS User Guide 166 Chapter 7 Monitoring Systems 3 Click Search The systems that meet the query conditions are shown in the list of systems in the right pane If the system you are searchin
194. ions Required to Access the RCS 6 Ifthe profile includes any of these settings e Active Directory AD Integration e Requesting certificates from a Certification Authority CA these fields are shown in the Credentials section For Intel AMT 6 2 and higher systems define which user to use when communicating with the CA and the Active Directory during configuration The user running the Configurator The user running the RCS Use these credentials Username Password 7 Show password To configure AD integration the Configurator must send a request to the AD to create an AD object for the Intel AMT system To configure certificates via the CA the Configurator must request the certificate from the CA You can define which user to use when making these requests e The user running the Configurator The Configurator sends the request directly to the CA AD e The user running the RCS The Configurator sends the requests to the RCS The RCS communicates with the CA AD and sends the data returned by the CA AD to the Configurator e Use these credentials The Configurator uses the supplied user credentials to send the request to the CA AD These options are only applicable for Intel AMT 6 2 and higher systems For all other systems the RCS is always used to communicate with the CA AD Make sure that the user you define has the necessary permissions to communicate with the CA AD In all cases the configuration necessar
195. ist of Jobs 2 022 0 cece cece cece cece eee eee ee eee ee eee ee ee E EIE ainn ide 180 JODIO MeKe hI TYDE Saane tc oueaounsetaideseanscaunaanaseieuehaackanacoeaeganassaen scene eebaaaus 181 Sif oS ers cf ok eee a etn ne Oe AE eT E UR RCE eRe Ee EET RoR Ee RPO ER SEO REREAD 183 CALI AOI ars ua Ate ee eae tN a ees eggs shpat eee ke A et St ah la ta toe 183 NAS WING IO ING ING oes ah atest ca hay a ates ae aae ak ee Ade it 185 Chapter 8 Managing Jobs and Operations 8 1 About Jobs and Operations A job is an operation that you can run from the Console on a selected group of Intel AMT systems defined using a filter The Monitoring gt Jobs tab shows a summary of all existing jobs ff Intel SCS Console Profiles A Systems 1 0 0 Example Job 2 Coligesien InProgress 5 0 0 0 Example Job 3 Maintenance Aborted 3 0 0 3 Example Job 4 Get discovery data Scheduled 0 0 0 0 Figure 8 1 Example of Jobs For more information about the data available from the list of jobs see Viewing the List of Jobs on the next page This table describes the options available from the Jobs tab Table 8 1 Jobs Tab Options Click To do this n Create a new job see Creating a Job on page 183 Edit the job selected in the list You can only edit a job if it is in the Waiting or Scheduled status Note You can only edit some of the fields in the job Delete the job s selected in the list Yo
196. l1SCSInstaller exe to upgrade from these versions e Intel SCS 8 0 e IntelSCS 8 1 e Intel SCS 8 2 The installation will be upgraded to the same mode database non database You cannot use the installer to change modes To upgrade earlier versions of Intel SCS you must first upgrade them to version 8 2 of Intel SCS To do this you will need to use the migration tool located in the RCS Migration_ Tool folder of the Intel SCS 8 2 download package After upgrading to version Intel SCS 8 2 you can then use the Intel SCS 9 0 installer to upgrade to Intel SCS 9 0 Upgrade of Intel SCS to version 9 0 means that you must upgrade all installed instances of the Console RCS and the Intel SCS data In addition you also need to replace the executable files of the other Intel SCS components that you use with the version 9 0 executables The Intel SCS 8 x versions of the Configurator will work with Intel SCS 9 0 components but it is recommended to use the Intel SCS 9 0 version instead 3 11 1 Before Starting the Upgrade In a production environment the upgrade process requires some preparation and planning This is because when upgrading the RCS and the Intel SCS data you need to select a time when you can safely stop the RCS Before starting the upgrade process it is highly recommended to 1 Plan for the upgrade by selecting a time when very few configuration requests will be sent to the RCS In your software deployment mechanism cancel or delay
197. le If you use this parameter do not use the lt filename gt parameter NoRegistry Do not save data in the registry of the system ReportToRCs Sends the data to the RCS You can only use this parameter if the RCS is installed in database mode If this parameter is supplied the data is updated in the database record of the system If this parameter is supplied the RCSAddress parameter is mandatory Note This parameter is used as part of the process to fix Host FQDN mismatches For more information see Detecting and Fixing Host FQDN Mismatches on page 170 AdminPassword The current password of the default Digest admin user defined in the Intel AMT lt password gt device The SystemDiscovery command gets some of the data about Intel AMT using the WS Man interface To use this interface administrator permissions in Intel AMT are necessary Without administrator permissions this data cannot be retrieved and a warning message will be recorded in the log This parameter is NOT necessary if any of these are true e The device is in an unconfigured state e The user account running the Configurator is a Kerberos account that is configured in the Intel AMT device with administrator permissions e You supply the RCSAddress parameter and the RCS can find the password in the database in a profile or using the Digest Master Password RCSaddress The IP or FQDN of the computer running the RCS RCSaddress gt WMIUser The name in the format dom
198. le that the BIOS will find during reboot requirement format the USB key before creating copying the file If the Intel AMT system does not successfully reboot with the USB key you prepared try this e Make sure that the file name starts with a capital S e Format the USB key using FAT16 Note e The Setup bin file is NOT encrypted Make sure that you restrict access to it After configuration is complete the Configurator deletes the data contained in the file This means that you must create a new file for each system you want to configure e The Configurator overwrites any existing file with the same name without giving a warning UsingDhcp Sets the DHCP mode to enabled in the Intel MEBX HostName lt host_ name gt Intel AMT system hostname 1 32 characters DomainName lt domain_ Intel AMT system domain name 0 63 characters name gt LocalHostIp lt ip gt The IP address IPV4 to set in the Intel MEBX If you supply this parameter the SubnetMaskIp parameter is mandatory the remaining IP parameters are optional SubnetMaskIp lt subnet_ The subnet mask IP address to set in the Intel MEBX mask gt GatewayAddrIp lt ip gt The default gateway IP address to set in the Intel MEBX DnsAddrIp lt ip gt The preferred DNS IP address to set in the Intel MEBX SecondaryDnsAddriIp An alternate DNS IP address to set in the Intel MEBX lt ip gt EnableKVM lt false Enable Disable support for KVM redirection
199. ly Select this option to define a manual job This type of job must be started manually see Starting Aborting and Deleting Jobs on page 187 e On this date Select this option to define an automatic job By default todays date is selected You can edit the date and time directly in the field or open a calendar to select a different date If you want to define a recurring job select the Run job every check box and define the number of days for the interval The interval can be a minimum of 7 days and a maximum of 365 days After a recurring job completes the date defined in the job for the next run is automatically updated You can also manually change the date time and interval of automatic jobs but only when the status of the job is Scheduled 7 From the Operation drop down list select the type of operation that this job will perform see Job Operation Types on page 181 8 Click Save and Close The Job Definition window closes and the job is added to the list of jobs 8 6 Viewing Job Items The systems that match the filter defined in the job are shown in the List of Systems in Job window These job items are the systems on which the job will run You can view this list and get data about the systems in the list e For manual jobs this list only includes systems that matched the filter at the time that the job was created If more systems are added to the network that match the filter they will NOT be adde
200. me of the template When entering these values manually you must also select the type of CA Enterprise CA or Standalone CA 3 Optional To enable mutual TLS a Select Use mutual authentication for remote interface b Define the trusted root certificates that will be used by Intel AMT systems configured with this profile see Defining Trusted Root Certificates on page 102 c Optional Define advanced mutual TLS settings see Defining Advanced Mutual Authentication Settings below 5 10 1 Defining Advanced Mutual Authentication Settings The Advanced Mutual Authentication Settings window lets you define a Certificate Revocation List CRL The CRL is a list of entries usually supplied by a CA that indicate which certificates have been revoked see CRL XML Format on page 200 for the required format You can also define the Fully Qualified Domain Name FQDN suffixes that will be used by mutual authentication The Intel AMT device will validate that any client certificates used by management consoles have one of the listed suffixes in the certificate subject If no FQDN suffixes are defined the Intel AMT device will not validate client certificate subject names Intel SCS User Guide 105 Chapter 5 Defining Intel AMT Profiles To define advanced mutual TLS settings 1 From the TLS window click Advanced The Advanced Mutual Authentication Settings window opens E Advanced Mutual Authentication Settings loj x Certif
201. mespace occurs when the primary Domain Name System DNS suffix of a computer does not match the DNS domain of which it is a member Defining a network environment with disjointed namespaces intentionally or accidentally can cause many different types of communication and authentication failures For Intel AMT these failures can be related to e Configuration Reconfiguration e Authentication using Kerberos users in the Access Control List ACL e Authentication using Transport Layer Security TLS Solution If integration with Active Directory AD is enabled during configuration Intel SCS sends a request to create an AD object for the Intel AMT device Some of the entries in this object define parameters used in Kerberos tickets For example the DNS Host Name and the Service Principal Names SPNs If these entries in the AD object are configured using the correct DNS name problems with disjointed namespaces can be avoided For example Object 2 in this diagram was created by Intel SCS using an FQDN in the Intel AMT device System1 DDC com that matches the DNS name Active Directory Domain Name System DNS Name DDC com e lb i AD Name D3 com e 10 0 0 7 System1 DDC com 7 N Ne Intel AMT system Host Operating System Intel AMT Device FQDN System1 DDC com IP 10 0 0 7 a Object 2 Used by Intel AMT DNSHostName System1 DDC com To implement this solution 1 Check
202. meter is 0 Intel SCS User Guide 132 Chapter 6 Using the Configurator 6 10 Creating TLS PSK Pairs Description This command prepares the Intel AMT system for configuration using the One Touch Configuration using PSK method When you run this command a TLS PSK pair is immediately put in the RCS and also in a file in a location that you specify You can run this command from any computer that can access the RCS When the Intel AMT system is rebooted with a USB key that contains the file the pair is put in the Intel MEBX of the system The file must be named Setup binand must be placed in the root folder of the USB key To make sure that Setup bin is the first file that the BIOS will find during reboot requirement format the USB key before creating copying the file If the Intel AMT system does not successfully reboot with the USB key you prepared try this e Make sure that the Setup bin file name starts with a capital S e Format the USB key using FAT16 Note e When you reboot a system with the USB key the data in the Setup bin file is deleted but the file is not deleted If you want to use the same TLS PSK pair to configure multiple systems save the Setup bin file before you copy it to the USB key Then replace the file on the USB key before each reboot The Configurator does not restrict the size of USB key you can use But the computer BIOS must fully support the selected USB key and be able boot from i
203. mode also supports the new features and options available when using the Intel Solutions Framework To install in this mode see Installing Database Mode on page 36 e Non Database Mode In this mode the RCS does not store data about the Intel AMT systems Configuration and maintenance tasks can only be done using the Configurator This mode is not supported by the Intel Solutions Framework To install in this mode see Installing Non Database Mode on page 44 Intel SCS User Guide 33 Chapter 3 Setting up the RCS 3 3 Using the Installer The installer IntelSCSInstaller exe is located in the RCS folder of the release package The same file is used to install the RCS in database mode and non database mode You can only install the RCS on computers running an operating system supported by the RCS see Supported Operating Systems on page 29 You must have local administrator privileges on the computer where you want to install the RCS To install the RCS on operating systems with User Account Control you must run the installer as an administrator In addition to the RCS you can also use the installer to install a Console You can install the RCS andthe Console on the same computer or on different computers 3 4 RCS User Account Requirements Before starting the installation you must decide which user account you want to use to run the RCS During installation the installer does not create the account e Ifyou want to use the
204. mon Names CNs in certificate DefaultCNs User defined CNs These fields are shown in each profile window that contains certificate based authentication options Remote Access TLS 802 1x EAC Default CNs When you select Default CNs the generated certificate will include these CNs e Inthe Subject field DNS Host Name FQDN e Inthe Subject Alternative Name field e DNS Host Name FQDN e Host Name e SAM Account Name Active Directory account name for the Intel AMT object e User Principal Name e UUID of the Intel AMT system User defined CNs This option lets you control which CNs will be included in the generated certificate and which CN will be put in the Subject Name field Some servers require a specific CN in the Subject Name field e The Cisco Access Control Server ACS requires the SAM Account Name e The Funk Odyssey Server requires the Host Name Intel SCS User Guide 198 Chapter 9 Preparing the Certification Authority To define user defined common names 1 Select User defined CNs 2 Click Edit CNs The Advanced Common Name window opens El Advanced Common Name Determine the Common Names CNs that will appear in the Subject Alternative Name field of the certificate that will be generated Select at least one CN Selected Common Names Available Common Names Figure 9 7 Advanced Common Name Window 3 From the Available Common Names list select the required CNs and click amp
205. must be Local or Both Hardware Asset Used to retrieve information about the hardware inventory of the Intel AMT system Remote Control Enables powering a system up or down remotely Used in conjunction with the Redirection capability to boot remotely Used to configure write to and read from non volatile user storage Event Manager Allows configuring hardware and software events to generate alerts Storage Administration Used to configure the global parameters that govern the allocation and use of non volatile storage Agent Presence Local Used by an application designed to run on the local platform to report that it is running and to send heartbeats periodically Agent Presence Used to register Local Agent applications and to specify the behavior of Intel AMT when an application is running or stops running unexpectedly Circuit Breaker Used to define filters counters and policies to monitor incoming and outgoing network traffic and to block traffic when a suspicious condition is detected the System Defense feature Network Time Used to set the clock in the Intel AMT device and synchronize it to network time General Info Returns general setting and status information With this interface it is possible to give a user permission to read parameters related to other interfaces without giving permission to change the parameters Firmware Update Used only by manufacturers via Intel supplied tools to update the Intel AMT fir
206. must be done manually at the system 2 The KVM Redirection interface is enabled in the Intel AMT device 3 AVNC Client is installed on the computer that will control the Intel AMT systems VNC Clients VNC Clients can connect to the VNC Server in the Intel AMT device using these ports e Redirection Ports 16994 and 16995 These ports are available to VNC Clients that include support for Intel AMT authentication methods To use these ports the VNC Client user must be defined in the Intel AMT device see Defining the Access Control List ACL on page 93 Port 16995 also uses Transport Layer Security e Default Port 5900 VNC Clients that do not include support for Intel AMT can use this port This is a less secure option To use this port e The VNC Client user must supply the Remote Frame Buffer RFB protocol password defined in the Intel AMT device To define the RFB password see Defining System Settings on page 116 e Port 5900 must be open on the Intel AMT device Intel SCS does not open this port Note The VNC Client must use version 3 8 or 4 0 of the Remote Frame Buffer RFB protocol Intel SCS User Guide 21 Chapter 1 Introduction 1 9 Support for Integration with Intel SBA Intel Small Business Advantage Intel SBA provides an out of the box hardware based security and productivity suite designed for the small business user Intel SBA is pre installed by the computer manufacturer or supplier but is onl
207. mware Intel SCS User Guide 95 Chapter 5 Defining Intel AMT Profiles Capabilities Implements the Embedded IT service Local User Provides alerts to a user on the local interface Notification Endpoint Access Returns settings associated with NAC NAP posture Control Endpoint Access Configures and enables the NAC NAP posture Control Administrator Event Log Reader Allows definition of a user with privileges only to read the Intel AMT system log Access Monitor Allows a system auditor to monitor all events Before assigning this realm see Using Access Monitor below User Access Control Groups several ACL management commands into a separate realm to enable users to manage their own passwords without requiring administrator privileges 5 6 2 Using Access Monitor The access monitor serves as a deterrent to rogue administrator activity by tracing attempts to execute damaging actions The feature is implemented by means of two elements an Audit Log and a special Auditor user that you assign the Access Monitor realm The Intel AMT system writes selected events to the Audit Log that is accessible only to the Auditor Only the Auditor can define which events the Intel AMT system writes to the Audit Log You can assign the Access Monitor realm to one user only and only that user can then relinquish it By default the default admin user account has access to this realm Note The Access Monitor feature is available from
208. n The Add Remove Snap in window opens Click Add The Add Standalone Snap in window opens From the list of available snap ins select Certificate Templates click Add and then click Close The Add Standalone Snap in window closes Click OK The Add Remove Snap in window closes and the Certificate Templates snap in is added to the Console Root tree Intel SCS User Guide 206 Chapter 10 Setting up Remote Configuration 4 From the Console Root tree double click Certificate Templates The list of templates is shown in the right pane Ti Console1 Console Root Certificate Templates iey File Action view Favorites Window Help e AmE e Console Root QA Certificate Templates windows 2000 Windows 2000 Windows 2000 Windows 2000 GHEFS Recovery Agent Windows 2000 Enrollment Agent Windows 2000 Glenrallment Agent Computer Windows 2000 34 certificate templates Figure 10 2 Microsoft Management Console Intel SCS User Guide 207 5 O ie ano 10 11 12 Chapter 10 Setting up Remote Configuration In the right pane right click the Computer template and select Duplicate Template The Properties of New Template window opens Properties of New Template 2 xi Issuance Requirements Superseded Templates Extensions Security General Request Handling Subject Name Template display name Copy of Computer Minimum Supported CAs Windows Server 2003 Enterprise Edition After you apply
209. n also contain passwords and sensitive data about your network To protect the data in these files each profile exported from the Console is encrypted with a password that you supply The XML profiles are encrypted using this format e Encryption algorithm AES128 using SHA 256 on the provided password to create the key e Encryption mode CBC e Initialize Vector IV is the first 16 bytes of the Hash Some advanced options of Intel SCS use additional XML files for example the dedicated network settings file If you want to use these optional XML files it is highly recommended to encrypt them The encryption must be done using the same format used by Intel SCS To do this you can use the SCSEncryption exe utility located in the Utils folder Intel SCS User Guide 9 Chapter 1 Introduction For example e Toencrypt an XML file named NetworkSettings xml SCSEncryption exe Encrypt c NetworkSettings xml P ssw0rd e To decrypt an XML file named NetworkSettings xml SCSEncryption exe Decrypt c NetworkSettings xml P ssw0rd For more information refer to the CLI help of the SCSEncryption exe utility When encrypting additional XML files you must use the same password that was used to encrypt the exported profile 1 5 3 Digital Signing of Files The executable and DLL files of the Intel SCS components are digitally signed by Intel and include a time stamp This does not include third party files Using digital
210. n AD object for the Intel AMT device Some of the entries in this object define parameters used in Kerberos tickets Before you can integrate Intel AMT with your AD you must e Create an Organizational Unit OU in AD to store objects containing information about the Intel AMT systems In a multiple domain environment Intel recommends that you create an OU for each domain Give Create Delete permissions in the OU you created to the user account running the Intel SCS component doing the configuration After the OU is created you must define it in the configuration profile see Defining Active Directory Integration on page 90 Intel SCS User Guide 25 Chapter 2 Prerequisites Getting Started Checklist for Intel SCS Does your network use a Certification Authority CA For these Intel AMT features a CA is a prerequisite TLS 802 1x EAC and Remote Access If you have a CA and want to use these features this is the data that you need to collect e Which type of CA do you have If you have a Microsoft CA which type Standalone or Enterprise On which operating system is the CA installed What is the name and location of the CA in the network Will the same CA be used for all Intel AMT features What Common Name CN to put in the certificate created for each feature Intel SCS sends a request to the CA to create certificates The certificates issued by the CA include CNs The CNs are defined in the configuration profile
211. n page 104 e Defining Network Setups on page 107 e Defining System Settings on page 116 When you have defined all the settings for this profile the Finish window opens Click Finish to save the profile Intel SCS User Guide 87 Chapter 5 Defining Intel AMT Profiles 5 3 Defining the Profile Scope The Profile Scope window of the Configuration Profile Wizard lets you limit the settings that will be configured on systems when using this profile Note The Profile Scope window is only shown in delta configuration profiles Only settings defined in the Profile Scope window will be changed on the systems during configuration All other settings will stay in their current condition on the systems Thus you can use this profile e Toconfigure systems without making changes to Intel AMT settings configured using third party applications e Tomake changes to specific Intel AMT settings on configured systems E Configuration Profile Wizard Profile1 i Profile Scope Select the settings you want to manage using this profile Settings that are not Getting Started selected here will not be changed on the systems during configuration System Settings Optional Settings Vv Management Interfaces AD Integration KVM Redirection Access Control List OM Power Management Home Domains M Admin User Password Remote Access Optional Settings Transport Layer Security eV Active Directory Integration Network Configuration System Settin
212. n versions 4 2 30 and 5 2 30 of the Intel AMT firmware For systems with this problem 1 Reconfigure the system using a profile that disables TLS and Active Directory 2 Reconfigure the system using a profile that enables and defines the required TLS settings 11 14 Failed Certificate Requests via Microsoft CA Due to Microsoft limitations creation of the certificate might fail in these situations e Ifthe FQDN of the Intel AMT device is longer than 64 characters e Ifthe certificate Subject Name is longer than 256 characters e Ifthe CN in the Subject Name field is the Distinguished Name and this Distinguished Name is longer than 256 characters Solution Make sure that the values in the generated certificate will not exceed the maximum values listed above A possible solution for large values in the Subject Name field is to define a CN that will contain less characters see User defined CNs on page 198 Intel SCS User Guide 220 Chapter 11 Troubleshooting 11 15 Delta Profile Fails to Configure WiFi Settings In certain conditions reconfiguring a configured system using a Delta profile containing WiFi Connection settings does not enable WiFi in the Intel AMT device The configuration will complete with warnings and the log file will include this error AWSMAN command returned an error GetField no such field named LinkPolicy This can occur if all these conditions are true e The system was configured using a prof
213. ne trusted domains where the Intel AMT functionality will be available Remote Access P Remote Access Transport Layer Security Enable Intel AMT systems outside of the enterprise network to communicate with management consoles via a Management Presence Server MPS O Transport Layer Security TLS System Settings Use the TLS protocol to encrypt and authenticate communication with the systems Finish I Network Configuration Select at least one of the following items JE WiFi Connection WiFi network settings VF wired 802 1x Authentication 802 1x authentication settings for wired LAN only End Point Access Control EAC EAC settings used to authenticate system status Network Configuration Figure 5 3 Profile Optional Settings Window To select the optional settings 1 Select the check boxes of the optional settings you want to configure using this profile Intel SCS will remove unconfigure any existing settings from the Intel AMT system of options that are not selected in this window 2 Click Next to continue in the Configuration Profile Wizard and define the configuration settings as described in these topics e Defining Active Directory Integration on the next page e Defining the Access Control List ACL on page 93 e Defining Home Domains on page 97 e Defining Remote Access on page 98 e Defining Transport Layer Security TLS on page 104 e Defining Network Setups on page 107 Intel SCS User Guide 89 Chapte
214. network setups that the Intel AMT device must use A network setup includes encryption and authentication protocol settings and can be used for wired or wireless connections If you define WiFi Connection settings in the profile the wireless interface of Intel AMT is enabled during configuration Removing the WiFi Connection settings from a profile does not always disable the wireless interface of Intel AMT For more information see Disabling the Wireless Interface on page 221 E Configuration Profile Wizard Profile1 Ez Optional Settings Network Configuration T WiFi Connection Allow WiFi connection without a WiFi setup Allow WiFi connection with the following WiFi setups 802 1x EAC Add 4 WiFi Setup Name Authentication Compatibility Getting Started Profile Scope Optional Settings AD Integration ditas Access Control List 4 Remove e Home Domains Remove_ Remote Access JT Enable synchronization of Intel AMT with host platform WiFi profiles Transport Layer Security r Enable WiFi connection also in 51 55 operating system power states Network Configuration maer System Settings n Wired 802 1x Authentication Finish 802 1x Setup Name 7 Add Advanced End Point Access Control EAC Add or edit a WiFi profile or the wired 802 1x setup to define an Configure EAC EAC compatible 802 1x protocol Figure 5 16 Network Configuration Window Intel
215. ng the Network Service User in Database Mode In SQL Server the format used for the Network Service username is different for local and remote connections If the correct format is not defined the RCS will fail to connect to the database The format depends on the location of the RCS and the database e Ifthe RCS will be installed on the same computer as the database NT Authority Network Service e Ifthe RCS will NOT be installed on the same computer as the database NetBIOS domain name SAM Account Name Where the SAM Account Name is the computer where the RCS is installed For example domain computer When using the AddUser command of the Database Tool you must supply the correct format in the Username parameter Because the names include spaces make sure that you enclose the string in quotation marks Intel SCS User Guide 35 Chapter 3 Setting up the RCS 3 6 Installing Database Mode This section describes how to install the RCS in database mode e Before starting the installation make sure that this is the mode that you require see Selecting the Type of Installation on page 33 If you are installing the RCS in database mode the Microsoft SQL Server Native Client must be installed on the computer Currently the installers do not verify that this client is installed If the client is not installed the RCS cannot connect to the database The RCS folder contains a folder named SQLNativeClient with
216. ng the RCS open a command prompt window enter dcomcnfg and press lt Enter gt The Component Services window opens 2 From the Console Root tree select Component Services gt Computers gt My Computer Right click My Computer and select Properties The My Computer Properties window opens 4 Click the COM Security tab The COM Security tab opens My Computer Properties i bik General Options Default Properties Default Protocols MSDTC COM Security Access Permissions You may edit who is allowed default access to applications You may also set limits on applications that determine their own permissions Edit Limits Launch and Activation Permissions You may edit who is allowed by default to launch applications or activate objects You may also set limits on applications that determine their own permissions Edit Limits Edit Default Figure 3 8 COM Security Tab Intel SCS User Guide 47 10 11 12 Chapter 3 Setting up the RCS From the Access Permissions section a Click Edit Limits The Access Permission window opens b Make sure that all users that need to connect to the RCS appear in the list and have the Local Access and Remote Access permissions c Click OK The Access Permission window closes From the Launch and Activate Permissions section a Click Edit Limits The Launch Permission window opens b Make sure that all users that need to connect to the
217. nsole will not be able to connect to the device e Ifyou are using the RCS to configure systems e This error Post configuration connection to the Intel R AMT device failed in the RCS log file This error occurs because after configuration is complete the RCS tries and fails to connect to the device to test the connection e In database mode the Connection Status column in the Console will show that the RCS failed to connect to these systems Solutions The first step is to check the IP address that is defined in the Intel AMT device To do this use the standalone Discovery Utility or the SystemDiscovery command For more information see Discovering Systems on page 126 The value of the IP address is located in this tag registry key Configurationinfo gt AMTNetworkSettings gt AMTWiredNetworkAdapter gt IPv4IPSettings gt IP e Ifthis tag registry key contains the correct IP address e Inthe Domain Name System DNS make sure that this IP address is associated with the correct FQDN for the Intel AMT system e Ifyou have a Firewall in your network make sure that the ports used by Intel AMT are not blocked 16992 16993 16994 16995 5900 e Ifthis tag registry key contains a value of 0 0 0 0 this means that the device is waiting to be updated by the DHCP server This can occur after you do any of these e Configure a system to use DHCP but the system was already configured to use a static IP e Run a Full
218. ntax of this command see Discovering Systems on page 126 Intel SCS also includes a standalone Discovery Utility The utility contains only the SystemDiscovery command and is located in the SCS_Discovery folder Discovery Using the RCS When the RCS is installed in database mode you can also send data discovery queries from the Console You can send a data discovery query for a single system or create a job to run a discovery operation on multiple systems The Console sends a request to RCS to run remote discovery on the specified systems The RCS uses the WS Man interface to get the data from the Intel AMT devices The data retrieved using this method is only saved in the database and only includes Intel AMT related data You can then use the Console to view the data collected for each system see Viewing Discovery Data on page 175 Intel SCS User Guide 3 Chapter 1 Introduction 1 3 What is Intel AMT Intel AMT lets you remotely access computers when the operating system is not available or the computer is turned off The only requirement is that the computer must be connected to a power supply and a network The Intel AMT environment includes e Intel AMT Systems Computers with an Intel AMT device The Intel AMT device contains the hardware and software that control the Intel AMT features The device includes an Intel Management Engine Intel ME and a BIOS menu called the Intel Management Engine BIOS Extension Intel MEBX
219. o create a template see Defining Enterprise CA Templates on page 191 c Define the Common Names that will be included in the Subject Name of the generated certificate For more information see Defining Common Names in the Certificate on page 198 e Touse this option Intel SCS must have access to the CA during configuration see Required Permissions on the CA on page 189 e Ifyou are creating the profile on a computer that does not have access to the CA the drop down lists will not display the CA or the templates If necessary you can manually supply the CA name in the format FQDN CA Name and the name of the template 9 Click OK The settings are saved and the Management Presence Server window closes Intel SCS User Guide 100 Chapter 5 Defining Intel AMT Profiles 5 8 2 Defining Remote Access Policies A Remote Access policy defines what will cause the Intel AMT device to establish a connection with an MPS the trigger and to which MPS it will connect If Remote Access is enabled you must define at least one Remote Access policy To define a remote access policy 1 From the Remote Access Policy List section of the Remote Access window click Add The Remote Access Policy window opens El Remote Access Policy General Policy Name o Tunnel Lifetime Limit NoLimit C P Minutes Trigger Fast Call For Help 0S interface BIOS interface OS and BIOS interfaces T Alerts Scheduled maintenance e
220. o define the settings in the Intel AMT device All configuration is done remotely Intel SCS User Guide 8 Chapter 1 Introduction 1 5 Intel AMT and Security Considerations This section includes security related topics 1 5 1 Password Format Most passwords you define in Intel SCS must be between 8 32 characters with a minimum of one of each of these e Anumber e Anon alphanumeric character e Alowercase Latin letter e An uppercase Latin letter The underscore _ character is counted as an alphanumeric character The Remote Frame Buffer RFB password must be EXACTLY 8 characters long This password is only used for KVM sessions using port 5900 see VNC Clients on page 21 The Configurator CLI does not accept passwords that start with a forward slash The colon comma and double quote characters are NOT permitted in these passwords e Intel MEBX password e Digest user passwords including the Admin user e RFB password 1 5 2 File Encryption Configuration profiles created in the Console contain passwords and other data about your network It is recommended to restrict access to this data In non database mode this data is stored in an encrypted file In database mode this data is stored in the SQL database and thus protected by the authentication requirements you define in the SQL Server The unified configuration process uses an XML file exported from a profile in the Console These XML files ca
221. o get their IP address from a DHCP server Does your network use End point Access Control EAC If the 802 1x protocol used in your network supports End Point Access Control EAC you can use NAC NAP authentication with a RADIUS server to authenticate the Intel AMT device If you need to define EAC this is the data that you need to collect e Which authentication method does your EAC vendor use NAC NAP or NAP NAC Hybrid Note that Intel AMT 9 0 and higher does NOT support NAC What is the highest algorithm method supported by your authentication server SHA 1 SHA 256 or SHA 384 Note that SHA 256 and SHA 384 are only supported on Intel AMT 6 0 and higher EAC is defined in the Network Configuration window of the configuration profile see Defining End Point Access Control on page 114 Note These are prerequisites for EAC Integration with Active Directory item 5 in this checklist A Certification Authority item 6 in this checklist If using Microsoft CA the CA must be an Enterprise CA 802 1x item 8 in this checklist Intel SCS User Guide 27 Chapter 2 Prerequisites Getting Started Checklist for Intel SCS 10 Remote Does your network have a Management Presence Server MPS Access The remote access feature lets Intel AMT systems versions 4 x and higher located outside an enterprise connect to management consoles inside the enterprise network The connection is established via an MPS located in the DMZ o
222. ob e You can view the operation logs of a system by selecting the system and clicking View logs For more information about logs see Viewing Operation Logs on page 173 Intel SCS User Guide 186 Chapter 8 Managing Jobs and Operations 8 7 Starting Aborting and Deleting Jobs Automatic jobs are started automatically by the RCS Manual jobs must be started from the Console When a job is in the Completed or Scheduled status you can delete the job To start a manual job In the list of jobs e Right click the job and select Start Job Or e Select the job and click To delete a job e Inthe list of jobs select the job and click s About aborting a job At any time after a job has started you can abort the job To do this in the list of jobs e Right click the job and select Abort Job Or e Select the job and click i When a job starts the RCS starts the operation simultaneously on the first 50 systems defined in the job After 30 seconds the RCS starts the operation on another set of systems up to the maximum of 50 systems This cycle continues until the operation is run on all systems in the job At any time after creating a job you can check the status of the operation on each system see Viewing Job Items on page 185 If you abort a job the status of the job is changed to Aborting Operations that have already started on a system will not be aborted When the operation has run on
223. on of the configuration profile see Defining System Settings on page 116 These are the methods for defining the password of the default admin user Defined Passwords This method is the easiest method to use and has no prerequisites But the password you define in the profile is set in all devices configured with this profile If the password is discovered all the devices can be accessed If you use this method define a very strong password To increase security you can also configure systems with profiles containing different passwords Random Passwords Intel SCS generates a different random password for each device What occurs next depends on the mode that was selected when installing the RCS e Database Mode The passwords are saved in the SQL database You can also use the Console to view the password see Getting the Admin Password on page 172 e Non Database Mode The passwords are not saved Because the password is not known to you or any application after configuration you will not be able to connect to the device using the default admin user Thus you can only select the random passwords option if the profile contains a Kerberos admin user For more information see User Defined Admin User Kerberos on the next page Digest Master Password The RCS calculates a different unique password for each device using a secret key known as the Digest Master Password and system specific data from each device The RCS
224. onfiguration Software 9 e 64 bit operating systems HKLM SOFTWARE Wow6432Node Intel Intel R Setup and Configuration Software 9 When the RCS starts it checks if this key exists If the key exists with a value not equal to zero the RCS will automatically create a new empty file for each damaged or missing data file Only damaged or missing data files are replaced 11 2 Connecting to an RCS behind a Firewall If you install the RCS on a computer that is protected by a firewall you might receive error messages when you try to connect to the RCS Solution You must make sure that the firewall is configured to enable the WMI to connect to the RCS For more information refer to the Microsoft Developer Network http msdn microsoft com en us library aa389286 VS 85 aspx Intel SCS User Guide 213 Chapter 11 Troubleshooting 11 3 Exit Code 88 This error means that authentication of the ACU dll file used by the Configurator has failed and the requested operation was aborted This error means that the file is corrupted and thus is not trusted by Intel SCS Reasons for corruption can include changes made to the file by viruses or hardware failures 11 4 Exit Code 110 This error can occur if both these conditions are true 1 The certificate chain of the digital certificate cannot be validated locally by the host operating system on the Intel AMT system 2 The host operating system on the Intel AMT system fail
225. onnection with systems in seconds 10 pal Advanced Configuration Options Select one of the following configuration options None One Time Password required Support configuration triggered by Hello messages Hello message listener port e971 Location on server of executable to run when l receiving new Hello message Figure 4 2 Configuration Options Tab 2 Define the settings that you want for this RCS and click OK The settings are saved and the Settings window closes For information about these settings see Network on the next page Advanced Configuration Options on the next page Configuration Scripts Tab on page 75 Security Settings Tab on page 76 Storage Tab on page 77 Intel SCS User Guide 73 Chapter 4 Using the Console Network The RCS communicates with the Intel AMT device using the Transmission Control Protocol TCP During communication if the device does not answer within a specified time the RCS cancels the communication This default Timeout setting is 10 seconds This is usually enough time for the device to respond To change this default enter a new value between 10 and 80 seconds in this field Timeout for connection with systems in seconds A large Timeout value can cause configuration maintenance tasks done by the RCS to take longer than usual Advanced Configuration Options Select which of the advanced configuration options you want to use e None Select this
226. ons Execute this script before unconfiguration operations MAT J7 Execute this script after unconfiguration operations ae These scripts must be accessible from the computer where the RCS is installed Make sure you enter the correct path from the RCS computer to each script Figure 4 3 Configuration Scripts Tab 2 Define which scripts you want the RCS to run a Select the check box for each script that you want the RCS to run You can select to run scripts e After configuration reconfiguration and maintenance operations e Before unconfiguration operations e After unconfiguration operations b For each check box that you select specify the full path to the script These scripts must be accessible from the computer where the RCS is installed Make sure that you enter the correct path from the RCS computer to each script Intel SCS User Guide 75 Chapter 4 Using the Console Security Settings Tab The Security Settings tab includes optional security related settings oxi lt ConfigurationOptions _ ConfigurationScripts Security Settings _ Storage Digest Master Password A Master Password has not been defined Set a Master Password Certification Authority Plugin CA Plugin Status Not installed or failed to load Figure 4 4 Security Settings Tab Digest Master Password To define the active Digest Master Password DMP click Set and enter the password The password must be b
227. ons EI Configuration Profile Wizard Profile1 EEE E Optional Settings Transport Layer Security TLS System Authentication Basic Security Getting Started Select the method for creating the certificate Request certificate from Microsoft CA 7 Profile Scope Optional Settings Certificate Authority 7 AD Integration Enterprise CA Stand alone CA Server Certificate Template gt Refresh CAs amp Templates Access Control List Home Domains Remote Access Transport Layer Security Common Names CNs in certificate Default CNs User defined CNs Network Configuration System Settings Finish Mutual Authentication Advanced Security T Use mutual authentication for remote interface The trusted root certificates used to authenticate requests to the system must appear in the list below If they do not use the Edit List option Figure 5 14 Transport Layer Security TLS Window You cannot use a configuration profile containing TLS settings to configure Intel AMT systems that have Cryptography disabled To configure TLS settings 1 From the Select the method for creating the certificate drop down list select the source for the certificate that will be installed in the Intel AMT device e Request certificate from Microsoft CA By default the settings for this option are displayed If you are using a Microsoft CA continue from step 2 e Request Certificate via CA plugin This option is
228. ons To view syntax of a specific command type the command name followed by These conventions are used in the command syntax of the examples e Optional parameters are enclosed in square brackets e User defined variables are enclosed in angled brackets lt gt e Mutually exclusive parameters are separated with a pipe e Where necessary braces are used to group elements together to eliminate ambiguity in the syntax Note The CLI does not support passwords that start with a forward slash Intel SCS User Guide 124 Chapter 6 Using the Configurator 6 3 Configurator Log Files The Configurator records errors and other log messages in two locations e Inthe Windows Event Viewer Application log of the Intel AMT system e Ina log file By default e Anew log file is created each time you run the Configurator You can use the KeepLogFile global option to change this default e The log file is saved in the folder where the Configurator is located and has this format ACUlog HostName_YYYY MM DD HH MI SS Log For example ACULog ComputerX 2013 05 01 11 05 57 1log You can use the Output File global option to change the default name and location of the log file 6 4 CLI Global Options You can use any of these global options with the CLI commands e LowSecurity Disables authentication of the ACU d11 digital signature For more information see Digital Signing of Files on page 10 e Verbose Creates a detailed
229. option if you do not want to use any of the advanced configuration options described in this section e One Time Password required This option is only used during Remote Configuration using PKI For more information see About Remote Configuration e Support Configuration triggered by Hello messages Select this option only if you want the RCS to configure systems remotely using a script that you supply For more information see Remote Configuration Using Scripts If you select this option 1 Specify the TCP port that the RCS will use to listen for Hello messages from the Intel AMT systems The minimum value for the port is 1025 The default port is 9971 2 Specify the path to a script that will provide the required information about the Intel AMT systems The script must be located on the computer running the RCS If you enable or disable support for Hello messages or change the listener port number you must restart the RCS Intel SCS User Guide 74 Chapter 4 Using the Console Configuration Scripts Tab The Configuration Scripts tab lets you define scripts that the RCS will run automatically for the selected operation For more information see Running Scripts with the Configurator RCS on page 149 To define configuration scripts 1 Inthe Settings window click the Configuration Scripts tab The Configuration Scripts tab opens oxi Execute this script after configuration reconfiguration and maintenance operati
230. ormation see e Configuring Systems Unified Configuration on page 129 e Maintaining Configured Systems on page 138 The Configurator examines the settings in the profile sent in the deployment package This step occurs if the Intel AMT device supports host based configuration and Client Control mode is defined in the profile The Configurator activates Intel AMT on the device and puts the device in Client Control mode The Configurator uses the local profile to define the settings in the Intel AMT device All configuration is done locally These steps occur if the Intel AMT device supports host based configuration and Admin Control mode is defined in the profile The Configurator sends a request to the RCS to Setup the Intel AMT device Note The device must have a TLS PSK key or must be configured for remote configuration with PKI 4 The RCS activates Intel AMT on the device and puts the device in Admin Control mode 4 5 The Configurator uses the local profile to define the settings in the Intel AMT device All 4 configuration is done locally These steps occur for all Intel AMT devices that do not support host based configuration The Configurator sends a configuration request to the RCS Note The device must have a TLS PSK key or must be configured for remote configuration with PKI 4 The RCS gets the configuration settings from the profile in the Console The RCS uses the profile in the Console t
231. ost system can operate If you make a mistake when defining this list you might not be able to connect to the Intel AMT device after it is configured You must make sure that you always configure systems only with a profile that contains a list of domains correct for those systems You must make sure that you define the domain names exactly as they are defined in option 15 of the DHCP servers onboard specific DNS suffix Intel SCS User Guide 24 Chapter 2 Prerequisites Getting Started Checklist for Intel SCS Do you want to permit access to Intel AMT via a VPN By default Intel AMT devices are configured to block access via Virtual Private Network VPN connections If you want to manage systems outside of the organization s network and are connected to it using VPN you will need to change this setting This setting is defined in the Home Domains window of the configuration profile Note A prerequisite for this setting is to define a list of Home Domains see item 3 in this checklist Do you want to integrate Intel AMT with Active Directory AD If your network uses AD you can integrate Intel AMT with your AD Intel AMT supports the Kerberos authentication method This means that Intel SCS and management consoles can authenticate with the Intel AMT device using Kerberos users The users are defined in the Intel AMT device using the Access Control List If integration is enabled during configuration Intel SCS creates a
232. ot support passwords that start with a forward slash FileToRun lt filename gt FileHash lt SHA256 hash gt FileUser lt username gt FilePassword lt password gt global options See CLI Global Options on page 125 The XML file containing the configuration parameters for this Intel AMT system DecryptionPassword Mandatory if any of the files that the Configurator will use are encrypted see lt password gt File Encryption on page 9 AbortOnFailure If configuration fails put the Intel AMT device in the Not Provisioned mode This parameter is applicable only for systems that were unconfigured when the command started during reconfiguration this parameter is ignored AdminPassword The current password of the default Digest admin user defined in the Intel AMT lt password gt device This parameter is NOT necessary if any of these are true The device is in an unconfigured state Intel SCS can find the Digest admin password in one of the profiles or using a Digest Master Password The user account running the Configurator RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions ADOU lt ADOU path gt The path to the Active Directory Organizational Unit ADOU containing the AD object of configured systems If this parameter is supplied the Configurator will delete the existing AD object representing the system A new AD object is created in the ADOU define
233. ou can only use the CA plugin option with the ConfigViaRCSOnly command sent from the Configurator No other options are supported To setup and use the CA plugin 1 On the computer running the RCS install the CA plugin as described in the installation instructions provided with the plugin 2 After restarting the RCS open the console and check that the plugin was successfully loaded see Certification Authority Plugin on page 76 3 In the relevant profile window from the Select the method for creating the certificate drop down list select Request certificate via CA Plugin 4 When the plugin option is selected these fields are shown e Certificate Authority e Certificate Info e Certificate Secure Info The values that you enter in these fields are not validated by the RCS If you leave them empty the default values defined by the plugin will be used Refer to the plugin documentation for more information 5 Define the Common Names that will be included in the Subject Name of the generated certificate For more information see Defining Common Names in the Certificate on the next page Intel SCS User Guide 197 Chapter 9 Preparing the Certification Authority 9 4 Defining Common Names in the Certificate The certificate generated by the CA includes Common Names CNs in the Subject field and the Subject Alternative Name field You can use these options in the profile to define the CNs in the generated certificate Com
234. ou define one deployment package to configure all Intel AMT versions in your network Intel SCS automatically uses the necessary configuration method for each Intel AMT device The unified configuration process uses two copies of the same profile e The first copy is created in the Console This copy is used by the RCS to remotely configure devices that do not support host based configuration e The second copy is exported from the Console and must be included in the deployment package This copy is used by the Configurator to locally configure devices that support host based configuration This copy also includes data added during export about the RCS and the required control mode for the Intel AMT device Deployment Package Configurator XML Profile Script Mi Intel AMT gt 6 2 Client Control Mode ey gt Intel AMT gt 6 2 Admin Control Mode Hi Intel AMT lt 6 2 Profile in the Console Figure 1 1 Unified Configuration Process Intel SCS User Guide 7 Chapter 1 Introduction Table 1 2 Steps in the Unified Configuration Process Description A script or a batch file runs the Configurator locally on the Intel AMT system The Configurator examines the Intel AMT device to find if it supports host based configuration Note The name of the command to run is ConfigAMT You can also use the unified configuration process to do maintenance tasks using the MaintainAMT command For more inf
235. ount is only given the limited permissions that Intel SBA requires Intel SBA will then automatically use this user account when it needs to define a setting in the Intel ME Some Intel SBA functionality can only operate correctly if the power management setting is configured to Always on SO S5 This is also the recommended setting for Intel AMT see Power Management Settings on page 118 If the configuration profile is defined with a power management setting of Host is on SO this is what will occur e If Intel SBA is already configured the power management setting will NOT be changed and will remain configured to Always on SO S5 This is to prevent breaking Intel SBA A warning message is recorded in the log file that the power management setting was not changed e If Intel SBA is installed but not configured the power management setting will be configured to Host is on SO Intel SBA will be put in the Incompatible integration mode and will not be allowed to change this setting Later if Intel SBA is configured Intel SBA features that require the capability to wake up the platform will not be available Intel SCS User Guide 22 Chapter 2 Prerequisites This chapter describes the prerequisites for using Intel SCS to configure Intel AMT For more information see 2 1 2 2 2 3 2 4 2 5 Getting Started Checklist 0000000 des Pcs sanlsiele o s ee daeale neauue tease apewecuedseeaasudwegbalnescoumadse 24 Sup
236. parameter invalid data 39 The Intel AMT device is in a state that does not support disabling the Client Control mode This system was already unconfigured The system was successfully put in the Pre Provisioned state and the Intel AMT interfaces are now closed The certificate cannot be retrieved because access to the Certification Authority is denied Failed to write to the file A possible reason is insufficient permissions in the selected folder jo Failed to read from the given file A possible reason is insufficient permissions in the selected folder Memory Allocation Error Failed to unconfigure this Intel AMT device Failed to do the requested maintenance tasks on this Intel AMT device The Intel AMT device is in a state that does not support the Maintenance command TLS cannot be configured because cryptography is disabled on this system The Intel AMT device cannot be set with the host FQDN and a dedicated FQDN The Intel AMT device cannot be set with the host IP and a dedicated IP Intel SCS User Guide 155 Chapter 6 Using the Configurator Description An FQDN is mandatory for configuration supply the FQDN in the NetworkSettings tag of the profile Setting a static IP to the Intel AMT device from the host dynamic IP is not permitted When defining a static address the IP and subnet mask parameters are mandatory 56 57 58 9 5 Failed to find the host IP address and subnet mask to set in the Intel AMT
237. ported Intell AMT VersionS 2c eee ae caddies ss cunaseassosacsacgadnenaeddatesecuecdaseeedsawannegeasen 28 Supported Operating Systems 22 2522 s2sccccncslecsdeecaseagsgqaieotcejauaie eine eicasceceseaagaatetersaaas 29 Support fora Workgroup Environment s oo cics soca crcian cogs sennen oe cctsidiculnine ea aiaa ien Eine e ES 30 Required User PerMiSSIONS ssns ee e O eee e Eee aeeai 31 Chapter 2 Prerequisites 2 1 Getting Started Checklist Before you can use Intel SCS to configure Intel AMT you will need to collect some data about your network and make some decisions In many organizations responsibilities and knowledge about the network is located in several departments You can print out this checklist and use it as a reference as you collect the necessary data Getting Started Checklist for Intel SCS How is Domain Name System DNS resolution done in your network On an Intel AMT system the host platform and the Intel AMT device both have a Fully Qualified Domain Name FQDN These FQDNSs are usually the same but they can be different Intel SCS configures the FQDN of the Intel AMT device This is one of the most important configuration settings You must define an FQDN that can be resolved by the DNS in your network If you do not after configuration you might not be able to connect to the device By default this is how Intel SCS configures the FQDN hostname suffix The hostname part of the FQDN is the hostname from the host opera
238. r DatabaseTool exe AddUser DBServer 192 168 1 10 DBName TestDB RCSUserWinAuth 1 RCSUsername NT Authority Network Service Example 4 Adding the Network Service user RCS is connecting remotely DatabaseTool exe AddUser DBServer 192 168 1 10 DBName TestDB RCSUserWinAuth 1 RCSUsername domain computer Example 5 Adding a user that will use SQL Server authentication DatabaseTool exe AddUser DBServer 192 168 1 10 DBName TestDB Username MySQLUser Password P ssw0rd RCSUserWinAuth 0 RCSUsername MyRCSUser RCSPassword P ssw0rd Intel SCS User Guide 39 Chapter 3 Setting up the RCS 3 6 6 Installing the RCS and Console This procedure describes how to install the RCS and Console in database mode To install in database mode 1 Double click IntelSCSInstaller exe The Welcome window opens 2 Select I accept the terms of the license agreement and click Next The Select Components window opens x Select Components intel Select the Intel SCS components that you want to install on this computer l Remote Configuration Service RCS A Windows based service for discovering configuring and maintaining the settings of Intel products and capabilities on your systems Select the installation mode Database Mode Non Database Mode i Console A Console that you can use to connect to RCS installations on any computer Figure 3 1 Select Components Window 3 Sele
239. r 5 Defining Intel AMT Profiles 5 5 Defining Active Directory Integration The Active Directory Integration window lets you integrate Intel AMT with the security infrastructure of your network s Active Directory AD This integration includes the ability to e Use Domain user accounts for Kerberos authentication with the Intel AMT device e Use the 802 1x protocol for wired and wireless access e Use End Point Access Control EAC E Configuration Profile Wizard Profile1 i Optional Settings Active Directory Integration Active Directory Integration Getting Started Active Directory OU JoU amr DC example DC domain Profile Scope o Optional Settings 7 Use OS Host Name for the new AD object Access Control List Specify any additional Security Groups for the object Home Domains Remote Access a Transport Layer Security _ Advanced Network Configuration System Settings Finish Figure 5 4 Active Directory Integration Window To define Active Directory Integration e Click and select the Active Directory Organizational Unit ADOU where the object will be stored in AD During configuration Intel SCS sends a request to the AD to create a Computer object representing the Intel AMT device The object is added to the ADOU you defined in this field This is the only setting that is required to activate AD integration for Intel AMT The remaining settings in this window are optional and can only be selected after de
240. r Configuration Secure communications between a configured Intel AMT system and a management console depend on the security settings you define in your network You can use TLS PKI in your network to increase the security of communication with all versions of Intel AMT When TLS is configured by defining TLS in the configuration profile communications with Intel AMT are encrypted If you do not configure TLS all traffic sent to and from Intel AMT over the network is sent as plain text Note TLS PKI is not available for Intel AMT devices in SMB mode 1 5 10 Access to the Intel MEBX The Intel Management Engine BIOS Extension Intel MEBX is a BIOS menu extension on the Intel AMT system This menu can be used to view and manually configure some of the Intel AMT settings The menu is only displayed if you press a special key combination when the computer is rebooting usually lt Ctrl P gt Access to the Intel MEBX is controlled by a password referred to in this document as the Intel MEBX password Entry to the Intel MEBX menu for the first time requires a new password to replace the default password usually admin When an Intel AMT system is configured by the RCS or using a USB key it is put in the Admin Control mode In Admin Control mode if the default password is detected during configuration it is replaced with a password that you define This new password is defined in the configuration profile or when creating t
241. r section select the MPSs that apply to the policy up to two When a trigger occurs the Intel AMT device attempts to connect to the server listed in the Preferred Server field If that connection does not succeed the device tries to connect to the server listed in the Alternative Server field if one was specified 6 Click OK The Remote Access Policy window closes 5 9 Defining Trusted Root Certificates An Intel AMT system must have a trusted root certificate to use any of these features e Remote Access using a Management Presence Server e Mutual authentication in Transport Layer Security e Most types of 802 1x setups To define the trusted root certificates 1 From the relevant feature window click Edit List The Trusted Root Certificates Used In Profile window opens E Trusted Root Certificates Used In Profile lol xj All the trusted root certificates selected in the following list will be configured to the Intel AMT system and used to authenticate servers when using the following features Mutual authentication in Transport Layer Security TLS Mutual Most types of 802 1x setups When defining a Management Presence Server MPS for Remote Access Select at least one trusted root certificate but not more than four to be used for all features Figure 5 12 Trusted Root Certificates Used In Profile Window Intel SCS User Guide 102 Chapter 5 Defining Intel AMT Profiles 2 Toadda trusted root certificate cli
242. re location xi Storage Key Extraction intel It is highly recommended to extract and save a copy of the storage encryption key that was used by the RCS to encrypt data If you uninstall without saving the key the key will be deleted and cannot be recovered Without this key it is not possible to access the data lM Extract key and save to file Encryption Key File File Password Confirm Password Figure 3 11 Storage Key Extraction Window a Inthe Encryption Key File field enter a name for the key file It is recommended to save the file with a key extension By default the file is created in the folder where the installer is located Alternatively you can click Browse to select a folder and filename b Inthe Password fields enter a password that will be used to encrypt the file For the required format see Password Format on page 9 Click Next to continue to the Confirmation window If you selected to install the RCS additional windows open Supply the necessary data in each window Optional By default when uninstalling the RCS the log files are not deleted If you want to delete the log files select the Delete the RCS log files check box Selecting this check box will delete all files with a Log extension that exist in the root of the RCSConfServer folder Log files in any existing sub folders created by the CA plugin for example are not deleted Click Modify or Remove if you are only uninstalling
243. request to create an AD object for the Intel AMT device By default the object is created using the hostname part of the FQDN that Intel SCS configured in the Intel AMT device The value of the FQDN that Intel SCS configures in the Intel AMT device is defined in the configuration profile Most of these options take the hostname from the operating system The DNS Look Up FQDN option takes the name returned by an nslookup on the IP address of the on board wired LAN interface In the examples above this would mean that the FQDN defined in the Intel AMT device is the same as the FQDN shown in the Record in DNS Column When multiple records in DNS have identical values for the first part of the hostname in this example System1 this can cause problems when creating AD objects This is because the AD object is created using only the first part of the hostname up to the first period The result is that only one AD object will be created even though multiple Intel AMT devices exist Solution In the AD Integration window select the Use OS Host Name for the new AD object check box see Defining Active Directory Integration on page 90 When this check box is selected the AD object will always be created using the hostname defined in the operating system Intel SCS User Guide 218 Chapter 11 Troubleshooting 11 10 Kerberos Authentication Failure If integration with Active Directory AD is enabled during configuration Intel SCS creates an
244. rofiles Intel SCS User Guide 189 Chapter 9 Preparing the Certification Authority 9 2 3 Request Handling Certification Authorities include settings that define how certificate requests are handled Intel SCS does not support pending certificate requests If during configuration the CA puts the certificate into the Pending Requests state Intel SCS returns an error 35 Thus you must make sure that the CA and the templates used by Intel SCS are not defined to put certificate requests into a pending state For Enterprise and Standalone CAs request handling is defined in the Request Handling tab right click the CA and select Properties gt Policy Module gt Properties Make sure that the correct option is selected shown in yellow in this figure ia Certification Authority File Action View Help e om EBA m Certification Authority Name Certificate Managers Restrictions Auditing Recovery Agents Security General Policy Module Ext Module Extensions Storage Revoked Certificates Issued Certificates p Description of active policy module iting Failed Requests certificate Templates Request Handling The Windows default policy module controls how this CA should handle certificate requests by default Do the following when a certificate request is received Set the certificate request status to pending The administrator must explicitly issue the certificate For
245. s 802 1x 8 Change the validity and renewal periods as required by local policy and click Apply Intel SCS User Guide 193 Chapter 9 Preparing the Certification Authority 9 Click the Request Handling tab The Request Handling tab opens 802 1 User Properties E M El Delete revoked or expired certificates do not archive 1024 E Figure 9 5 Request Handling Tab Intel SCS User Guide 194 Chapter 9 Preparing the Certification Authority 10 Click the CSPs button The CSP Selection window opens Choose which cryptographic service providers CSPs can be used in requests Requests can use any CSP available on the subject s computer Requests must use one of the following CSPs CSPs Microsoft Base DSS and Diffie Hellman Cryptographic Provider lt Microsoft DH SChannel Cryptographic Provider Microsoft Enhanced Cryptographic Provider v1 0 Microsoft Enhanced DSS and Diffie Hellman Cryptographic Prov C Microsoft Enhanced RSA and AES Cryptographic Provider C Microsoft RSA SChannel Cryptographic Provider Microsoft Strong Cryptographic Provider Schlumberger Cryptographic Service Provider Cancel 4 Figure 9 6 CSP Selection Window 11 Inthe list of requests select the Microsoft Strong Cryptographic Provider check box and click OK The CSP Selection window closes 12 Click the Subject Name tab and select Supply in the request 13 Cli
246. s shown in the bottom section of the window Note You can also view the logs in the List of Systems in Job window see Viewing Job Items on page 185 Intel SCS User Guide 173 Chapter 7 Monitoring Systems 3 Click View Log The Operation Logs window opens E Operation Logs Severity Date and time v l Operation 7 Information 11 28 2011 1 19 46 PM Reconfiguration Start Success 11 28 2011 1 20 03 PM Reconfiguration Information 11 29 2011 8 13 12 AM Reconfiguration Start Success 11 29 2011 8 13 29 AM Reconfiguration Information 11 29 2011 8 16 19 AM Reconfiguration Start Completed with warning 11 29 2011 8 16 37 AM Reconfiguration amp Reconfiguration UUID 00000000 000 1 0000 0000 00000 1000501 Error code 3221227479 Intel AMT FQDN IntelAMT 7 example domain Time and Date 11 29 2011 8 16 37 AM Intel AMT IPv4 192 168 1 10 Server name Server example domain Description Intel R AMT Operation completed with warnings The IDER is disabled in the MEBx of the Intel R AMT system and cannot be lenabled using the Intel R SCS The SOL is disabled in the MEBx of the Intel R AMT system and cannot be enabled using the Intel R SCs Copyall Clicking Copy All copies the data for the selected record to the clipboard You can then paste the data Ctrl V to a text editor Intel SCS User Guide 174 Chapter 7 Monitoring Systems 7 11 Viewing Discovery Data The Discovery Data window lets you v
247. s sossen ete es a eE ets eee eked ett ORe 12 1 5 7 Transport Layer Security Protocol 2c osoe eccesceceedscnd cede sadcecededsa ates oeeisseacssendes 13 1 5 8 Security Before and During Configuration 0 2 0222 22 eee eee cece eee eee cece cess 13 1 5 9 Security After Configuration 002 202222 c ccc eee cece eect eee ee eee eeeeeees 14 1 540 Access to thedntel MEBX 222 o c522025 cesciesecsaceomalesinns s coe e REE EE Ra E EERDE eE 14 1 6 Admin Permissions in the Intel AMT Device 0 0 0 22 e cece cece eee cece ence eee eee eeeeeee 15 1 6 1 Default Admin User DIGGS osason ea he poate a ci dhe pice ERE aa E Ai EDEA 15 1 6 2 User Defined Admin User Kerberos 2 0 2 0 222 2222 ccc eee cee cece eee ce cece aoa arnoa 16 1 7 Maintenance Policies for Intel AMT 020 0 22222 cece cece eee eee Ionin 17 1 7 4 About Maintenance Tasks 26 202202 ccc cence a E a Aa area Ra E AIE ewes deedes 17 1 7 2 Manual Automatic Maintenance via Jobs 2 2 ee 18 1 7 3 Manual Automatic Maintenance using the CLL 2 2 0 22 e eee 19 1 8 Support for KVM Redirection 2 2 2 2 2 ce cece cece ccc ceeccceececceececcceeecceeececeececeececceeeeceeeenees 21 1 9 Support for Integration with Intel SBA 2 2 2 0 cece ce eee eee cece eee e eee eeee eee 22 Chapter 2 Prerequisites 2 20 22 o olen eee eee eee eee ence eee eee arrene 23 258 Getting Started Checklist sssrin Soo tells
248. s used in your organization for critical resources Intel SCS User Guide 11 Chapter 1 Introduction 1 5 5 Control Modes After configuration all Intel AMT devices are put in one of these control modes e Client Control Mode This mode was added to Intel AMT 6 2 and higher devices Intel AMT devices in this mode have these security related limitations e The System Defense feature is not available e User consent is required for all redirection operations and changes to the boot process e Permission from the Auditor user if defined is not required to unconfigure Intel AMT e To make sure that untrusted users cannot get control of the Intel AMT system some Intel AMT configuration functions are blocked e During configuration the Intel MEBX password will not be changed if it is the default password see Access to the Intel MEBX on page 14 e Admin Control Mode In this mode all Intel AMT features supported by the Intel AMT version are available By default the host based configuration method puts the device in the Client Control mode All other configuration methods automatically put the device in the Admin Control mode 1 5 6 User Consent User consent is a new feature available in Intel AMT 6 0 and higher If user consent is enabled when a remote connection to a computer starts a message shows on the computer of the user The message contains a code that the user must give to the person who wants to connect to his compu
249. se If you are sure that you want to delete an Intel SCS database and lose all data that it contains you can use the De leteDB command of the Database Tool This is the syntax and parameters for the DeleteDB command DatabaseTool exe DeleteDB DBServer lt DB server gt DBName lt DB name gt Username lt SQL Login ID gt Password lt SQL password gt The name FQDN or IP address of the SQL Server The name of the database that you want to delete Username By default the credentials of the user account running the Database Tool are used to authenticate with SQL Server If you want the Database Tool to use SQL Server authentication instead use this parameter to supply the Login ID Password The password of the SQL Server account only necessary if the user was supplied in the Username parameter Examples Example 1 Deleting a database on the local SQL Server DatabaseTool exe DeleteDB DBServer local DBName TestDB Example 2 Deleting a database on a remote SQL Server DatabaseTool exe DeleteDB DBServer 192 168 1 10 DBName TestDB Example 3 Deleting a database using SQL Server authentication DatabaseTool exe DeleteDB DBServer 192 168 1 10 DBName TestDB Username MySQLUser Password P ssw0rd Intel SCS User Guide 55 Chapter 3 Setting up the RCS 3 11 Upgrading Intel SCS You can only use the Intel SCS 9 0 installer Inte
250. see Setting up Remote Configuration on page 201 Note e This command is not supported if the RCS is installed on a computer running Windows Server 2003 or Windows XP Professional e This command is only supported on Intel AMT 7 x and higher As an alternative for this command you can do this 1 Unconfigure the system 2 Configure the system again using a method that uses the RCS to put the system in the Admin Control mode during configuration Syntax ACUConfig exe global options MoveToACM lt RCSaddress gt Note The CLI does not WMIUser lt username gt WMIUserPassword lt password gt support passwords that AdminPassword lt password gt start with a forward slash U CertificateCNSuffix lt suffix gt SourceForAMTName lt source gt RCSBusyRetryCount lt retries gt global options See CLI Global Options on page 125 lt RCSaddress gt The IP or FQDN of the computer running the RCS WMIUser lt username gt The name in the format domain username of a user with WMI permissions on the computer running the RCS This parameter is only required when running the Configurator with a user without WMI permissions on the RCS computer WMIUserPassword The password of the WMI user lt password gt Intel SCS User Guide 145 AdminPassword lt password gt CertificateCNSuffix lt suffix gt SourceForAMTName lt source gt RCSBusyRetryCount lt retries gt Intel SCS
251. ser The path to a file that contains the network settings FQDN and or IP to put in the Intel AMT device Only use this parameter if you defined the source for at least one of these settings as a dedicated network settings file For more information see Defining IP and FQDN Settings on page 120 Defines the number of times to resend the request to the RCS if the RCS returns a status of busy The maximum number of retries is 100 Each request is sent after a random period of time If not supplied the default for this parameter is 0 141 Chapter 6 Using the Configurator 6 14 Unconfiguring Intel AMT Systems Command uneonftgare Description Unconfigures Intel AMT If the Intel AMT device supports host based configuration unconfiguration is done locally If not the Configurator sends the unconfiguration request to the RCS There are two types of unconfiguration e Partial Removes the configuration settings from the system and disables the Intel AMT features on the system The system and the RCS can still communicate since the PID PPS admin ACL settings host name domain name and the RCS IP and port number are not deleted Note that if the manufacturer defined the SOL and IDE interfaces to be closed by default then a partial configuration operation will close them and they cannot be reopened without physical access to the Intel MEBX This is a known Firmware limitation Full Deletes all the Intel AMT settings from the sys
252. signatures increases security because it gives an indication that the file is genuine and has not been changed The ACU dll is a library used by the Intel SCS components to do configuration tasks on Intel AMT devices When running a command from the Configurator CLI the Configurator tries to authenticate the signature of the ACU dIl If authentication fails the task is not permitted and the Configurator returns an error message This authentication is also done on external files run by the Configurator This is the default behavior of the Configurator but it can be changed per command see CLI Global Options on page 125 When running CLI commands remotely or in a deployment package it is not recommended to change this default The digital signature is authenticated against a trusted root certificate supplied by the Equifax Secure Certificate Authority The time stamp is authenticated against a trusted root certificate supplied by Commodo These certificates are located in the user trusted root certificate store of the operating system on the Intel AMT system The certificates are automatically included in most of the operating system versions supported by the Intel SCS components e Some Windows versions for example Windows 8 do not include all of the necessary trusted root certificates If these systems also do not have access to the Internet authentication will fail For more information see Exit Code 110 on page 214 e In some environmen
253. sing Intel SCS 7 1 include this tag and are valid for use by Intel SCS 9 0 Try and open the profile using the Intel AMT Configurator Utility supplied in Intel SCS 9 0 To do this select Create Settings to Configure Multiple Systems and browse to the folder containing the profile If the profile is not shown in the list of profiles it is not a valid profile e Ifthe Intel AMT system is running Windows XP make sure that service pack 3 is installed e Ifthe profile is encrypted these errors can occur on Intel AMT systems running Windows 7 and Windows Server 2008 This is because of a known Microsoft issue Install this hotfix http support microsoft com kb 981118 11 7 Reconfiguration of Dedicated IP and FQDN Settings Reconfiguration can fail when all these conditions are true 1 The Intel AMT device was configured with an FQDN and IP different from the host operating system for example by using a dedicated network settings file 2 The dedicated network settings file contains FQDN and IP values different from those currently defined in the Intel AMT device 3 Intel SCS needs to reconfigure the device using the new values in the dedicated network settings file Solution Make sure you supply the current IP address or FQDN of the Intel AMT device in the lt CurrentAMTAddress gt tag of the dedicated network settings file Intel SCS User Guide 216 Chapter 11 Troubleshooting 11 8 Disjointed Namespaces A disjointed na
254. sion Timeout for user consent 5 minutes en oe i Cancel Figure 5 22 KVM Redirection Settings Window b If you want to remove the user consent requirement clear the User consent required before beginning KVM session check box User consent is mandatory for Intel AMT 6 2 and higher devices if they are configured in Client Control mode Thus if you want to remove the user consent requirement you must configure these devices in Admin Control mode c If User Consent is required the Timeout for user consent field defines the maximum time in minutes allocated for the user consent process If the user consent process is not completed in this time a new KVM connection request must be sent Intel SCS User Guide 117 Chapter 5 Defining Intel AMT Profiles Power Management Settings 1 From the drop down list select one of these e Always On SO S5 If the system is connected to the power supply the Intel AMT manageability features are available in any of the system power states This is the recommended setting e Host is On SO The Intel AMT manageability features are available only if the operating system of the Intel AMT system is up and running You cannot select this setting if the Enable WiFi connection also in S1 S5 operating system power states check box is selected in the Network Configuration window 2 Optional If you selected Always on SO S5 you can select the Intel ME will go into a lower power s
255. sion 8 x 1 Make sure that you have made a full backup and disabled the RCS see Before Starting the Upgrade on page 56 2 Double click IntelSCSInstaller exe The Welcome window opens This window shows the currently installed components that the installer will upgrade on this computer If you want to add a component run the installer again after upgrade is complete Click Next The License Agreement window opens 4 Select I accept the terms of the license agreement and click Next The RCS User Account window opens E Intel SCS Installer RCS User Account Username EXAMPLE Administrator Password Figure 3 15 RCS User Account Window 5 Supply the password of the user account under which the RCS runs on this computer The Network Service account does not require a password Intel SCS User Guide 61 Chapter 3 Setting up the RCS 6 Click Next If the installer detects that the RCS has not been stopped and disabled the Disable RCS window opens E Intel SCS Installer Disable RCS The installer has detected that the RCS is not disabled Before starting the upgrade process you must stop and disable the RCS To do this you can Manually stop the Windows service named RCSServer and change the j Startup Type to Disabled OR Click Disable RCS to let the installer attempt to stop and then disable the RCS Disable RCS Figure 3 16 Disable RCS Window If this window is shown
256. ssueCertificates task AMTNetworkSettings Contains data about the network settings configured in the Intel AMT device The values in the registry are compared with the settings defined in the profile If they are not the same the new settings from the profile are configured in the device SyncNetworkSettings task String values located in the root of the ConfigurationInfo key Intel SCS User Guide 19 Key Value LastRenewAdminPassword LastRenewADPassword LastSyncClock Chapter 1 Introduction Description The last time that the password of the default Digest admin user was configured in the Intel AMT device If this date is more than 6 months old change the password according to the password setting defined in the profile RenewAdminPassword task The last time that the password was configured in the Active Directory object representing the Intel AMT system If this date is more than 6 months old change the password of the Active Directory object RenewADPassword task The last time that the clock of the Intel AMT device was synchronized If this date is more than 3 months old synchronize the clock SyncAMTTime task Note The SyncAMTTime task is also done every time that one of the other tasks is done e Alwaysrun the Configurator under a user that has permissions to create and update these registry keys on the Intel AMT system The AutoMaintain parameter will fail and return an error if it cannot access
257. stem s Password window opens EX View System s Password Tl ed The password for the Admin user is Figure 7 8 View System s Password Window To view the password select Show password The password is shown Intel SCS User Guide 172 Chapter 7 Monitoring Systems 7 10 Viewing Operation Logs Data about each operation that the RCS does on a system is stored in the database Two records are created for each operation e Start Record This record is created when the operation starts and contains the word Start in the name of the operation The description field of this record contains a list of the parameters that were used during the operation You can use this data to troubleshoot what happened if problems have occurred e Finish Record This record is created when the operation finishes The description field of this record shows details of problems that occurred For these records the Severity level column can show one of these e Success The operation completed successfully e Completed with warnings The operation completed but some errors occurred For configuration reconfiguration operations this means that the system was configured but not all settings were set successfully e Error The operation failed To view operation logs of a system 1 Inthe Console click Monitoring and select the Systems tab 2 Locate and select the system using the Views tab or the Search tab Data for the selected system i
258. sword parameter This is to prevent losing connection to the device when changing these settings Solution Define the Digest admin password in the profile or the CLI command 11 12 Error The Caller is Unauthorized Intel AMT includes a security mechanism to prevent brute force attacks that are trying to crack the Digest admin password If a brute force attack is detected connection to the device is blocked and error messages like these are recorded in the log file Intel R AMT connection error 0xc000521d The caller is unauthorized After connection to the device is blocked this error will continue to occur even when trying to connect with the correct password Solution Wait for approximately one hour and then try the requested operation again Intel SCS User Guide 219 Chapter 11 Troubleshooting 11 13 Error when Removing AD Integration Error in SetKerberos For some Intel AMT 4 x and 5 x systems this warning can occur during reconfiguration with a profile that contains TLS settings but disables Active Directory AD integration error in SetKerberos 1 Failed while calling WS Management call SetKerberosSettings This warning occurs only if the system was initially configured with a profile containing TLS settings and AD integration enabled The result is that configuration is completed including TLS but the AD integration is not disabled Solution This is a known limitation that was solved i
259. t Syntax ACUConfig exe global options CreatePSK lt RCSaddress gt NewMEBxPass lt password gt CurrentMEBxPass lt password gt deii OutputFile lt filename gt RCSBusyRetryCount lt retries gt upport passwords that Supp cP WMIUser lt username gt WMIUserPassword lt password gt start with a forward slash UsingDhcp LocalHostIp lt ip gt SubnetMaskIp lt subnet_mask gt GatewayAddrIp lt ip gt DnsAddrip lt ip gt SecondaryDnsAddrIp lt ip gt global options See CLI Global Options on page 125 lt RCSaddress gt The IP or FQDN of the computer running the RCS Note The CLI does not Intel SCS User Guide 133 NewMEBxPass lt password gt CurrentMEBxPass lt password gt OutputFile lt filename gt RCSBusyRetryCountt lt retries gt WMIUser lt username gt WMIUserPassword lt password gt Chapter 6 Using the Configurator The new password to put in the Intel MEBX This parameter is mandatory even if the password has already been changed from the default of admin For information about the required format see Password Format on page 9 By default the Configurator always uses the default password of unconfigured systems admin in this parameter If this is not the password in the Intel MEBX supply the correct password If you do not supply the correct password the reboot of the Intel A
260. t network hardware and software For notebooks Intel AMT may be unavailable or limited over a host OS based VPN when connecting wirelessly on battery power sleeping hibernating or powered off Results dependent upon hardware setup and configuration For more information visit Intel Active Management Technology Intel vPro Technology is sophisticated and requires setup and activation Availability of features and results will depend upon the setup and configuration of your hardware software and IT environment To learn more visit http www intel com technology vpro Client Initiated Remote Access CIRA may not be available in public hot spots or click to accept locations For more information on CIRA visit Fast Call for Help Overview Intel Intel vPro and the Intel logo are trademarks of Intel Corporation in the U S and or other countries Microsoft Windows and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the U S and or other countries Other names and brands may be claimed as the property of others Copyright 2006 2013 Intel Corporation All rights reserved Intel SCS User Guide ii Table of Contents Chapter 1 Introduction 0 000000000000 00000000000100 0000 rara eee eben Enararen 1 ki Whats mtelSCS ems eaea e tates a e e aaa e aa a a see Ee 2 1 2 What are the Discovery Options 2 0002 c ccc cece ccc eee cee cece ee cee aaan araa 3 1 3
261. t to the RADIUS server with an identity of Anonymous 7 Ifatrusted root certificate is required see the table in step 3 select it from the list of trusted root certificates If it does not appear in the list click Edit List to define the location of the trusted root certificate see Defining Trusted Root Certificates on page 102 This certificate will be used in the 802 1x setup to authenticate with a RADIUS server 8 From the RADIUS Server Verification section select one of these e Do not verify RADIUS server certificate subject name e Verify server s FQDN Enter the FQDN of the RADIUS server e Verify server s domain suffix Enter the domain name suffix of the RADIUS server 9 Click OK The 802 1x Setup window closes and the 802 1x setup is saved Intel SCS User Guide 113 Chapter 5 Defining Intel AMT Profiles 5 11 3 Defining End Point Access Control If the 802 1x profile s protocol supports End Point Access Control EAC you can use NAC NAP authentication along with the RADIUS server to authenticate the Intel AMT device EAC requires integration with Active Directory see Defining Active Directory Integration on page 90 and an Enterprise root CA To define EAC 1 From the Network Configuration window click Configure EAC The Configure End Point Access Control window opens Configure End Point Access Control Specify End Point Access Control EAC service provider details below EAC vendor NAC
262. tain You can use this parameter to automate maintenance of Intel AMT systems in your network This is possible because Intel SCS saves some configuration related data in the registry of each Intel AMT system The data is updated each time that CLI commands are used to make configuration changes on the system configuration reconfiguration maintenance and unconfiguration The data is saved in this registry key e 32 bit operating systems HKLM SOFTWARE Intel Setup and Configuration Software SystemDiscovery ConfigurationInfo e 64 bit operating systems HKLM SOFTWARE Wow6432Node Intel Setup and Configuration Software SystemDiscovery ConfigurationInfo When you use the AutoMaintain parameter 1 Intel SCS uses the data in the registry to make the decision which maintenance tasks are necessary for each Intel AMT system 2 Intel SCS automatically does only the necessary tasks that were identified in step 1 If no tasks are necessary nothing is done This table describes the registry keys and values and how they are used by the AutoMaintain parameter Table 1 3 Keys and Values used by AutoMaintain Key Value Description Certificates Contains data of up to three different certificates that were configured in the Intel AMT device The CertificateExpirationDate key contains the date when the certificate will expire If there are less than 30 days before one of these expiration dates reissue all the certificates Rei
263. tain When configuration unconfiguration is complete delete all files remaining on the Intel AMT system that were used by Intel SCS components Recommendations Related to the RCS If you install and use the RCS these standard security precautions are also recommended Because installation of any application or service is a sensitive process always try to run the installer in an isolated environment In addition before you run the installer make sure that the installer file is signed by Intel and that the digital signature is valid The log files saved by the RCS in the RCSConfServer folder are NOT encrypted These log files contain data about the network that could be collected and used by an attacker Make sure that you restrict access to this folder and the logs that it contains The RCS is only as secure as the operating system on which it is running Make sure that the operating system is always updated with the latest security updates according to the standards used in your organization for critical resources In database mode the network connection between the RCS and the database is not secured by Intel SCS Make sure that this network connection is secured according to the standards used in your organization for critical resources In database mode the database is only as secure as the RDBMS on which it is installed Make sure that the RDBMS software is always updated with the latest security updates according to the standard
264. tate when idle check box If the Intel AMT device supports this feature the device will go to sleep when there is no activity When a request arrives the device automatically wakes up The Time out if idle field defines the number of minutes the device must wait before it can go to sleep Network and Other Settings 1 In the Intel MEBX Password field enter a password for the Intel MEBX see Password Format on page 9 If the RCS detects that the current password in the Intel MEBX is the default password it will replace it with this password If the default Intel MEBX password was already replaced this password is ignored it is not set in the Intel MEBX If the Intel AMT system will be put in the Client Control mode this password will not be set in the Intel MEBxX For more information see Access to the Intel MEBX on page 14 2 Define the password of the default admin user built into each Intel AMT device e Use the following password for all systems The password you define here see Password Format on page 9 is set in all devices configured with this profile e Create a random password for each system A different random password is generated for each device e Use a Master Password to create a password for each system This option is only shown if a Digest Master Password is set in the RCS For important information about these password options see Admin Permissions in the Intel AMT Device on page 15 Intel SCS
265. tch is fixed the Host FQDN State of the system is changed to Unknown When the job is in the Completed status see Job Statuses on page 183 make sure that the mismatches were fixed You can do this by opening the List of Systems in Job window see Viewing Job Items on page 185 Each system with a Status of Completed Successfully will no longer be included in the Host FQDN Mismatch view Update the discovery data of these systems so that the RCS can change the Host FQDN State of the system to Synchronized see Detecting Host FQDN Mismatches on the previous page 7 9 Getting the Admin Password In database mode you can use the Console to send a query via the RCS to verify the Digest admin password defined in the Intel AMT device The RCS tries to connect to the device using the password defined in the database for the selected system If this fails the RCS tries the admin passwords defined in the configuration profiles If a Digest Master Password file exists the RCS will also try the passwords that the file contains If connection is successful the RCS shows the password and updates the password in the database if necessary To get the Admin password 1 2 In the Console click Monitoring and select the Systems tab Locate and select the system using the Views tab or the Search tab Data for the selected system is shown in the bottom section of the window Right click the system and select Get Configured Password The View Sy
266. ted network settings file Intel SCS User Guide 121 Chapter 5 Defining Intel AMT Profiles 4 Inthe DNS section define how Intel AMT 6 0 and higher will update the Domain Name System DNS with the FQDN and IP e Do not update Disables all DNS updates by the Intel AMT device e Update only via DHCP option 81 The device will use the DHCP option 81 to request that the DHCP server update the DNS on its behalf On Intel AMT 6 x and 7 x systems Intel SCS only supports this option on the latest firmware versions e Update the DNS directly or via DHCP option 81 Intel AMT 6 0 and higher includes the Intel AMT Dynamic DNS Update DDNS Update Client When enabled this client can periodically update the DNS with the FQDN and IP address configured in the Intel AMT device When selected the device uses option 81 to ask the DHCP for permission to update the DNS Intel AMT will send DDNS updates based on the policy configured in the DHCP server returned in the DHCP option 81 flags All systems that have Intel AMT 5 x or lower are always configured to update the DNS via DHCP option 81 This is the only option that those versions support 5 Click OK The Network Settings window closes Intel SCS User Guide 122 Chapter 6 Using the Configurator This chapter describes how to use the Intel SCS Configurator For more information see 6 1 6 2 6 3 6 4 6 5 6 6 6 7 6 8 6 9 6 10 621 6 12 6243 6 14 6 15 6 16 6 17 6 18
267. tem and disables the Intel AMT features on the system Note e Systems in Client Control mode are always unconfigured with a Full unconfiguration e The default unconfiguration type for systems in Admin Control mode is Partial Syntax ACUConfig exe global options UnConfigure AdminPassword lt password gt RCSaddress lt RCSaddress gt Full ADOU lt ADOU path gt DomainUser lt username gt DomainUserPassword lt password gt DeleteADObjectViaRCSs WMIUser lt username gt WMIUserPassword lt password gt Note The CLI does not support passwords that start with a forward slash SourceForAMTName lt source gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt global options See CLI Global Options on page 125 AdminPassword The current password of the default Digest admin user defined in the lt password gt Intel AMT device This parameter is NOT necessary if any of these are true e The Configurator RCS can find the Digest admin password in one of the RCS profiles or using a Digest Master Password e The user account running the Configurator RCS is a Kerberos account that is configured in the Intel AMT device with administrator permissions Intel SCS User Guide 142 Chapter 6 Using the Configurator RCSaddress The IP or FQDN of the computer running the RCS RCSaddress gt For systems in Admin Control mode does a full
268. tenance operation on the systems only if they are necessary This is possible because Intel SCS saves some configuration related data in the database record of each Intel AMT system The database record is updated each time that a jobis run on the system When you use the Automatic Maintenance operation 1 The RCS uses the data in the database to make the decision which maintenance tasks are necessary for each Intel AMT system e Synchronize the clock If not synchronized for more than three months e Renew the Digest Admin password If the last renewal of the Digest Admin password was more than six months ago e Re issue certificates If there are less than 30 days before one of the certificate expiration dates e Renew AD password If the last renewal of the ADOU object password was more than six months ago 2 The RCS automatically does only the necessary tasks that were identified in step 1 If no tasks are necessary nothing is done Get Discovery Data This operation gets Intel AMT related data from the systems see Viewing Discovery Data on page 175 Fix Host FQDN Mismatch This operation fixes Host FQDN Mismatches see Detecting and Fixing Host FQDN Mismatches on page 170 Intel SCS User Guide 182 Chapter 8 Managing Jobs and Operations 8 4 Job Statuses A job can be in one of these statuses shown in the Status column of the list of jobs Scheduled The job was defined to start automatically at a specific date
269. ter The remote user cannot continue the operation until he supplies this code e Intel AMT 6 x The user consent feature is available only for KVM Redirection e Intel AMT 7 x and higher For devices in Admin Control mode you can define which operations require user consent For devices in Client Control mode user consent is mandatory for these operations e Serial Over LAN to redirect BIOS screens and OS Boot text screens e IDE Redirection IDE R e KVM Redirection e To remotely set BIOS boot options e To change the source for remote boot for example boot from PXE Intel SCS User Guide 12 Chapter 1 Introduction 1 5 7 Transport Layer Security Protocol Transport Layer Security TLS is a protocol that secures and authenticates communications across a public network Intel AMT can use these types of TLS e Pre Shared Key PSK The PSK protocol provides secure communication based on a set of PSK configuration keys that have been shared in advance between two parties using a secure channel Intel AMT can use the PSK protocol only before and during the configuration process of Intel AMT systems configured by the RCS e Public Key Infrastructure PKI The PKI protocol lets users of an unsecured network securely and privately exchange information using an asymmetric public and private cryptographic key pair The key pair is retrieved and shared through a trusted authority known as a Certification Authority CA The CA supplies
270. the FileToRun parameter is used and the control mode is Admin Control mode two scripts will run for the system Intel SCS User Guide 152 Chapter 6 Using the Configurator 6 19 4 What if a Failure Occurs Scripts that run after configuration reconfiguration maintenance and unconfiguration operations only run if the operation is successful or completes with warnings If a script fails Intel SCS does not make any changes to the Intel AMT settings set by the operation that ran before the script The ConfigAMT and the ConfigViaRCSOn1y Configurator commands include a parameter called AbortOnFailure This parameter is applicable only for systems that were unconfigured when the command started during reconfiguration this parameter is ignored If you supply this parameter Intel SCS will put the Intel AMT device in the Not Provisioned mode unconfigured if the post configuration script fails This means that if the script fails unconfigured systems that were configured successfully will be automatically unconfigured Only use this parameter if it is critical that the post configuration script will complete successfully 6 19 5 Script Runtime and Timeout The maximum permitted runtime for scripts is 60 seconds If the script does not complete within 60 seconds an error is returned The error is recorded in the log file and will contain an error code OxCO003EAA anda description like this The supplied script has not finished in
271. the Window 2003 trusted certificates store it will be necessary to install the root certificate and any intermediate certificates in the local computer store of the computer running the RCS RCSServer exe To save the root certificate 1 Retrieve the root certificate and the certificates of any intermediate CAs according to the instructions of the certificate vendor It may be possible to download them from the vendor website or the vendor may e mail the trusted root Save the certificate in cer format 2 Navigate to each stored certificate right click and select Install certificate A certificate manager Import Wizard opens oY ee Click Next Select Automatically select the certificate store based on the type of the certificate and click OK Click Next then Finish When prompted if you want to add the certificate to the root store click Yes 10 5 Creating and Installing Your Own Certificate These section describes how you can install your own certificate to enable remote configuration 10 5 1 Creating a Certificate Template This procedure describes how to create a remote configuration certificate To create the certificate template 1 From your Certificate Authority server select Start gt Run The Run window opens 2 Enter mmc and click OK The Microsoft Management Console window opens 3 Ifthe Certificate Templates plug in is not installed perform these steps a b Select File gt Add Remove Snap i
272. the Active Directory Builtin folder Instead either add the required users individually or create and add a new group containing the users 3 From the Access Type drop down list specify an access type This parameter defines the locations from where the user is allowed to do an action A user might be limited to local actions or might also be able to do actions from the network Select one of these e Local The user can access the Intel AMT system only via the local host e Remote The user can execute an action only via the network e Both The user can execute an action either locally or from the network Intel SCS User Guide 94 Chapter 5 Defining Intel AMT Profiles 4 From the Realms section select the check boxes of the realms that you want to make available to this user The realms define specific functional capabilities as described in this table Note that not all realms are available on all versions of Intel AMT Table 5 1 Intel AMT Realms Realm Capabilities Redirection Enables and disables the redirection capability and retrieves the redirection log PT Administration Manages security control data such as Access Control Lists Kerberos parameters Transport Layer Security Configuration parameters power saving options and power packages A user with PT Administration Realm privileges has access to all realms Note If this user will be used to run the Configurator to do host based configuration the Access Type
273. the RCS RCSUserWinAuth Defines the type of authentication used by the RCS to authenticate with the database Valid values e 0 SQL Server authentication e 1 Windows authentication RCSUsername The name of the user account to be used by the RCS to authenticate with the database e If RCSUserWinAuth 0 This will be the Login ID used by the RCS during SQL Server authentication If the Login ID does not exist it will be created by the Database Tool e If RCSUserWinAuth 1 This will be the Domain user account under which the RCS will run You must make sure that you specify the same name when you install the RCS in the Database Settings window Note If RCSUserWinAuth 1 and you are using the Network Service account the format of the username depends on where the RCS and database are located For more information see Using the Network Service Account on page 35 RCSPassword The password of the user account to be used by the RCS to authenticate with the database Only necessary if RCSUserWinAuth 0 Examples Example 1 Adding a user to a database on the local SQL Server DatabaseTool exe AddUser DBServer local DBName TestDB RCSUserWinAuth 1 RCSUsername MyRCSUser Example 2 Adding a user to a database on a remote SQL Server DatabaseTool exe AddUser DBServer 192 168 1 10 DBName TestDB RCSUserWinAuth 1 RCSUsername MyRCSUser Example 3 Adding the Network Service user RCS is local on SQL Serve
274. this option the DNS must be configured correctly with Reverse Lookup Zones e Get the FQDN from the dedicated network settings file If you select a dedicated network settings file as the source for the FQDN or IP e Make sure that the file contains only the settings FQDN IP that you want to supply using the file For information about the format and tags of the XML file see the NetworkSettings xml example file located in the sample files folder e Do not forget to supply the path to the file using the NetworkSettingsFile parameter of the Configurator CLI command 2 Optional Intel AMT 6 0 and higher includes a setting called Shared FQDN This setting can change the behavior of the Intel AMT device when using option 81 of the DHCP server to update DNS e When this setting is true the Intel AMT device will send broadcast queries only when the operating system is not running This is the default behavior of all Intel AMT versions that do not support the Shared FQDN setting e When false the device will always send its own broadcast queries even when the operating system is running For Intel AMT 6 0 and higher devices that will be configured with a dedicated FQDN clear this check box The device and the OS will have the same FQDN Shared FQDN 3 From the IP section select the source for the IP settings e Get the IP from the DHCP server e Use the same IP as the host for static IP only e Get the IP from the dedica
275. ting system The suffix is the Primary DNS Suffix from the host operating system If this default is not correct for your network change the setting in the configuration profile For information about the available settings see Defining IP and FQDN Settings on page 120 How does your network assign Internet Protocol IP addresses On an Intel AMT system the host platform and the Intel AMT device both have an IP address These IP addresses are usually the same but they can be different Intel SCS configures the IP address of the Intel AMT device By default Intel SCS configures the Intel AMT device to get the IP address from a DHCP server If this default is not correct for your network change the setting in the configuration profile For information about the available settings see Defining IP and FQDN Settings on page 120 Domains Do you want to limit access to Intel AMT based on domain location Intel AMT includes an option to limit access to the Intel AMT device based on the location of the host system If you want to use this option you must define a list of trusted domains When the host system is not located in one of the domains in the list access to the Intel AMT device is blocked The list of domains is defined in the Home Domains window of the configuration profile see Defining Home Domains on page 97 Note e Ifyou use this option make sure that you have a complete and accurate list of all the domains where the h
276. tion Software SystemDiscovery This command is just one of the discovery options included with Intel SCS For more information see What are the Discovery Options on page 3 Note e Onsystems that do not have Intel AMT this command gets data from the host platform only For information about the data that is collected refer to the Intel R _ SCS_Discovery pdf locatedin the SCS Discovery folder Syntax ACUConfig exe global options SystemDiscovery lt filename gt NoFile NoRegistry ReportToRCs AdminPassword lt password gt RCSaddress lt RCSaddress gt WMIUser lt username gt WMIUserPassword lt password gt Note The CLI does not support passwords that start with a forward slash SourceForAMTName lt source gt NetworkSettingsFile lt file gt RCSBusyRetryCount lt retries gt Intel SCS User Guide 126 Chapter 6 Using the Configurator Parameters global options See CLI Global Options on page 125 lt filename gt By default the name of the XML file is the FQDN of the system and it is saved in the same folder as the Configurator You can change this default name and location by supplying the lt filename gt parameter Example ACUConfig exe SystemDiscovery C MyXMLFile xml This example creates an XML file named MyXMLFile in the root of C In addition a log file is created see Configurator Log Files on page 125 NoFile Do not save data in an XML fi
277. tion Invalid data in the profile Failed to move the Intel AMT device to Admin Control mode Failed to get the FQDN Failed to verify the signature of the file supplied in the FileToRun parameter To cancel this verification run the command using the LowSecurity global option 8 The requested operation was aborted because required file access failed The file supplied in the FileToRun parameter is not located in a trusted location To cancel this prerequisite run the command using the LowSecurity global option Failed to get the Digest admin password to put in the Intel AMT device calculated by the RCS using the Digest Master Password Failed to get the Digest admin password that is configured in the Intel AMT device Failed to send the Hello Message to the RCS Failed to submit the certificate request to the Certification Authority Failed to get the certificate Failed to generate a TLS PSK Pair Failed to generate the PKCS10 request Failed to get the FQDN of the Intel AMT device Failed to get the IP address of the Intel AMT device Failed to get the UUID of the Intel AMT device 100 Failed to get the FQDN and the IP address of the Intel AMT device 101 The remote configuration operation completed but with warnings 102 Failed to retrieve the PID from this Intel AMT device 103 The requested functionality is not supported on this operating system 104 Failed to renew the Digest admin password in the Intel AMT device
278. trol mode option in the Intel AMT device see Control Modes on page 12 After running this command the device cannot be changed back to the Client Control mode After you run this command e Client Control mode can only be re enabled from the BIOS of the computer Either by resetting the BIOS or using a manufacturer provided BIOS menu command to re enable the option Future configuration methods on an unconfigured device can only put the device in Admin Control mode e The control mode and configuration status of a device that is already configured is not changed You cannot use this command on a system that is configured in Admin Control mode e Reconfiguration of a configured device does not change the control mode ACUConfig exe global options DisableClientControlMode Parameters global options See CLI Global Options on page 125 6 17 Sending a Hello Message Description Sends a Hello message to the RCS This option is only relevant if you want to use scripts to configure the system see Remote Configuration Using Scripts on page 210 ACUConfig exe global options SendHello lt RCSaddress gt lt port gt Parameters global options See CLI Global Options on page 125 lt RCSaddress gt The IP or FQDN of the computer running the RCS lt port gt The port number used by the RCS to listen for Hello messages If not supplied the message is sent to the default port 9971 Intel SCS User Guide 147
279. ts authentication of the digital signature can increase the configuration time by up to two minutes Intel SCS User Guide 10 1 5 Chapter 1 Introduction 4 Recommendations for Secure Deployment Intel recommends these standard security precautions Recommendations Related to the Configurator Intel SCS uses XML files for some of the configuration methods These XML files can include passwords and data that persons without approval must not access When using the Configurator and XML files use these standard security precautions Encrypt all the XML files that the Configurator will use Use a strong password with a minimum of 16 characters see File Encryption on page 9 Make sure that deployment packages and the encryption password are stored in a location that only approved personnel can access Send deployment packages to the Intel AMT systems with a communication method that prevents access to persons without approval Always use the default requirement for digital signature authentication when using the Configurator CLI remotely see Digital Signing of Files on the previous page If the Configurator will need to communicate with a CA or create an AD object give permissions only to the specific CA template or the specific Active Directory Organizational Unit XML files created using the Discovery options are not encrypted Make sure that you delete these files on the Intel AMT systems after collecting the data that they con
280. ttings Application Data Intel_ Corporation In Windows explorer the user profile directory of the Network Service account remains hidden even if you select to show all hidden files and folders If you want to view this directory you must specifically type the name networkservice in the explorer e Windows 6 x Windows ServiceProfiles NetworkService AppData Local Intel_Corporation 3 9 1 Location of RCS Log Files The log files of the RCS are located in a folder named RCSConfServer in one of these hidden locations e ProgramData Intel_Corporation e Documents and Settings All Users Application Data Intel_Corporation The log file is named RCSLog 1og and records all operations and actions done by the RCS Each time the log file becomes too large or the RCS is restarted the file content is moved to a new file with this format RCSLog LogYYYY MM DD HH MI SS 1log Intel SCS User Guide 50 Chapter 3 Setting up the RCS 3 10 Modifying an Existing Installation This section describes how to modify an existing installation 3 10 1 Removing Adding Components This procedure describes how remove or add components to an existing installation To add remove components 1 Double click IntelSCSInstaller exe Note You can also modify uninstall from the Add or Remove Programs option of the Control Panel The Welcome window opens E Intel SCS Installer Welcome to the Intel Setup and Configuration Software Intel SCS inst
281. u can only delete a job if it is in a status of Scheduled Waiting Completed or Aborted View the systems in a job see Viewing Job Items on page 185 DE Start a manual job selected in the list see Starting Aborting and Deleting Jobs on page 187 a Abort the job selected in the list Intel SCS User Guide 179 Chapter 8 Managing Jobs and Operations 8 2 Viewing the List of Jobs The number of systems in a job and the status of the systems is shown in the columns of the jobs list These columns are automatically updated to show the current status of the job and the systems You can show hide columns by right clicking the column header and selecting the columns that you want to show Table 8 2 Available Data in the Jobs List Column Description Waiting for Retry The number of systems on which the operation could not run and the RCS is waiting to retry the operation The RCS includes an automatic retry mechanism for job operations e Retry 5 times each after a pause of 1 minute e Then retry 5 more times each after a pause of 1 hour e Then retry 5 more times each after a pause of 24 hours After 15 unsuccessful retry attempts the system is added to the total number of systems in the Failed column In Operation The number of systems on which the job is currently running Aborted The number of systems on which the operation was not run because the job was aborted Intel SCS User Guide 180 C
282. u installed the previous version of Intel SCS 13 Click Upgrade The upgrade starts and the Upgrade Progress window opens When the upgrade finishes the Next button is enabled 14 Click Next A window opens with information about the success or failure of the upgrade 15 Click Finish The installer closes Intel SCS User Guide 64 Chapter 3 Setting up the RCS 3 12 Silent Installation Intel SCS includes an additional installation file Intel1SCSInstaller msi This file is based on the Windows Installer CLI and uses the commands available in the standard installation mode You can use this file to silently install upgrade the RCS and the Console using a script The Windows Installer CLI is case sensitive This table describes the options available Table 3 1 Silent Install Options Command Property Description Create a verbose log file where lt filename gt is the name of the log file You must supply one of these commands ADDLOCAL Install the component s Valid values e All RCS and Console e Service RCS only e Console Console only Uninstall the component s Valid values e All RCS and Console e Service RCS only e Console Console only Upgrade the installed components RCS Console from version 8 x to version 9 0 Valid values e 1 Upgrade the components Note e Before using this command make sure that you understand the upgrade process and prerequisites see Upgrading Intel SC
283. umn header and selecting the columns You can also sort the contents of the list by double clicking a column header You can do this for lists created using the Views tab and the Search tab This table describes the available data Table 7 3 Available Data Column Description Active Directory OU The Organizational Unit in Active Directory where the object representing the Intel AMT system is located The Stock Keeping Unit Connection Status Defines if the RCS can connect to the Intel AMT device Last Connection The last date and time that the RCS successfully connected to the Intel AMT device Time Last Configuration The last date and time that the Intel AMT device was configured by the RCS Time Managed State See Changing the Managed State of Systems on the next page Intel AMT FQDN See Detecting and Fixing Host FQDN Mismatches on page 170 Intel SCS User Guide 168 Chapter 7 Monitoring Systems 7 7 Changing the Managed State of Systems Each Intel AMT system stored in the database can be in one of these managed states e Managed In this state you can use all the options available from the Console e Unmanaged In this state you can only view the system in the Console You cannot include it in a job get the password or run data discovery from the Console Before you can use the Console options you must change the managed state of the system to Managed To change the management state 1 Inthe Console click Monitorin
284. under this account the RCS communicates on the network using the credentials of the computer running the RCS This can increase security because it is not easy for attackers to impersonate a computer These sections describe special considerations when using the Network Service account Installing Certificates in the Certificate Store If you want to use the remote configuration method or configure Mutual TLS it is necessary to install certificates in the Certificate Store When using the Network Service account these certificates must be installed in the certificate store of the Network Service To do this you can use the RCSUtils exe utility located in the Utils folder For example RCSutils exe Certificate Add c certificate pfx P ssw0rd where certificate pfx is the certificate file in PFX format and P sswO0rd is the password that was used to encrypt the certificate PFX file For more information refer tothe Intel R SCS RCSUtility pdf also located in the Utils folder Active Directory and Certification Authority Permissions Some Intel SCS features and options use the RCS to communicate with the Active Directory or the Certification Authority in your network Thus the RCS requires permissions on the AD and the CA The Network Service is a local account on the computer running the RCS This means that when you assign these permissions you must give them to the computer object representing the computer running the RCS Installi
285. version 6 2 is deprecated You can still use Intel SCS 9 0 to configure Intel AMT 6 1 and lower But Intel SCS 9 0 was not validated on these versions and thus the results cannot be guaranteed Support agreements for Intel SCS 9 0 do not include support for issues related to versions of Intel AMT lower than version 6 2 The information in this guide related to these versions is provided for informational purposes only Intel SCS User Guide 28 Chapter 2 Prerequisites 2 3 Supported Operating Systems This table describes on which operating systems the Intel SCS components of this release were validated Table 2 1 Supported Operating Systems Version Configurator Windows XP Professional x32 x64 SP3 Yes Windows 7 Professional x32 x64 Yes Windows 7 Enterprise x32 x64 SP1 Yes Windows 8 PRO x32 x64 Yes Windows 8 1 PRO x32 x64 Yes Windows Server 2012 Windows Server 2008 x32 64 SP2 Windows Server 2008 R2 SP2 Windows Server 2003 x64 SP2 Windows Server 2003 R2 Additional Requirements e The Console requires version 3 5 of Microsoft NET Framework SP1 to be installed on the computer This is also a requirement when using the IntelSCSInstaller exe file to install the RCS or the Console If you cannot install this version you can use the IntelSCSInstaller msi file to do a Silent install e Ifyou are installing the RCS in database mode the Microsoft SQL Server Native Client must be installed on the computer
286. very a hours zj Management Presence Server Preferred Server Available Servers fabe com 80 gt Alternative Server l Figure 5 11 Remote Access Policy Window 2 Inthe Policy Name field enter a descriptive name for the policy 3 Inthe Tunnel Lifetime Limit field enter an interval in minutes When there is no activity in an established tunnel for this period of time the Intel AMT device will close the tunnel Selecting No Limit means the tunnel will not time out but will stay open until it is closed by the user or when a different policy with higher priority needs to be processed Intel SCS User Guide 101 Chapter 5 Defining Intel AMT Profiles 4 Inthe Trigger section select the trigger or triggers for this policy e Fast Call For Help The Intel AMT device establishes a tunnel with the MPS when the user initiates a connection request If required you can limit when the user can access this option only from the operating system or only from the BIOS By default both options are available to the user e Alerts The device establishes a connection when an event occurs that generates an alert addressed to the network interface e Scheduled maintenance every The device connects to the MPS based on the number of hours minutes or seconds defined here Note A policy can include one or more triggers but two different policies cannot contain the same trigger 5 Inthe Management Presence Serve
287. y configured when the end user wants to start using its features Some Intel SBA features can configure and define settings in the Intel ME just like Intel AMT For more information about Intel SBA see http www intel com go sba index htm Some Intel vPro platforms can support both Intel SBA and Intel AMT When Intel vPro platforms are configured by Intel SBA the functionality of Intel AMT is not activated Intel AMT is activated by configuring the computer using Intel SCS On these supported platforms you have two choices Uninstall Intel SBA Prevent your users access to Intel SBA functionality To do this you must uninstall Intel SBA Integrate with Intel SBA Allow your users to continue using Intel SBA functionality after Intel AMT is configured Important Information About Integration e To detect if Intel SBA is installed you can use the SystemDiscovery CLI command of the Configurator see Discovering Systems on page 126 Data about Intel SBA is located in the SBAServiceInfo section of the discovery data output e The integration option is supported only by the host based configuration methods available in Intel SCS ConfigAMT and MaintainAMT If Intel SBA is installed these methods will automatically try to integrate with Intel SBA During integration Intel SCS takes control of the Intel ME from Intel SBA To do this Intel SCS creates a special Digest user account for Intel SBA This user acc
288. y in the Intel AMT device is done locally by the Configurator Intel AMT 6 2 and higher only 7 By default Intel AMT 6 2 and higher devices are put in the Client Control mode see Control Modes on page 12 If you need to remove the restrictions of Client Control mode select Put locally configured devices in Admin Control mode If you select this check box the devices are put in Admin Control mode This setting is ignored for Intel AMT versions earlier than 6 2 Intel SCS User Guide 80 Chapter 4 Using the Console 4 6 Defining Manual Configuration Multiple Systems You can prepare a USB key with identical configuration settings to use with multiple Intel AMT systems When the systems are rebooted with the USB key Intel AMT is configured on them e This option is available only for systems with Intel AMT 6 0 and higher For other Intel AMT systems you must prepare a new USB key for each system see SMB Manual Configuration on page 5 e Intel SCS does not restrict the size of USB key you can use But the computer BIOS must fully support the selected USB key and be able to boot from it To prepare the USB key 1 Puta USB key in the computer 2 Select Tools gt Prepare a USB Key for Manual Configuration The Settings for Manual Configuration of Multiple Systems window opens E Settings for Manual Configuration of Multiple Systems zoi x Specify the type of systems for which to create the configuration USB key Mob
289. you can either e Manually stop the Windows service named RCSServer and change the Startup Type to Disabled It is not necessary to close the installer OR e Click Disable RCS to let the installer attempt to stop and then disable the RCS When the installer detects that the RCS is disabled a message is shown and the Next button is enabled Intel SCS User Guide 62 Chapter 3 Setting up the RCS 7 Click Next The Database Settings window opens This window shows the location of the database that will be upgraded xl Database Settings intel This is the database to which this RCS is connected SQL Server local SQL Database Name IntelSCS Specify how the RCS will authenticate with the database Windows Authentication using account EXAMPLE administrator O SQL Server Authentication Login ID Password Figure 3 17 Database Settings Window 8 Specify the authentication method that the RCS version 9 0 will use after upgrade e Windows Authentication e SQL Server Authentication If you select this option enter the Login ID and the password of the SQL Server account The account that you specify MUST have a password SQL Server authentication using an account without a password is not supported For more information see RCS User Permissions in SQL Server on page 37 9 Click Next The installer connects to the database and checks the database version e If you have not upgraded the databas
290. yption Key Management Protocol WiFi Protected Access WPA ba Encryption Algorithm Temporal Key Integrity Protocol TKIP x Authentication C Passphrase Confirm Passphrase 302 1x Setup Figure 5 18 WiFi Setup Window 2 Inthe Setup Name field enter a name for the WiFi setup The setup name can be up to 32 characters and must not contain lt gt characters 3 Inthe SSID field enter the Service Set Identifier up to 32 characters that identifies the specific WiFi network If left empty the device will try to connect to all WiFi networks that use Data Encryption as defined in this WiFi Setup 4 From the Key Management Protocol drop down list select one of these e WiFi Protected Access WPA e Robust Security Network RSN 5 From the Encryption Algorithm drop down list select one of these e Temporal Key Integrity Protocol TKIP e Counter mode CBC MAC Protocol CCMP 6 Inthe Authentication section select one of these e Passphrase Enter a Passphrase for the WiFi setup The Passphrase must contain between 8 and 63 printable ASCII characters e 802 1x Setup From the drop down list select the 802 1x setup to use in this WiFi setup Optionally you can also edit an existing 802 1x setup by clicking Edit or create a new 802 1x setup by clicking Add see Creating 802 1x Setups on the next page 7 Click OK The WiFi setup window closes and the setup is added to the list Intel SCS

Download Pdf Manuals

image

Related Search

Related Contents

VAM  Le mangeur / L`avenir archaïque de la gastronomie  Cisco Systems OL-18613-01 User's Manual  User Guide - University of Tasmania  CoolIT Domino A.L.C.    「船舶の低炭素化等推進セミナ…」 の開催について く周知依頼) も票記  Poudre de sol pour BLATTES, CAFARDS, CANCRELATS  Manuel d`utilisation  installation guide  

Copyright © All rights reserved.
Failed to retrieve file