<s>
Intel	B-Application
Active	I-Application
Management	I-Application
Technology	I-Application
(	O
AMT	O
)	O
is	O
hardware	O
and	O
firmware	B-Application
for	O
remote	O
out-of-band	B-Application
management	I-Application
of	O
select	O
business	O
computers	O
,	O
running	O
on	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
,	O
a	O
microprocessor	O
subsystem	O
not	O
exposed	O
to	O
the	O
user	O
,	O
intended	O
for	O
monitoring	O
,	O
maintenance	O
,	O
updating	O
,	O
and	O
repairing	O
systems	O
.	O
</s>
<s>
Out-of-band	B-Protocol
(	O
OOB	O
)	O
or	O
hardware-based	O
management	O
is	O
different	O
from	O
software-based	O
(	O
or	O
in-band	O
)	O
management	O
and	O
software	B-Application
management	O
agents	O
.	O
</s>
<s>
Hardware-based	O
management	O
works	O
at	O
a	O
different	O
level	O
from	O
software	B-Application
applications	O
,	O
and	O
uses	O
a	O
communication	O
channel	O
(	O
through	O
the	O
TCP/IP	B-Protocol
stack	I-Protocol
)	O
that	O
is	O
different	O
from	O
software-based	O
communication	O
(	O
which	O
is	O
through	O
the	B-Application
software	I-Application
stack	O
in	O
the	O
operating	O
system	O
)	O
.	O
</s>
<s>
Hardware-based	O
management	O
has	O
been	O
available	O
on	O
Intel/AMD	O
based	O
computers	O
in	O
the	O
past	O
,	O
but	O
it	O
has	O
largely	O
been	O
limited	O
to	O
auto-configuration	O
using	O
DHCP	B-Protocol
or	O
BOOTP	B-Device
for	O
dynamic	B-Protocol
IP	I-Protocol
address	I-Protocol
allocation	I-Protocol
and	O
diskless	B-Device
workstations	I-Device
,	O
as	O
well	O
as	O
wake-on-LAN	B-Protocol
(	O
WOL	B-Protocol
)	O
for	O
remotely	O
powering	O
on	O
systems	O
.	O
</s>
<s>
AMT	O
is	O
not	O
intended	O
to	O
be	O
used	O
by	O
itself	O
;	O
it	O
is	O
intended	O
to	O
be	O
used	O
alongside	O
a	O
software	B-Application
management	O
application	O
.	O
</s>
<s>
AMT	O
is	O
designed	O
into	O
a	O
service	O
processor	B-General_Concept
located	O
on	O
the	O
motherboard	O
,	O
and	O
uses	O
TLS-secured	O
communication	O
and	O
strong	O
encryption	O
to	O
provide	O
additional	O
security	O
.	O
</s>
<s>
AMT	O
is	O
built	O
into	O
PCs	O
with	O
Intel	B-Architecture
vPro	I-Architecture
technology	I-Architecture
and	O
is	O
based	O
on	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
(	O
ME	O
)	O
.	O
</s>
<s>
AMT	O
has	O
moved	O
towards	O
increasing	O
support	O
for	O
DMTF	O
Desktop	O
and	O
mobile	O
Architecture	O
for	O
System	O
Hardware	O
(	O
DASH	O
)	O
standards	O
and	O
AMT	B-Device
Release	I-Device
5.1	O
and	O
later	O
releases	O
are	O
an	O
implementation	O
of	O
DASH	O
version	O
1.0/1.1	O
standards	O
for	O
out-of-band	B-Application
management	I-Application
.	O
</s>
<s>
Currently	O
,	O
AMT	O
is	O
available	O
in	O
desktops	O
,	O
servers	O
,	O
ultrabooks	O
,	O
tablets	O
,	O
and	O
laptops	O
with	O
Intel	B-Device
Core	I-Device
vPro	B-Architecture
processor	B-General_Concept
family	O
,	O
including	O
Intel	B-Device
Core	I-Device
i5	O
,	O
Core	O
i7	O
,	O
Core	O
i9	O
and	O
Intel	O
Xeon	O
E3-1000	O
,	O
Xeon	O
E	O
,	O
Xeon	O
W-1000	O
product	O
family	O
.	O
</s>
<s>
AMT	O
also	O
requires	O
an	O
Intel	O
networking	O
card	O
and	O
the	O
corporate	O
version	O
of	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
binary	O
.	O
</s>
<s>
Every	O
Intel	O
platform	O
with	O
either	O
Intel	O
Standard	O
Manageability	O
,	O
Active	B-Application
Management	I-Application
Technology	I-Application
,	O
or	O
Small	O
Business	O
Technology	O
,	O
from	O
Nehalem	B-Device
in	O
2008	O
to	O
Kaby	B-Device
Lake	I-Device
in	O
2017	O
has	O
a	O
remotely	O
exploitable	O
security	O
hole	O
in	O
the	O
ME	O
.	O
</s>
<s>
Some	O
manufacturers	O
,	O
like	O
Purism	O
and	O
System76	O
are	O
already	O
selling	O
hardware	O
with	O
Intel	B-Device
Management	I-Device
Engine	I-Device
disabled	O
to	O
prevent	O
the	O
remote	O
exploit	O
.	O
</s>
<s>
Additional	O
major	O
security	O
flaws	O
in	O
the	O
ME	O
affecting	O
a	O
very	O
large	O
number	O
of	O
computers	O
incorporating	O
Management	B-Device
Engine	I-Device
,	O
Trusted	B-Device
Execution	I-Device
Engine	I-Device
,	O
and	O
Server	B-Device
Platform	I-Device
Services	I-Device
firmware	B-Application
,	O
from	O
Skylake	B-Architecture
in	O
2015	O
to	O
Coffee	B-Device
Lake	I-Device
in	O
2017	O
,	O
were	O
confirmed	O
by	O
Intel	O
on	O
November	O
20	O
,	O
2017	O
(	O
SA-00086	O
)	O
.	O
</s>
<s>
Although	O
iAMT	B-Application
may	O
be	O
included	O
for	O
free	O
in	O
devices	O
sold	O
to	O
the	O
public	O
and	O
to	O
small	O
businesses	O
,	O
the	O
full	O
capabilities	O
of	O
iAMT	B-Application
,	O
including	O
encrypted	O
remote	O
access	O
via	O
a	O
public	B-Application
key	I-Application
certificate	O
and	O
automatic	O
remote	O
device	O
provisioning	O
of	O
unconfigured	O
iAMT	B-Application
clients	O
,	O
are	O
not	O
accessible	O
for	O
free	O
to	O
the	O
general	O
public	O
or	O
to	O
the	O
direct	O
owners	O
of	O
iAMT	B-Application
equipped	O
devices	O
.	O
</s>
<s>
iAMT	B-Application
cannot	O
be	O
fully	O
utilized	O
to	O
its	O
maximum	O
potential	O
without	O
purchasing	O
additional	O
software	B-Application
or	O
management	O
services	O
from	O
Intel	O
or	O
another	O
3rd	B-General_Concept
party	I-General_Concept
independent	B-Application
software	I-Application
vendor	I-Application
(	O
ISV	O
)	O
or	O
value	O
added	O
reseller	O
(	O
VAR	O
)	O
.	O
</s>
<s>
Intel	O
itself	O
provides	O
a	O
developer	O
's	O
toolkit	O
software	B-Application
package	O
which	O
allows	O
basic	O
access	O
to	O
iAMT	B-Application
,	O
but	O
is	O
not	O
intended	O
to	O
be	O
normally	O
used	O
to	O
access	O
the	O
technology	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
includes	O
hardware-based	O
remote	O
management	O
,	O
security	O
,	O
power	O
management	O
,	O
and	O
remote	O
configuration	O
features	O
that	O
enable	O
independent	O
remote	O
access	O
to	O
AMT-enabled	O
PCs	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
is	O
security	O
and	O
management	O
technology	O
that	O
is	O
built	O
into	O
PCs	O
with	O
Intel	B-Architecture
vPro	I-Architecture
technology	I-Architecture
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
uses	O
a	O
hardware-based	O
out-of-band	B-Protocol
(	O
OOB	O
)	O
communication	O
channel	O
that	O
operates	O
regardless	O
of	O
the	O
presence	O
of	O
a	O
working	O
operating	O
system	O
.	O
</s>
<s>
The	O
communication	O
channel	O
is	O
independent	O
of	O
the	O
PC	O
's	O
power	O
state	O
,	O
the	O
presence	O
of	O
a	O
management	O
agent	O
,	O
and	O
the	O
state	O
of	O
many	O
hardware	O
components	O
such	O
as	O
hard	B-Device
disk	I-Device
drives	I-Device
and	O
memory	B-Architecture
.	O
</s>
<s>
Other	O
features	O
require	O
the	O
PC	O
to	O
be	O
powered	O
up	O
(	O
such	O
as	O
console	O
redirection	O
via	O
serial	B-General_Concept
over	I-General_Concept
LAN	I-General_Concept
(	O
SOL	B-General_Concept
)	O
,	O
agent	O
presence	O
checking	O
,	O
and	O
network	B-Protocol
traffic	I-Protocol
filtering	O
)	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
has	O
remote	O
power-up	O
capability	O
.	O
</s>
<s>
Encrypted	O
,	O
remote	O
communication	O
channel	O
for	O
network	B-Protocol
traffic	I-Protocol
between	O
the	O
IT	O
console	O
and	O
Intel	B-Application
AMT	I-Application
.	O
</s>
<s>
Ability	O
for	O
a	O
wired	O
PC	O
(	O
physically	O
connected	O
to	O
the	O
network	O
)	O
outside	O
the	O
company	O
's	O
firewall	B-Application
on	O
an	O
open	O
LAN	B-General_Concept
to	O
establish	O
a	O
secure	O
communication	O
tunnel	O
(	O
via	O
AMT	O
)	O
back	O
to	O
the	O
IT	O
console	O
.	O
</s>
<s>
Examples	O
of	O
an	O
open	O
LAN	B-General_Concept
include	O
a	O
wired	O
laptop	O
at	O
home	O
or	O
at	O
an	O
site	O
that	O
does	O
not	O
have	O
a	O
proxy	B-Application
server	I-Application
.	O
</s>
<s>
Remote	O
power	O
up	O
/	O
power	O
down	O
/	O
power	O
cycle	O
through	O
encrypted	O
WOL	B-Protocol
.	O
</s>
<s>
Remote	O
boot	B-Operating_System
,	O
via	O
integrated	O
device	O
electronics	O
redirect	O
(	O
IDE-R	O
)	O
.	O
</s>
<s>
Console	O
redirection	O
,	O
via	O
serial	B-General_Concept
over	I-General_Concept
LAN	I-General_Concept
(	O
SOL	B-General_Concept
)	O
.	O
</s>
<s>
Keyboard	O
,	O
video	O
,	O
mouse	O
(	O
KVM	B-Application
)	O
over	O
network	O
.	O
</s>
<s>
Hardware-based	O
filters	O
for	O
monitoring	O
packet	B-Protocol
headers	O
in	O
inbound	O
and	O
outbound	O
network	B-Protocol
traffic	I-Protocol
for	O
known	O
threats	O
(	O
based	O
on	O
programmable	O
timers	O
)	O
,	O
and	O
for	O
monitoring	O
known	O
/	O
unknown	O
threats	O
based	O
on	O
time-based	O
heuristics	B-Algorithm
.	O
</s>
<s>
Laptops	O
and	O
desktop	O
PCs	O
have	O
filters	O
to	O
monitor	O
packet	B-Protocol
headers	O
.	O
</s>
<s>
Desktop	O
PCs	O
have	O
packet-header	O
filters	O
and	O
time-based	O
filters	O
.	O
</s>
<s>
Persistent	O
event	O
log	O
,	O
stored	O
in	O
protected	O
memory	B-Architecture
(	O
not	O
on	O
the	O
hard	B-Device
drive	I-Device
)	O
.	O
</s>
<s>
Access	O
(	O
preboot	O
)	O
hardware	O
asset	O
information	O
,	O
such	O
as	O
a	O
component	O
's	O
manufacturer	O
and	O
model	O
,	O
which	O
is	O
updated	O
every	O
time	O
the	O
system	O
goes	O
through	O
power-on	B-Device
self-test	I-Device
(	O
POST	O
)	O
.	O
</s>
<s>
Access	O
(	O
preboot	O
)	O
to	O
third-party	O
data	O
store	O
(	O
TPDS	O
)	O
,	O
a	O
protected	O
memory	B-Architecture
area	O
that	O
software	B-Application
vendors	O
can	O
use	O
,	O
in	O
which	O
to	O
version	O
information	O
,	O
.DAT	O
files	O
,	O
and	O
other	O
information	O
.	O
</s>
<s>
Remote	O
configuration	O
options	O
,	O
including	O
certificate-based	O
zero-touch	O
remote	O
configuration	O
,	O
USB	B-Protocol
key	O
configuration	O
(	O
light-touch	O
)	O
,	O
and	O
manual	O
configuration	O
.	O
</s>
<s>
Laptops	O
with	O
AMT	O
also	O
include	O
wireless	B-Architecture
technologies	O
:	O
</s>
<s>
Software	B-Application
updates	O
provide	O
upgrades	O
to	O
the	O
next	O
minor	O
version	O
of	O
Intel	B-Application
AMT	I-Application
.	O
</s>
<s>
New	O
major	O
releases	O
of	O
Intel	B-Application
AMT	I-Application
are	O
built	O
into	O
a	O
new	O
chipset	B-Device
,	O
and	O
are	O
updated	O
through	O
new	O
hardware	O
.	O
</s>
<s>
Almost	O
all	O
AMT	O
features	O
are	O
available	O
even	O
if	O
the	O
PC	O
is	O
in	O
a	O
powered-off	O
state	O
but	O
with	O
its	O
power	O
cord	O
attached	O
,	O
if	O
the	O
operating	O
system	O
has	O
crashed	O
,	O
if	O
the	B-Application
software	I-Application
agent	O
is	O
missing	O
,	O
or	O
if	O
hardware	O
(	O
such	O
as	O
a	O
hard	B-Device
drive	I-Device
or	O
memory	B-Architecture
)	O
has	O
failed	O
.	O
</s>
<s>
The	O
console-redirection	O
feature	O
(	O
SOL	B-General_Concept
)	O
,	O
agent	O
presence	O
checking	O
,	O
and	O
network	B-Protocol
traffic	I-Protocol
filters	O
are	O
available	O
after	O
the	O
PC	O
is	O
powered	O
up	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
supports	O
these	O
management	O
tasks	O
:	O
</s>
<s>
Remote	O
boot	B-Operating_System
the	O
PC	O
by	O
remotely	O
redirecting	O
the	O
PC	O
's	O
boot	B-Operating_System
process	I-Operating_System
,	O
causing	O
it	O
to	O
boot	B-Operating_System
from	O
a	O
different	O
image	O
,	O
such	O
as	O
a	O
network	B-General_Concept
share	I-General_Concept
,	O
bootable	B-Operating_System
CD-ROM	B-Device
or	O
DVD	O
,	O
remediation	O
drive	O
,	O
or	O
other	O
boot	B-Operating_System
device	O
.	O
</s>
<s>
This	O
feature	O
supports	O
remote	O
booting	B-Operating_System
a	O
PC	O
that	O
has	O
a	O
corrupted	O
or	O
missing	O
OS	O
.	O
</s>
<s>
Remotely	O
redirect	O
the	O
system	O
's	O
I/O	O
via	O
console	O
redirection	O
through	O
serial	B-General_Concept
over	I-General_Concept
LAN	I-General_Concept
(	O
SOL	B-General_Concept
)	O
.	O
</s>
<s>
This	O
feature	O
supports	O
remote	O
troubleshooting	O
,	O
remote	O
repair	O
,	O
software	B-Application
upgrades	O
,	O
and	O
similar	O
processes	O
.	O
</s>
<s>
Access	O
and	O
change	O
BIOS	B-Operating_System
settings	I-Operating_System
remotely	O
.	O
</s>
<s>
This	O
feature	O
supports	O
full	O
BIOS	B-Operating_System
updates	O
,	O
not	O
just	O
changes	O
to	O
specific	O
settings	O
.	O
</s>
<s>
Detect	O
suspicious	O
network	B-Protocol
traffic	I-Protocol
.	O
</s>
<s>
In	O
laptop	O
and	O
desktop	O
PCs	O
,	O
this	O
feature	O
allows	O
a	O
sys-admin	O
to	O
define	O
the	O
events	O
that	O
might	O
indicate	O
an	O
inbound	O
or	O
outbound	O
threat	O
in	O
a	O
network	B-Protocol
packet	I-Protocol
header	O
.	O
</s>
<s>
In	O
desktop	O
PCs	O
,	O
this	O
feature	O
also	O
supports	O
detection	O
of	O
known	O
and/or	O
unknown	O
threats	O
(	O
including	O
slow	O
-	O
and	O
fast-moving	O
computer	O
worms	O
)	O
in	O
network	B-Protocol
traffic	I-Protocol
via	O
time-based	O
,	O
heuristics-based	O
filters	O
.	O
</s>
<s>
Network	B-Protocol
traffic	I-Protocol
is	O
checked	O
before	O
it	O
reaches	O
the	O
OS	O
,	O
so	O
it	O
is	O
also	O
checked	O
before	O
the	O
OS	O
and	O
software	B-Application
applications	O
load	O
,	O
and	O
after	O
they	O
shut	O
down	O
(	O
a	O
traditionally	O
vulnerable	O
period	O
for	O
PCs	O
)	O
.	O
</s>
<s>
Block	O
or	O
rate-limit	O
network	B-Protocol
traffic	I-Protocol
to	O
and	O
from	O
systems	O
suspected	O
of	O
being	O
infected	O
or	O
compromised	O
by	O
computer	O
viruses	O
,	O
computer	O
worms	O
,	O
or	O
other	O
threats	O
.	O
</s>
<s>
This	O
feature	O
uses	O
Intel	B-Application
AMT	I-Application
hardware-based	O
isolation	O
circuitry	O
that	O
can	O
be	O
triggered	O
manually	O
(	O
remotely	O
,	O
by	O
the	O
sys-admin	O
)	O
or	O
automatically	O
,	O
based	O
on	O
IT	O
policy	O
(	O
a	O
specific	O
event	O
)	O
.	O
</s>
<s>
Manage	O
hardware	O
packet	B-Protocol
filters	I-Protocol
in	O
the	O
on-board	O
network	B-Protocol
adapter	I-Protocol
.	O
</s>
<s>
Automatically	O
send	O
OOB	O
communication	O
to	O
the	O
IT	O
console	O
when	O
a	O
critical	O
software	B-Application
agent	O
misses	O
its	O
assigned	O
check	O
in	O
with	O
the	O
programmable	O
,	O
policy-based	O
hardware-based	O
timer	O
.	O
</s>
<s>
Receive	O
Platform	O
Event	O
Trap	O
(	O
PET	O
)	O
events	O
out-of-band	B-Protocol
from	O
the	O
AMT	O
subsystem	O
(	O
for	O
example	O
,	O
events	O
indicating	O
that	O
the	O
OS	O
is	O
hung	O
or	O
crashed	O
,	O
or	O
that	O
a	O
password	O
attack	O
has	O
been	O
attempted	O
)	O
.	O
</s>
<s>
Access	O
a	O
persistent	O
event	O
log	O
,	O
stored	O
in	O
protected	O
memory	B-Architecture
.	O
</s>
<s>
Discovery	O
(	O
preboot	O
access	O
to	O
the	O
UUID	O
)	O
is	O
available	O
if	O
the	O
system	O
is	O
powered	O
down	O
,	O
its	O
OS	O
is	O
compromised	O
or	O
down	O
,	O
hardware	O
(	O
such	O
as	O
a	O
hard	B-Device
drive	I-Device
or	O
memory	B-Architecture
)	O
has	O
failed	O
,	O
or	O
management	O
agents	O
are	O
missing	O
.	O
</s>
<s>
Perform	O
a	O
software	B-Application
inventory	O
or	O
access	O
information	O
about	O
software	B-Application
on	O
the	O
PC	O
.	O
</s>
<s>
This	O
feature	O
allows	O
a	O
third-party	B-General_Concept
software	I-General_Concept
vendor	O
to	O
store	O
software	B-Application
asset	O
or	O
version	O
information	O
for	O
local	O
applications	O
in	O
the	O
Intel	B-Application
AMT	I-Application
protected	O
memory	B-Architecture
.	O
</s>
<s>
(	O
This	O
is	O
the	O
protected	O
third	O
party	O
data	O
store	O
,	O
which	O
is	O
different	O
from	O
the	O
protected	O
AMT	O
memory	B-Architecture
for	O
hardware	O
component	O
information	O
and	O
other	O
system	O
information	O
)	O
.	O
</s>
<s>
For	O
example	O
,	O
an	O
antivirus	B-Application
program	I-Application
could	O
store	O
version	O
information	O
in	O
the	O
protected	O
memory	B-Architecture
that	O
is	O
available	O
for	O
third-party	O
data	O
.	O
</s>
<s>
A	O
computer	B-Language
script	I-Language
could	O
use	O
this	O
feature	O
to	O
identify	O
PCs	O
that	O
need	O
to	O
be	O
updated	O
.	O
</s>
<s>
Perform	O
a	O
hardware	O
inventory	O
by	O
uploading	O
the	O
remote	O
PC	O
's	O
hardware	O
asset	O
list	O
(	O
platform	O
,	O
baseboard	B-Device
management	I-Device
controller	I-Device
,	O
BIOS	B-Operating_System
,	O
processor	B-General_Concept
,	O
memory	B-Architecture
,	O
disks	O
,	O
portable	O
batteries	O
,	O
field	O
replaceable	O
units	O
,	O
and	O
other	O
information	O
)	O
.	O
</s>
<s>
Hardware	O
asset	O
information	O
is	O
updated	O
every	O
time	O
the	O
system	O
runs	O
through	O
power-on	B-Device
self-test	I-Device
(	O
POST	O
)	O
.	O
</s>
<s>
From	O
major	O
version	O
6	O
,	O
Intel	B-Application
AMT	I-Application
embeds	O
a	O
proprietary	O
VNC	B-Protocol
server	I-Protocol
,	O
for	O
out-of-band	B-Protocol
access	O
using	O
dedicated	O
VNC-compatible	O
viewer	O
technology	O
,	O
and	O
have	O
full	O
KVM	B-Application
(	O
keyboard	O
,	O
video	O
,	O
mouse	O
)	O
capability	O
throughout	O
the	O
power	O
cycle	O
–	O
including	O
uninterrupted	O
control	O
of	O
the	O
desktop	O
when	O
an	O
operating	O
system	O
loads	O
.	O
</s>
<s>
Clients	O
such	O
as	O
VNC	B-Protocol
Viewer	O
Plus	O
from	O
RealVNC	B-Language
also	O
provide	O
additional	O
functionality	O
that	O
might	O
make	O
it	O
easier	O
to	O
perform	O
(	O
and	O
watch	O
)	O
certain	O
Intel	B-Application
AMT	I-Application
operations	O
,	O
such	O
as	O
powering	O
the	O
computer	O
off	O
and	O
on	O
,	O
configuring	O
the	O
BIOS	B-Operating_System
,	O
and	O
mounting	O
a	O
remote	O
image	O
(	O
IDER	O
)	O
.	O
</s>
<s>
AMT	O
supports	O
certificate-based	O
or	O
PSK-based	O
remote	O
provisioning	O
(	O
full	O
remote	O
deployment	O
)	O
,	O
USB	B-Protocol
key-based	B-Application
provisioning	O
(	O
"	O
one-touch	O
"	O
provisioning	O
)	O
,	O
manual	O
provisioning	O
and	O
provisioning	O
using	O
an	O
agent	O
on	O
the	O
local	O
host	O
(	O
"	O
Host	O
Based	O
Provisioning	O
"	O
)	O
.	O
</s>
<s>
A	O
full	O
unprovisioning	O
erases	O
the	O
configuration	O
profile	O
as	O
well	O
as	O
the	O
security	O
credentials	O
and	O
operational	O
/	O
networking	O
settings	O
required	O
to	O
communicate	O
with	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
.	O
</s>
<s>
A	O
full	O
unprovisioning	O
returns	O
Intel	B-Application
AMT	I-Application
to	O
its	O
factory	O
default	O
state	O
.	O
</s>
<s>
Physically	O
accessing	O
the	O
PC	O
to	O
restore	O
security	O
credentials	O
,	O
either	O
by	O
USB	B-Protocol
key	O
or	O
by	O
entering	O
the	O
credentials	O
and	O
MEBx	O
parameters	O
manually	O
.	O
</s>
<s>
Setting	O
the	O
appropriate	O
value	O
in	O
the	O
BIOS	B-Operating_System
.	O
</s>
<s>
Clearing	O
the	O
CMOS	B-Device
memory	I-Device
and	O
/	O
or	O
NVRAM	B-General_Concept
.	O
</s>
<s>
Setup	O
and	O
integration	O
of	O
AMT	O
is	O
supported	O
by	O
a	O
setup	O
and	O
configuration	O
service	O
(	O
for	O
automated	O
setup	O
)	O
,	O
an	O
AMT	O
Webserver	O
tool	O
(	O
included	O
with	O
Intel	B-Application
AMT	I-Application
)	O
,	O
and	O
AMT	O
Commander	O
,	O
an	O
unsupported	O
and	O
free	O
,	O
proprietary	O
application	O
available	O
from	O
the	O
Intel	O
website	O
.	O
</s>
<s>
All	O
access	O
to	O
the	O
Intel	B-Application
AMT	I-Application
features	O
is	O
through	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
in	O
the	O
PC	O
's	O
hardware	O
and	O
firmware	B-Application
.	O
</s>
<s>
AMT	O
communication	O
depends	O
on	O
the	O
state	O
of	O
the	O
Management	B-Device
Engine	I-Device
,	O
not	O
the	O
state	O
of	O
the	O
PC	O
's	O
OS	O
.	O
</s>
<s>
As	O
part	O
of	O
the	O
Intel	B-Device
Management	I-Device
Engine	I-Device
,	O
the	O
AMT	O
OOB	O
communication	O
channel	O
is	O
based	O
on	O
the	O
TCP/IP	B-Protocol
firmware	B-Application
stack	O
designed	O
into	O
system	O
hardware	O
.	O
</s>
<s>
Because	O
it	O
is	O
based	O
on	O
the	O
TCP/IP	B-Protocol
stack	I-Protocol
,	O
remote	O
communication	O
with	O
AMT	O
occurs	O
via	O
the	O
network	O
data	O
path	O
before	O
communication	O
is	O
passed	O
to	O
the	O
OS	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
supports	O
wired	O
and	O
wireless	B-Architecture
networks	O
.	O
</s>
<s>
For	O
wireless	B-Architecture
notebooks	O
on	O
battery	O
power	O
,	O
OOB	O
communication	O
is	O
available	O
when	O
the	O
system	O
is	O
awake	O
and	O
connected	O
to	O
the	O
corporate	O
network	O
,	O
even	O
if	O
the	O
OS	O
is	O
down	O
.	O
</s>
<s>
OOB	O
communication	O
is	O
also	O
available	O
for	O
wireless	B-Architecture
or	O
wired	O
notebooks	O
connected	O
to	O
the	O
corporate	O
network	O
over	O
a	O
host	O
OS-based	O
virtual	B-Application
private	I-Application
network	I-Application
(	O
VPN	B-Application
)	O
when	O
notebooks	O
are	O
awake	O
and	O
working	O
properly	O
.	O
</s>
<s>
AMT	O
version	O
4.0	O
and	O
higher	O
can	O
establish	O
a	O
secure	O
communication	O
tunnel	O
between	O
a	O
wired	O
PC	O
and	O
an	O
IT	O
console	O
outside	O
the	O
corporate	O
firewall	B-Application
.	O
</s>
<s>
In	O
this	O
scheme	O
,	O
a	O
management	O
presence	O
server	O
(	O
Intel	O
calls	O
this	O
a	O
"	O
vPro-enabled	O
gateway	O
"	O
)	O
authenticates	O
the	O
PC	O
,	O
opens	O
a	O
secure	O
TLS	B-Protocol
tunnel	O
between	O
the	O
IT	O
console	O
and	O
the	O
PC	O
,	O
and	O
mediates	O
communication	O
.	O
</s>
<s>
The	O
scheme	O
is	O
intended	O
to	O
help	O
the	O
user	O
or	O
PC	O
itself	O
request	O
maintenance	O
or	O
service	O
when	O
at	O
satellite	O
offices	O
or	O
similar	O
places	O
where	O
there	O
is	O
no	O
on-site	O
proxy	B-Application
server	I-Application
or	O
management	O
appliance	O
.	O
</s>
<s>
Technology	O
that	O
secures	O
communications	O
outside	O
a	O
corporate	O
firewall	B-Application
is	O
relatively	O
new	O
.	O
</s>
<s>
It	O
also	O
requires	O
that	O
an	O
infrastructure	O
be	O
in	O
place	O
,	O
including	O
support	O
from	O
IT	O
consoles	O
and	O
firewalls	B-Application
.	O
</s>
<s>
An	O
AMT	O
PC	O
stores	O
system	O
configuration	O
information	O
in	O
protected	O
memory	B-Architecture
.	O
</s>
<s>
When	O
a	O
user	O
tries	O
to	O
initiate	O
a	O
remote	O
session	O
between	O
the	O
wired	O
PC	O
and	O
a	O
company	O
server	O
from	O
an	O
open	O
LAN	B-General_Concept
,	O
AMT	O
sends	O
the	O
stored	O
information	O
to	O
a	O
management	O
presence	O
server	O
(	O
MPS	O
)	O
in	O
the	O
"	O
demilitarized	O
zone	O
"	O
(	O
"	O
DMZ	O
"	O
)	O
that	O
exists	O
between	O
the	O
corporate	O
firewall	B-Application
and	O
client	O
(	O
the	O
user	O
PC	O
's	O
)	O
firewalls	B-Application
.	O
</s>
<s>
Because	O
communication	O
is	O
authenticated	O
,	O
a	O
secure	O
communication	O
tunnel	O
can	O
then	O
be	O
opened	O
using	O
TLS	B-Protocol
encryption	I-Protocol
.	O
</s>
<s>
Once	O
secure	O
communications	O
are	O
established	O
between	O
the	O
IT	O
console	O
and	O
Intel	B-Application
AMT	I-Application
on	O
the	O
user	O
's	O
PC	O
,	O
a	O
sys-admin	O
can	O
use	O
the	O
typical	O
AMT	O
features	O
to	O
remotely	O
diagnose	O
,	O
repair	O
,	O
maintain	O
,	O
or	O
update	O
the	O
PC	O
.	O
</s>
<s>
The	O
Management	B-Device
Engine	I-Device
(	O
ME	O
)	O
is	O
an	O
isolated	O
and	O
protected	O
coprocessor	O
,	O
embedded	O
as	O
a	O
non-optional	O
part	O
in	O
all	O
current	O
(	O
)	O
Intel	O
chipsets	B-Device
.	O
</s>
<s>
Starting	O
with	O
ME	O
11	O
,	O
it	O
is	O
based	O
on	O
the	O
Intel	B-Device
Quark	I-Device
x86-based	O
32-bit	O
CPU	O
and	O
runs	O
the	O
MINIX	B-Application
3	I-Application
operating	O
system	O
.	O
</s>
<s>
The	O
ME	O
state	O
is	O
stored	O
in	O
a	O
partition	O
of	O
the	O
SPI	B-Architecture
flash	I-Architecture
,	O
using	O
the	O
Embedded	O
Flash	O
File	O
System	O
(	O
EFFS	O
)	O
.	O
</s>
<s>
Previous	O
versions	O
were	O
based	O
on	O
an	O
ARC	B-Application
core	I-Application
,	O
with	O
the	O
Management	B-Device
Engine	I-Device
running	O
the	O
ThreadX	B-Operating_System
RTOS	B-Operating_System
from	O
Express	B-Operating_System
Logic	I-Operating_System
.	O
</s>
<s>
Versions	O
1.x	O
to	O
5.x	O
of	O
the	O
ME	O
used	O
the	O
ARCTangent-A4	O
(	O
32-bit	O
only	O
instructions	O
)	O
whereas	O
versions	O
6.x	O
to	O
8.x	O
used	O
the	O
newer	O
ARCompact	B-Application
(	O
mixed	O
32	O
-	O
and	O
16-bit	O
instruction	B-General_Concept
set	I-General_Concept
architecture	I-General_Concept
)	O
.	O
</s>
<s>
Starting	O
with	O
ME	O
7.1	O
,	O
the	O
ARC	B-Application
processor	I-Application
could	O
also	O
execute	O
signed	O
Java	B-Application
applets	I-Application
.	O
</s>
<s>
Traffic	O
is	O
routed	O
based	O
on	O
packets	B-Protocol
to	O
ports	O
16992	O
–	O
16995	O
.	O
</s>
<s>
Until	O
the	O
release	O
of	O
Nehalem	B-Device
processors	O
,	O
the	O
ME	O
was	O
usually	O
embedded	O
into	O
the	O
motherboard	O
's	O
northbridge	B-Device
,	O
following	O
the	O
Memory	B-Device
Controller	I-Device
Hub	I-Device
(	O
MCH	O
)	O
layout	O
.	O
</s>
<s>
With	O
the	O
newer	O
Intel	O
architectures	O
(	O
Intel	B-Device
5	I-Device
Series	I-Device
onwards	O
)	O
,	O
ME	O
is	O
included	O
into	O
the	O
Platform	B-Device
Controller	I-Device
Hub	I-Device
(	O
PCH	O
)	O
.	O
</s>
<s>
Security	O
for	O
communications	O
between	O
Intel	B-Application
AMT	I-Application
and	O
the	O
provisioning	O
service	O
and/or	O
management	O
console	O
can	O
be	O
established	O
in	O
different	O
ways	O
depending	O
on	O
the	O
network	O
environment	O
.	O
</s>
<s>
Security	O
can	O
be	O
established	O
via	O
certificates	O
and	O
keys	O
(	O
TLS	B-Protocol
public	B-Application
key	I-Application
infrastructure	O
,	O
or	O
TLS-PKI	O
)	O
,	O
pre-shared	O
keys	O
(	O
TLS-PSK	B-Protocol
)	O
,	O
or	O
administrator	O
password	O
.	O
</s>
<s>
Security	O
technologies	O
that	O
protect	O
access	O
to	O
the	O
AMT	O
features	O
are	O
built	O
into	O
the	O
hardware	O
and	O
firmware	B-Application
.	O
</s>
<s>
As	O
with	O
other	O
hardware-based	O
features	O
of	O
AMT	O
,	O
the	O
security	O
technologies	O
are	O
active	O
even	O
if	O
the	O
PC	O
is	O
powered	O
off	O
,	O
the	O
OS	O
is	O
crashed	O
,	O
software	B-Application
agents	O
are	O
missing	O
,	O
or	O
hardware	O
(	O
such	O
as	O
a	O
hard	B-Device
drive	I-Device
or	O
memory	B-Architecture
)	O
has	O
failed	O
.	O
</s>
<s>
Because	O
the	B-Application
software	I-Application
that	O
implements	O
AMT	O
exists	O
outside	O
of	O
the	O
operating	O
system	O
,	O
it	O
is	O
not	O
kept	O
up-to-date	O
by	O
the	O
operating	O
system	O
's	O
normal	O
update	O
mechanism	O
.	O
</s>
<s>
Security	O
defects	O
in	O
the	O
AMT	O
software	B-Application
can	O
therefore	O
be	O
particularly	O
severe	O
,	O
as	O
they	O
will	O
remain	O
long	O
after	O
they	O
have	O
been	O
discovered	O
and	O
become	O
known	O
to	O
potential	O
attackers	O
.	O
</s>
<s>
Intel	O
announced	O
partial	O
availability	O
of	O
a	O
firmware	B-Application
update	O
to	O
patch	O
the	O
vulnerability	O
for	O
some	O
of	O
the	O
affected	O
devices	O
.	O
</s>
<s>
While	O
some	O
protocols	O
for	O
in-band	O
remote	O
management	O
use	O
a	O
secured	O
network	O
communication	O
channel	O
(	O
for	O
example	O
Secure	B-Protocol
Shell	I-Protocol
)	O
,	O
some	O
other	O
protocols	O
are	O
not	O
secured	O
.	O
</s>
<s>
Thus	O
some	O
businesses	O
have	O
had	O
to	O
choose	O
between	O
having	O
a	O
secure	O
network	O
or	O
allowing	O
IT	O
to	O
use	O
remote	B-Application
management	I-Application
applications	I-Application
without	O
secure	O
communications	O
to	O
maintain	O
and	O
service	O
PCs	O
.	O
</s>
<s>
For	O
example	O
,	O
Intel	B-Application
AMT	I-Application
supports	O
IEEE	O
802.1x	O
,	O
Preboot	B-Device
Execution	I-Device
Environment	I-Device
(	O
PXE	B-Device
)	O
,	O
Cisco	O
SDN	O
,	O
and	O
Microsoft	O
NAP	O
.	O
</s>
<s>
With	O
Intel	B-Application
AMT	I-Application
in	O
the	O
secure	O
network	O
environment	O
:	O
</s>
<s>
PXE	B-Device
boot	B-Operating_System
can	O
be	O
used	O
while	O
maintaining	O
network	O
security	O
.	O
</s>
<s>
In	O
other	O
words	O
,	O
an	O
IT	O
administrator	O
can	O
use	O
an	O
existing	O
PXE	B-Device
infrastructure	O
in	O
an	O
IEEE	O
802.1x	O
,	O
Cisco	O
SDN	O
,	O
or	O
Microsoft	O
NAP	O
network	O
.	O
</s>
<s>
Intel	B-Application
AMT	I-Application
can	O
embed	O
network	O
security	O
credentials	O
in	O
the	O
hardware	O
,	O
via	O
the	O
Intel	B-Application
AMT	I-Application
Embedded	O
Trust	O
Agent	O
and	O
an	O
AMT	O
posture	O
plug-in	B-Application
.	O
</s>
<s>
The	O
plug-in	B-Application
collects	O
security	O
posture	O
information	O
,	O
such	O
as	O
firmware	B-Application
configuration	O
and	O
security	O
parameters	O
from	O
third-party	B-General_Concept
software	I-General_Concept
(	O
such	O
as	O
antivirus	B-Application
software	I-Application
and	O
antispyware	O
)	O
,	O
BIOS	B-Operating_System
,	O
and	O
protected	O
memory	B-Architecture
.	O
</s>
<s>
The	O
plug-in	B-Application
and	O
trust	O
agent	O
can	O
store	O
the	O
security	O
profile(s )	O
in	O
AMT	O
's	O
protected	O
,	O
nonvolatile	O
memory	B-Architecture
,	O
which	O
is	O
not	O
on	O
the	O
hard	B-Device
disk	I-Device
drive	I-Device
.	O
</s>
<s>
Because	O
AMT	O
has	O
an	O
out-of-band	B-Protocol
communication	O
channel	O
,	O
AMT	O
can	O
present	O
the	O
PC	O
's	O
security	O
posture	O
to	O
the	O
network	O
even	O
if	O
the	O
PC	O
's	O
OS	O
or	O
security	O
software	B-Application
is	O
compromised	O
.	O
</s>
<s>
Since	O
AMT	O
presents	O
the	O
posture	O
out-of-band	B-Protocol
,	O
the	O
network	O
can	O
also	O
authenticate	O
the	O
PC	O
out-of-band	B-Protocol
,	O
before	O
the	O
OS	O
or	O
applications	O
load	O
and	O
before	O
they	O
try	O
to	O
access	O
the	O
network	O
.	O
</s>
<s>
If	O
the	O
security	O
posture	O
is	O
not	O
correct	O
,	O
a	O
system	O
administrator	O
can	O
push	O
an	O
update	O
OOB	O
(	O
via	O
Intel	B-Application
AMT	I-Application
)	O
or	O
reinstall	O
critical	O
security	O
software	B-Application
before	O
letting	O
the	O
PC	O
access	O
the	O
network	O
.	O
</s>
<s>
Support	O
for	O
different	O
security	O
postures	O
depends	O
on	O
the	O
AMT	B-Device
release	I-Device
:	O
</s>
<s>
Support	O
for	O
PXE	B-Device
boot	B-Operating_System
with	O
full	O
network	O
security	O
requires	O
AMT	O
version	O
3.2	O
or	O
higher	O
for	O
desktop	O
PCs	O
.	O
</s>
<s>
As	O
with	O
other	O
aspects	O
of	O
Intel	B-Application
AMT	I-Application
,	O
the	O
security	O
technologies	O
and	O
methodologies	O
are	O
built	O
into	O
the	O
chipset	B-Device
.	O
</s>
<s>
A	O
ring	B-Operating_System
−3	I-Operating_System
rootkit	O
was	O
demonstrated	O
by	O
Invisible	O
Things	O
Lab	O
for	O
the	O
Q35	O
chipset	B-Device
;	O
it	O
does	O
not	O
work	O
for	O
the	O
later	O
Q45	O
chipset	B-Device
,	O
as	O
Intel	O
implemented	O
additional	O
protections	O
.	O
</s>
<s>
The	O
exploit	O
worked	O
by	O
remapping	O
the	O
normally	O
protected	O
memory	B-Architecture
region	O
(	O
top	O
16MB	O
of	O
RAM	B-Architecture
)	O
reserved	O
for	O
the	O
ME	O
.	O
</s>
<s>
The	O
ME	O
rootkit	O
could	O
be	O
installed	O
regardless	O
of	O
whether	O
the	O
AMT	O
is	O
present	O
or	O
enabled	O
on	O
the	O
system	O
,	O
as	O
the	O
chipset	B-Device
always	O
contains	O
the	O
ARC	B-Application
ME	O
coprocessor	O
.	O
</s>
<s>
(	O
The	O
"	O
−3	O
"	O
designation	O
was	O
chosen	O
because	O
the	O
ME	O
coprocessor	O
works	O
even	O
when	O
the	O
system	O
is	O
in	O
the	O
S3	O
state	O
,	O
thus	O
it	O
was	O
considered	O
a	O
layer	O
below	O
the	O
System	B-Architecture
Management	I-Architecture
Mode	I-Architecture
rootkits	O
.	O
)	O
</s>
<s>
For	O
the	O
vulnerable	O
Q35	O
chipset	B-Device
,	O
a	O
keystroke	O
logger	O
ME-based	O
rootkit	O
was	O
demonstrated	O
by	O
Patrick	O
Stewin	O
.	O
</s>
<s>
Another	O
security	O
evaluation	O
by	O
Vassilios	O
Ververis	O
showed	O
serious	O
weaknesses	O
in	O
the	O
GM45	O
chipset	B-Device
implementation	O
.	O
</s>
<s>
In	O
particular	O
,	O
it	O
criticized	O
AMT	O
for	O
transmitting	O
unencrypted	O
passwords	O
in	O
the	O
SMB	O
provisioning	O
mode	O
when	O
the	O
IDE	O
redirection	O
and	O
Serial	B-General_Concept
over	I-General_Concept
LAN	I-General_Concept
features	O
are	O
used	O
.	O
</s>
<s>
It	O
also	O
found	O
that	O
the	O
"	O
zero	O
touch	O
"	O
provisioning	O
mode	O
(	O
ZTC	O
)	O
is	O
still	O
enabled	O
even	O
when	O
the	O
AMT	O
appears	O
to	O
be	O
disabled	O
in	O
BIOS	B-Operating_System
.	O
</s>
<s>
For	O
about	O
60	O
euros	O
,	O
Ververis	O
purchased	O
from	O
Go	O
Daddy	O
a	O
certificate	O
that	O
is	O
accepted	O
by	O
the	O
ME	O
firmware	B-Application
and	O
allows	O
remote	O
"	O
zero	O
touch	O
"	O
provisioning	O
of	O
(	O
possibly	O
unsuspecting	O
)	O
machines	O
,	O
which	O
broadcast	O
their	O
HELLO	O
packets	B-Protocol
to	O
would-be	O
configuration	O
servers	O
.	O
</s>
<s>
This	O
allowed	O
any	O
person	O
to	O
simply	O
log	O
into	O
the	O
admin	O
account	O
on	O
the	O
devices	O
by	O
editing	O
their	O
sent	O
HTTP	B-Protocol
packet	B-Protocol
to	O
use	O
the	O
empty	O
string	O
as	O
the	O
response	O
field	O
's	O
value	O
.	O
</s>
<s>
In	O
June	O
2017	O
,	O
the	O
PLATINUM	O
cybercrime	O
group	O
became	O
notable	O
for	O
exploiting	O
the	O
serial	B-General_Concept
over	I-General_Concept
LAN	I-General_Concept
(	O
SOL	B-General_Concept
)	O
capabilities	O
of	O
AMT	O
to	O
perform	O
data	O
exfiltration	O
of	O
stolen	O
documents	O
.	O
</s>
<s>
In	O
November	O
2017	O
serious	O
flaws	O
were	O
detected	O
in	O
the	O
Management	B-Device
Engine	I-Device
(	O
ME	O
)	O
firmware	B-Application
by	O
security	O
firm	O
Positive	O
Technologies	O
,	O
who	O
claimed	O
to	O
have	O
developed	O
a	O
working	O
exploit	O
of	O
this	O
system	O
for	O
someone	O
having	O
physical	O
access	O
to	O
a	O
USB	B-Protocol
port	I-Protocol
.	O
</s>
<s>
On	O
November	O
20	O
,	O
2017	O
,	O
Intel	O
confirmed	O
that	O
a	O
number	O
of	O
serious	O
flaws	O
had	O
been	O
found	O
in	O
the	O
Management	B-Device
Engine	I-Device
,	O
Trusted	B-Device
Execution	I-Device
Engine	I-Device
,	O
Server	B-Device
Platform	I-Device
Services	I-Device
and	O
released	O
a	O
"	O
critical	O
firmware	B-Application
update	O
"	O
.	O
</s>
<s>
PCs	O
with	O
AMT	O
typically	O
provide	O
an	O
option	O
in	O
the	O
BIOS	B-Operating_System
menu	O
to	O
switch	O
off	O
AMT	O
,	O
though	O
OEMs	O
implement	O
BIOS	B-Operating_System
features	O
differently	O
,	O
and	O
therefore	O
the	O
BIOS	B-Operating_System
is	O
not	O
a	O
reliable	O
method	O
to	O
switch	O
off	O
AMT	O
.	O
</s>
<s>
The	O
only	O
way	O
to	O
actually	O
fix	O
this	O
vulnerability	O
is	O
to	O
install	O
a	O
firmware	B-Application
update	O
.	O
</s>
<s>
Unlike	O
for	O
AMT	O
,	O
there	O
is	O
generally	O
no	O
official	O
,	O
documented	O
way	O
to	O
disable	O
the	O
Management	B-Device
Engine	I-Device
(	O
ME	O
)	O
;	O
it	O
is	O
always	O
on	O
,	O
unless	O
it	O
is	O
not	O
enabled	O
at	O
all	O
by	O
the	O
OEM	O
.	O
</s>
