Intel Active Management Technology

Slides:



Advertisements
Similar presentations
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Advertisements

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
1 Integrating ISA Server and Exchange Server. 2 How works.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Intel ® vPro™ Expert Training 1 Module 2: Overview of Intel® vPro™ Features.
1 Webinar Calendar for Q3 ’09 TopicAgenda/ContentPrerequisite (Click on links in presentation mode) Time & Registration Link Introduction to Intel® vPro™
Wally Mead Senior Program Manager Microsoft Corporation.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Hands-On Microsoft Windows Server 2008
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 8: Configuring Network Access Protection
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Managing the Windows Vista* Transition on Intel ® Professional Business Platforms Justin Van Buren Digital Office Platform Marketing Business Client Group,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Configuring Network Access Protection
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Module 7: Advanced Application and Web Filtering.
Wireless and Mobile Security
NetTech Solutions Protecting the Computer Lesson 10.
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
Service Pack 2 System Center Configuration Manager 2007.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Instructor Materials Chapter 8 Configuring Cisco Devices
Security fundamentals
ArcGIS for Server Security: Advanced
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
IBM System x Systems Management Made Easy ibm
Securing Network Servers
LAS16-203: Platform Security Architecture for embedded devices
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Secure Hyperconnectivity with TeamViewer and Windows technologies
Secure Sockets Layer (SSL)
Implementing Network Access Protection
Modernizing your Remote Access
Securing the Network Perimeter with ISA 2004
Security and Encryption
Outline What does the OS protect? Authentication for operating systems
Firewalls.
Outline What does the OS protect? Authentication for operating systems
2018 Real Cisco Dumps IT-Dumps
Cisco Real Exam Dumps IT-Dumps
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
On and Off Premise Secure Access
Building hardware-based security with a Trusted Platform Module (TPM)
Message Digest Cryptographic checksum One-way function Relevance
Goals Introduce the Windows Server 2003 family of operating systems
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
IBM System x Systems Management Made Easy ibm
Contact Center Security Strategies
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Platform Architecture
Increase and Improve your PC management with Windows Intune
Designed for powerful live monitoring of larger installations
TPM, UEFI, Trusted Boot, Secure Boot
Network Access Control
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Intel Active Management Technology Operating System Intel Hardware

Intel Active Management Technology Operating System Intel Hardware Intel AMT

Intel Active Management Technology Operating System Intel Hardware Intel AMT

Intel® Active Management Technology Core™2 Duo

Changing the Game: Intel® Active Management Technology Out-of-band system management Remote management regardless of power on/off state or OS state Direct connection via TCP/IP firmware stack Tamper-resistance Hardware/firmware solution Persistence Nonvolatile storage of state Survives power outages and system rebuilds

Out-of-band system management Discover PCs and their configuration on the network independent of their operational state Remote hardware/software inventories Securely wake & update PCs Remote troubleshooting and recovery Remotely repair a PC Prevent critical security code from being disabled Process monitoring (e.g. anti-virus) Detect & block anomalous network behavior Network packet filtering for inbound/outbound traffic Proactive alerting

WS-Management for In-band and Out-of-band Machine Boundary Management Applications WS-Man Listener WS-Man (OS Running) WDM provider User Intel® AMT Driver Kernel Hardware Intel® AMT Controller WS-Man (pre-boot, post crash) Intel, Microsoft and other industry players have announced WS-Management to help address the cost and complexity of IT management

Intel Active Management Technology

Intel AMT architecture

Intel® Active Management Technology Discover Your Assets ? IT Management Console PCs on Network Discover: Intel® AMT downloads HW & SW asset information from the BIOS and OS into non-volatile memory during boot, which can be accessed by IT anytime because users can’t remove or prevent IT access to the information.

NAC Framework Solutions: Client Security Example solution built with Intel CTA = Cisco Trust Agent NAC = Network Admission Control Intel® AMT provides configuration state information to CTA Intel® AMT is granted access to enterprise network 3 Posture Plug-In CTA NAC-Enabled Network Intel Platform Intel AMT communicates platform HW / SW state to NAC and supports remediation of quarantined platforms The main attribute of Intel AMT is that it works independently of the operating system, which allows new methods of discovery, healing, and protection on your network. Intel calls this ability out-of-band management. With Intel AMT, administrators can discover networked systems in their environments, regardless of the system power state or operating system condition. The administrators can use the remote control capabilities to heal a networked system, even if the operating system (OS) has failed. Intel will provide a posture plug-in for Cisco Trust Agent. The plug-in will provide platform configuration information to CTA, allowing Intel AMT to meaningfully participate in the Cisco NAC infrastructure. The data sent to the Cisco Trust Agent includes: BIOS revision level Intel AMT firmware revision level Intel AMT status Intel AMT configuration settings Other NAC-compliant plug-ins will also report their posture levels to the NAC Access Control Server (ACS). In the event that a given plug-in reports a noncompliant configuration setting, Cisco ACS will block access to the corporate network. Intel AMT can be used for updating/healing the system to a compliant posture. For example, if the OS firewall policies on a platform were noncompliant, the IT administrator could use the Intel AMT third-party data store to push an updated policy on to the platform for remediation of it. The firewall posture plug-in would recognize this change and initiate a new NAC exchange to let the platform onto the corporate network. 1 Intel® AMT NAC Policy Server assess AMT posture and grants network access based on IT policy 2

Management Console from ISV partners Embedded IT: Proof of concept for wireless manageability and Security demo Management Console from ISV partners Enterprise Intranet Mobile Concept PC IT embeds rule to detect a specific network based attack in NB Client’s Manageability Engine The Manageability Engine detects specific attack and alerts IT and isolates PC from network IT then takes following actions via Out of Band Channel: Queries PC to fix issue Restores PC to network

Securing AMT Hardware/firmware solution Only firmware images digitally signed by Intel are allowed to run OOB communication done via TLS with RSA keys of length 1536 bits Server authentication Optional client authentication Maximum of 4 sessions HTTP Digest authentication RFC 2617 for authenticating users Access controlled storage of critical data to non-volatile data store in AMT hardware Random number generator in firmware to generate high-quality keys Hardware acceleration of cryptographic primitives

Extra slides

EDS Pilot of Intel® Active Management Technology

Hardware Enhanced Manageability Intel® Active Management Technology with Microsoft* System Management Server 2003 plug-in Discover & Wake Up the PC (Even if Powered Down) Heal: Use Serial Over LAN (SOL) to Configure BIOS if PC is Not Responding Protect Against Malicious Software Attacks Intel® Active Management Technology requires the platform to have an Intel® AMT-enabled chipset, network hardware and software.  The platform must also be connected to a power source and an active LAN port.