Download presentation
Presentation is loading. Please wait.
Published byShreya Cocke Modified over 10 years ago
1
Intel® vPro™ and Microsoft® System Center Configuration Manager 2007 SP2 Training
2
Welcome This step-by-step training guide is intended to get you familiar with managing Intel® vPro™ systems with Microsoft* System Center Configuration Manager 2007 Service Pack 2 (SCCM 2007 SP2) Please use this guide to do lab exercises in the virtual “training environment” assigned to you NOTE: This training guide is an updated version of the previously released SP1. Please refer to SP1 training guide if your environment has not been updated to SP2.
3
Training Objectives Provide an overview of Intel® vPro™ Technology and discuss its capabilities Provide students with hands-on experience configuring System Center Configuration Manager 2007 SP2 environment to support Intel® vPro™ capable machines Provide hands-on experience provisioning and managing Intel® vPro™ capable machines Show Case “Real World” use cases of Intel® vPro™ systems within a SCCM environment Provide Students with a better understanding and ability to discuss the components necessary in Configuration Manager 2007 SP2 to support Intel® vPro™ systems (both native and legacy support) with their customers, management, partners, vendors, etc
4
Training Agenda Lab Module 1 – Infrastructure Preparation
What is Intel® vPro™ Technology? – High level overview (Skip slides 7-11 if you are already familiar with Intel® vPro™) What is Intel® vPro™ Provisioning? (Skip slides if you are already familiar with Intel® vPro™ provisioning) Steps to access Intel’s Remote Training Environment (skip slides if you are running a local copy of the training images) Lab Module 1 – Infrastructure Preparation Hands-on experience configuring the Enterprise Infrastructure (AD/PKI) to support ConfigMgr 2007 SP2 and Intel® vPro™ systems Lab Module 2 - ConfigMgr 2007 SP2 OOB Service Point and Components Hands-on experience setting up and configuring Out of Band Service Point in ConfigMgr 2007 SP2 to support Intel® vPro™ systems Lab Module 3 – ConfigMgr 2007 SP2 Collections and InBand Provisioning Hands-on experience utilizing the ConfigMgr 2007 SP2 client agent for in-band provisioning Hands-on experience configuring ConfigMgr 2007 SP2 Collection for Discovering and automatically provisioning Intel® AMT capable machines Lab Module 4 – ConfigMgr 2007 SP2 Out of Band Management Console Hands-on experience utilizing the ConfigMgr 2007 SP2 OOB Console to manage (OOB) Intel® vPro™ systems Lab Module 5 – Real World Use Cases Hands-on setting up and running actual use cases for a production environment
5
Training Caveats This is not a replacement for Microsoft’s documentation on installing and configuring ConfigMgr 2007 SP2 This presentation only focuses on the Intel® vPro™ related configuration components It is highly recommended that you thoroughly review all of Microsoft’s documentation before activating Intel® vPro™ with ConfigMgr 2007 SP2 Recommended Material (from Microsoft TechNet): What's New in Configuration Manager 2007 SP2 Fundamentals of Configuration Manager 2007 Configuration Manager Planning and Deployment Overview Configuration Manager Supported Configurations Planning and Deploying the Server Infrastructure for Configuration Manager 2007 Planning and Deploying Clients for Configuration Manager 2007 How to Configure Configuration Manager 2007 Out of Band Management in Configuration Manager 2007 SP1 and later Administrator Checklist: Enabling Out of Band Management
6
Acronyms Used 3PDS – Third Party Data Storage FW – Firmware
Intel® AMT – Active Management Technology Intel® ME – Management Engine (Microsoft calls this component the Management Controller) Intel® MEBX – Management Engine BIOS Extension KVM – Keyboard, Video and Mouse OOB – Out Of Band OSD – Operating System Deployment OTP – One Time Password PKI – Public Key Infrastructure PSK – Pre-Shared Key Radius Server – Remote Authentication Dial In User Service SCCM – System Center Configuration Manager SUM – Scheduled Update Management
7
What is Intel® vPro™ Technology?
7
8
Intel® Core™ vPro™ Processor Family Platform is more than the sum of its parts
Chipset Network Intel® Core™ i5 & i7 Processors Intel® Express Intel® Gigabit Network Intel® Anti-Theft Technology Intel® Active Management Technology Intel® Virtualization Technology Intel® Trusted Execution Technology Intel® vPro™ Technology Security & Manageability on the Chip 8
9
2010 Intel® vPro™ Technology Cross-client consistency with innovation across all aspects of the platform New micro-architecture and partitioning providing the most advanced processors Advanced processor Power and Performance Management‡ Lower Overall Platform Power Through Integration‡ >40% drop in idle power† Integrated non-volatile memory option for superior responsiveness Energy Efficient Performance – Best Products Theft protection of data and assets through Intel® Anti-Theft Technology Manageable data encryption with integration of drive encryption solutions Acceleration and hardening of software cryptography with AES-NI The secure virtualization platform of choice with Dynamic Virtual Client Proactive Security Uninterrupted remote control of keyboard, video & mouse with KVM Remote Control Remotely scheduled PC power-on with PC Alarm Clock to ensure key local tasks execute in off hours Remote management service options with RPAT Continued commit to standards: DASH* 1.1 profiles IPv6 in-band & out-of-band Manageability - Whenever, Wherever ‡ All products, dates, and figures specified are preliminary based upon expectations and are subject to change without notice † Based on architectural estimates and preliminary benchmarks
10
Continued Business Client Platform Evolution
Desktop 2006 2007 2008 2010 AMT 2.0 Remote diagnostics Remote repair Remote HW/SW inv System defense AMT 3.0, VT-x, VT-d, TXT Remote config Enhanced system defense Cisco SDN AMT 5.0 MSFT NAP Fast Call for Help Remote Schedule Maintenance Remote PC Assist Technology KVM Remote Control1 Intel® Anti-Theft Technology PC Alarm Clock Remote Encryption Management AES-NI AMT 4.0, VT-d, TXT MSFT NAP Fast Call for Help Remote Schedule Maint. AMT 2.6, VT-x Remote config Cisco SDN Wireless support Mobile Enterprise Remote Management Security, Virtualization, Wireless Extend beyond firewall, Remote management Services Full remote control, Data & asset security, Converged roadmaps Sustained innovation to deliver the best platform for business 1 Requires processor with integrated graphics 10
11
Intel® Technology Business Impact PCs with Intel® vProTM Technology
Actual Customer Experiences with Intel® vProTM Technology Unintended PC Downtime due to Software Issues Value Space Read case study Up to Less 98% Up to Software-Related Desk-Side Visits Indiana State Office of Technology Read case study Reduction 90% Up to Up to 25% 51% ROI More Advocate Health Care Read case study Power-Efficiency Improvement EDS Read case study View video on YouTube Underpinning all the technical content is an underlying business case that has demonstrated true and realised value by many customers worldwide. There are many available case studies to read available off the vPro Expert Centre on -
12
ConfigMgr 2007 SP2 Features Provisioning Discovery/Inventory
Secure Setup & Configuration of Intel® AMT Zero Touch – Certificate Hash Zero Touch – In band via agent Ties to OSD with targeting Discover On Demand Per machine / per collection Scheduled Discovery In band inventory via agent Remote Console Power Control Helpdesk of Break/Fix Serial over LAN IDE Redirection BIOS password bypass Manual power control Scheduled Power On SWDist, SUM, OSD On Demand Power Control Wake, Restart, Shutdown Interactive via OOB Console
13
System Center with Intel® vPro™ Technology NEW
System Center with Intel® vPro™ Technology NEW! Integrated OOB features in ConfigMgr 2007 SP2 OOB Wireless Management: Wireless Profile Management Provide configuration of up to eight (8) wireless profiles per site that are available to AMT clients assigned to that site Set the wireless information during AMT provisioning and configure all required profile settings (SSID, key management, encryption, etc.) Send wireless profile operations to the Intel translator on AMT systems with revisions earlier than 3.2.1 End Point Access Control: 802.1x support Provision 802.1x settings on AMT wireless clients during AMT provisioning Send 802.1x settings to the Intel translator on AMT systems with revisions earlier than 3.2.1 Data Store (3PDS) Write string data into 3PDS on AMT through OOB management console Access Monitor: Audit Log Enable or Disable Audit Log (no critical event settings) View Audit Log through OOB Console Remote Power Management Power State Configuration (ME on in S0, ME on in S0 and S3 but off in S5, ME is Always On)
14
Intel® vPro™ Provisioning
14
15
What is Intel® vPro™ Provisioning?
Provisioning is the process by which an Intel ® vPro™ System is configured with the appropriate parameters to… allow it to become manageable & operational within an IT environment This process is sometimes referred to as Setup & Configuration Provisioning sets parameters in the Manageability Engine (ME) Example parameters: Administrator credentials AMT Host Name Networking details (DHCP,VLAN, etc.) Microsoft refers to the Manageability Engine as the Management Controller Microsoft refers to the Manageability Engine as the Management Controller
16
Intel® vPro™ Manageability Engine BIOS Extension (MEBx)
The MEBx is the user interface to the Manageability Engine (ME); it allows for the configuration of settings that control the operation of the ME The MEBx is an option ROM module provided to the OEM by Intel that is an extension to the system BIOS The Manageability Engine runs on an embedded processor inside the Memory Controller Hub (MCH) and is responsible for executing the various AMT functions (Remote Power, IDE-Redirection, etc.)
17
Access the MEBx on your vPro system and perform a full unprovision of AMT
Start up the Intel® vPro™ Laptop (e.g. LNVT400-01) During boot process, press the Blue ThinkVantage button to access the MEBx interface (other OEM systems you hit CTRL+P to access the MEBx) Select F12 at the Startup Interrupt Menu Select <Enter ME Configuration Screens> Type to login to the MEBx (admin is default when shipped from OEM but has been modified for this training) Select Intel AMT Configuration and Enter Select Un-Provision and Enter Enter Y to Reset AMT Provisioning Select Full Unprovision and Enter After the Unprovision is complete, hit the ESC key and Select Exit Enter Y to reboot the system Note: This will Fully unprovision the MEBx and set it back to factory default mode with the exception of the local MEBx password. This is the manual method to unprovision AMT but is not usually required in the production environment as it can be done remotely.
18
SCCM Primary Site Server
ConfigMgr SP2 Remote Provisioning Process InBand Agent Based Provisioning ConfigMgr Agent checks in with ConfigMgr Server for policies If Auto-Provisioning Policy is enabled, ConfigMgr Agent will generate and send an OTP to Intel AMT and ConfigMgr Server ConfigMgr Server performs a discovery of Intel AMT ConfigMgr places Intel AMT discovered systems in a Not Provisioned Collection that has auto-provisioning policy enabled ConfigMgr Agent checks for auto-provisioning policy --Provisioning Started— Agent Sets OTP in Intel AMT and sends to ConfigMgr server Intel AMT sends embedded hashes to ConfigMgr server ConfigMgr sends Remote Config Certificate to Intel AMT for authentication Intel AMT validates Remote Config Certificate is issued by a trusted CA in Intel AMT firmware Configuration data passed to Intel AMT over a secure tunnel Recommended ConfigMgr Setup approach: Setup Collection for Not-Provisioned Intel® vPro™ Systems Enable Network discovery or manaual discovery if system is Intel® AMT capable Machine will be place in collection Benefits for this approach: Only provision Intel AMT systems Reduce network load 1 Intel® vPro™ Clients 2 SCCM Primary Site Server 4 3 Another look at SCCM provisioning process flow: 8 5 6 7 9 18
19
Agent Based Provisioning and Infrastructure Services
Based on policy, the Configuration Manager Agent will assess if the Client can be provisioned,. If I can, it will create a One Time Password and send the OTP to both the OOB Service and into the Intel® AMT Firmware OOB Service Point secures connection with the Intel AMT client through Embedded AMT Self Sign Certificate, Present Provisioning Certificate along with the OTP for initial Authentication OOB Service Point sets the Remote Admin and Intel® MEBX password (if not changed) OOB Service Point requests a web server certificate on behalf of the Intel AMT client OOB Service Point created an Object in AD for the Intel® vPro™ Client OOB Service Point pushes web server certificate to Intel AMT client OOB Service Point pushes ACL, power schema, and other configuration data to Intel AMT to finalize provision
20
Remote Access Training Lab Environment (skip to foil 23 if you are running local copies of the virtual images on the provided demo kits) 20
21
Login to the Lab – Step 1 On your Internet Browser, enter the URL You will be taken to the Logon screen as shown to the right. Please enter Username and Password provided to you. On the next screen, you will be provided with web application choices. Please choose ‘Hands-On Training’ option for this training session Accept the security alert pop ups that will follow (note: some of these security alerts will be removed in a future release) 21
22
Accessing SCCM Console (needed to execute next few steps)
Upon successful authentication you will be directed to the ConfigMgr Training Cube with tow images as shown. The one named DC1 represents root domain Controller (with DNS/DHCP etc.), and the one named SCCMSP2 has ConfigMgr. Click on Connect to open DC1 virtual machine which is needed for subsequent steps. 1st time, when you access virtual machine console, VMWare Lab Manager will install ActiveX plug-in. Click on “Click here to install the following ActiveX control:’vmware-mks.cab’ from ‘VMWare Inc.’” message, and click on “Install” popup window and wait for install to complete. 22
23
Physical Hands-on Training Lab Environment
23
24
Physical Lab Environment Overview
All passwords = Virtualized Machine Environment Laptop Intel vPro Laptop/Desktop AMT firmware (4.x, 5.x or 6.x) ConfigMgr 2007 SP1 Server Microsoft AD PKI\Ent Root CA DNS/DHCP SQL 2005 Infrastructure Image ConfigMgr Image x Note: A minimum of 4G of memory should be installed on the host machine running the Virtual images
25
Launch the Microsoft Virtual Infrastructure Image
Start the laptop (e.g. HP6930P) hosting the Virtual Images Double Click the shortcut DC1 on the Desktop of the host OS to start the Infrastructure VM image Note: To Maximize/Minimize the Virtual Image window CTRL + ALT + ENTER As needed, Use CTRL+ ALT + Insert to login Login Information Domain Admin: ITproadmin Password: Domain: VPRODEMO Note: Make sure you have not started your ConfigMgr 2007 SP1 SP1 Server Image up until after completing the configuration of your infrastructure image.
26
Lab Module 1 Configure the Active Directory and PKI Infrastructure to support Configuration Manger 2007 SP2 and Intel® vPro™ Systems
27
Prepare Active Directory Domain Services for Out of Band Management
28
Active Directory Configuration
Active Directory OU container must be created to store Intel® AMT device objects Recommended Name: Out of Band Management Controllers Primary site server computer account (ConfigMgr 2007 SP2 Server) must be granted Full Control permissions on the OU and all child objects in the OU Schema Extension not required for Intel® vPro™ support However Schema Extension is required for other ConfigMgr 2007 SP2 features and make ConfigMgr 2007 SP2 Client Agent Deployments easier (required for Agent Based provisioning) Extend AD Schema (optional):
29
Create Active Directory Security Group for ConfigMgr 2007 SP2 Primary Site Servers
On your Domain Infrastructure Image, Click Start > Programs > Administrator Tools > Active Directory Users and Computers Note: Under the View menu option, ensure Advanced Features is checked Expand the vProDemo.com domain Right Click on Users and select New > Group In the New Object - Group dialog box, type ConfigMgr Primary Site Servers Click OK
30
Add ConfigMgr 2007 SP2 Server as a member to the Security Group
In the Active Directory Users and Computers, right-click the ConfigMgr Primary Site Servers Group and select Properties In the ConfigMgr Primary Site Servers Properties window, select the Members tab and click Add Add the MSSCCM server and click OK (make sure to click the Object Types button and check Computers to find SCCM Computer Account) Click OK to close the Properties window Note: Your ConfigMgr server is now a member of your ConfigMgr Primary Site Servers Group and will be used later for applying security rights to AD OUs and Certificate Templates. Make sure you have not started up the ConfigMgr server image while setting up this server security setting. If you have the ConfigMgr server running, please shutdown now.
31
Create Active Directory OU for Client Management Controller Objects
On your Infrastructure Image, Click Start > Programs > Administrator Tools > Active Directory Users and Computers Right Click on vProDemo.com > New > Organizational Unit In the New Object - Organizational Unit dialog box, type Out of Band Management Controllers click OK Note: Active Directory Schema extensions are NOT required for AMT OOB Management functionality. Taken from the SCCM Help File: Out of band management in Configuration Manager 2007 SP2 requires that Configuration Manager publishes a computer object to an Active Directory container for each domain that will manage computers out of band. Two actions need to be taken so that computers provisioned for out of band management can be published to Active Directory Domain Services: Create the Active Directory container in the domain partition. Configure security permissions on the container. When these actions are complete, you must then configure the out of band management component to use this container, in the Out of Band Management Component Configuration Properties: General Tab. Extending the Active Directory schema and publishing site information to Active Directory Domain Services is not required for out of band management, but it is recommended for other features and functionality in Configuration Manager.
32
Add ConfigMrg Primary Site Servers Security group to the Management Controller OU
Right-click Out of Band Management Controllers OU and click Properties In the Out of Band Management Controllers Properties window, click the Security tab Click Add and select the ConfigMgr Primary Site Servers group Click OK to add the group, but DO NOT close the Properties window…continue to next slide to set full control for this group.
33
Give Full Control for ConfigMrg Primary Site Servers Security group to the Management Controllers OU
Check Full Control for ConfigMgr Primary Site Servers Security Group With ConfigMgr Primary Site Servers selected, click Advanced Highlight ConfigMgr Primary Site Servers group, and click Edit In the Apply to drop down, select This object and all descendant objects Click OK 3 times Note: We have now created an AD OU and given the ConfigMgr 2007 SP2 proper permission to create AMT objects for each vPro system during the provisioning phase.
34
Create RADIUS Security Group for AMT devices
On your Infrastructure Image, Click Start > Programs > Administrator Tools > Active Directory Users and Computers Expand vProDemo.com and Right Click on Users and select New > Group In the New Object – Group Windows, enter AMT RADIUS Clients in the Group name field Click OK We have now created an AD OU and given the ConfigMgr 2007 SP2 proper permission to create AMT objects for each vPro system during the provisioning phase.
35
Set Permissions on RADIUS Security Group
Right Click on AMT RADIUS Clients Group and select Properties In the AMT RADIUS Clients Properties Window, Click the Security Tab and Click the Add button In the Select Users, Computers, or Groups Window, add ConfigMgr Primary Site Servers Click OK Select the ConfigMgr Primary Site Servers and select Full control COMPLETED: We have now created an AD OU, AMT Radius Group, and given the Security Group that ConfigMgr 2007 SP2 Server is a member of, the proper permission to create Management Controllers objects for each Intel® vPro™ system during the provisioning phase.
36
Configure PKI Web Server Certificates for each Management Controller
37
Closer look at Certificates with ConfigMgr 2007 SP2 and Intel® vPro™
There are three types of Certificates that are used in association to Intel vPro client provisioning and management within ConfigMgr 2007 SP2 Intel® AMT Self Signed Certificate Used during PKI provisioning to secure the connection Transparent to process Intel® AMT Provisioning Certificate Used for Remote Configuration authentication by the Out of Band Service Point Can be generated from Internal PKI Infrastructure or purchased from 3rd Party CA (VeriSign*, GoDaddy*, Comodo, Starfield) Provisioning certificate can be generated from internal PKI environment Require Internal Root hash to be imported into the MEBx Requires Option 15 set on DHCP to support “Zero Touch” Configuration Intel® AMT Web Server Certificate Used to secure a connection to Intel AMT client by the management console Issued to the Intel AMT client during the provisioning process ConfigMgr 2007 SP2 requires the certificate to be issued by a Microsoft Enterprise CA PKI certificate key sizes <=2048-bits
38
Enterprise CA & Provision Certificate Configuration
Assumes that a Microsoft Enterprise CA exists and is already configured Two Certificates Required: Intel® AMT Provisioning & Intel AMT TLS Web Server Cert Intel AMT Provisioning Certificate (Used for Provisioning) Determine 3rd party or Self Generated 3rd Party CA (VeriSign*, Go Daddy*, Comodo, Starfield) Self Generated from Internal PKI infrastructure Export Cert for ConfigMgr 2007 SP2 / WS-MAN Translator in later configuration step Web Server Certificate (Intel AMT TLS Cert used for securely managing vPro) Create New Web server Template Recommend certificate name: ConfigMgr AMT Web Server Certificate Primary site server computer account (ConfigMgr 2007 SP2 Server) must have Read/Enroll permissions 802.1x RADIUS Certificate (Optional for 802.1x networks) Create New RADIUS Client Template for 802.1x network Allows AMT to securely authenticate to an 802.1x network without an OS present Recommend certificate name: ConfigMgr AMT 802.1X Client Authentication Certificate Ensure you select Supply in the request to provide the Subject Name Primary site server computer account (ConfigMgr 2007 SP2 Server) must have Read/Enroll permissions
39
Configure PKI Web Server Certificate Template
Open your Certificate Authority issuing PKI Server - Click Start > Programs > Administrator Tools > Certification Authority Expand DC1.vprodemo.com Note: This is a Microsoft Enterprise Certificate Authority, Standalone CAs are not supported with ConfigMgr 2007 SP2 for Intel® vPro™ Right Click on Certificate Templates > Manage
40
Configure PKI Web Server Certificate Template
In the Certificate Templates Console on the right hand window pane, right click on Web Server and select Duplicate Template In the Duplicate Template Window Select the radio button for Windows 2003 Server, Enterprise Edition Click OK In the Properties of New Template Window on the General Tab: Enter ConfigMgr AMT Web Server Certificate Proceed to next foil to set security rights on this template
41
Apply Security Permission to Web Server Certificate Template
In the Properties of New Template window, click the Security tab Click Add Select ConfigMgr Primary Site Servers group Click OK With the ConfigMgr Primary Site Servers group highlighted, check Read and Enroll Close the Certificate Templates Console Unchecking “Allow Enroll” for Enterprise Admins and Domain Admins is standard security practices per Microsoft setup documentation. Is not required for vPro to work but more to follow strong security practices.
42
Issue Web Server Certificate Template
In the Certification Authority Window, Right Click on Certificate Templates > New > Certificate Template to Issue In the Enable Certificate Templates Window, select ConfigMgr AMT Web Server Certificate (this template created in the previous step) Click OK
43
Web Server Certificate Template issued in CA for use by ConfigMgr 2007 SP2
In the Certification Authority Window > Certificate Templates, you will now see ConfigMgr AMT Web Server Certificate listed in the right hand window and ready for use by the Out of Band Service Point Note: This Web Server Template will be used by ConfigMgr 2007 SP2 to generate a unique certificate for each Intel® AMT system during the provisioning process and used for TLS session during management of Intel AMT.
44
Configure RADIUS Client Certificate Template
Open your Certificate Authority issuing PKI Server - Click Start > Programs > Administrator Tools > Certification Authority Expand DC1.vprodemo.com Right Click on Certificate Templates > Manage
45
Configure RADIUS Client Certificate Template
In the Certificate Templates Console on the right hand window pane, right click on Workstation Authentication and select Duplicate Template In the Duplicate Template Window Select the radio button for Windows 2003 Server, Enterprise Edition Click OK In the Properties of New Template Window General Tab: Enter ConfigMgr AMT 802.1X Client Authentication Certificate Subject Name Tab: Select Supply in the request Click OK in the warning message Proceed to next foil to set security rights on this template
46
Apply Security Permission to ConfigMgr AMT 802
Apply Security Permission to ConfigMgr AMT 802.1X Client Authentication Certificate Template In the Properties of New Template window, click the Security tab Click Add Select ConfigMgr Primary Site Servers group Click OK With the ConfigMgr Primary Site Servers group highlighted, check Read and Enroll Close the Certificate Templates Console Unchecking “Allow Enroll” for Enterprise Admins and Domain Admins is standard security practices per Microsoft setup documentation. Is not required for vPro to work but more to follow strong security practices.
47
Issue RADIUS Client Certificate Template
In the Certification Authority Window, Right Click on Certificate Templates > New > Certificate Template to Issue In the Enable Certificate Templates Window, select ConfigMgr AMT 802.1X Client Authentication Certificate (this template created in the previous step) Click OK
48
RADIUS Client Certificate Template issued in CA for use by ConfigMgr 2007 SP2
In the Certification Authority Window > Certificate Templates, you will now see ConfigMgr AMT 802.1X Client Authentication Certificate listed in the right hand window and ready for use by the Out of Band Service Point Note: This Certificate Template will be used by ConfigMgr 2007 SP2 to generate a unique certificate for each Intel® AMT system and stored in the firmware during the provisioning process and allow vPro systems to authenticate to an 802.1x network while OS is in a sleep/off state.
49
Configure Root CA to Allow Revocation of Client Management Controller Certificates
In the Certification Authority Window, right click on DC1.vprodemo.com and select Properties In the DC1.vprodemo.com Properties Window, select the Security tab Click Add
50
Configure Root CA to Allow Revocation of Client Management Controller Certificates
Add the ConfigMgr Primary Site Servers group Click OK Select the ConfigMgr Primary Site Servers group Check Allow Issue and Manage Certificates and Request Certificates permissions for this group Note: This setting is required when you are performing actions like an unprovision of the Management Controller. This will keep your PKI Issued certificates cleaned up (revoked).
51
Lab 1 Exercise Review Active Directory Changes Enterprise PKI Changes
Created Active Directory Security Group for ConfigMgr 2007 SP2 Primary Site Servers Added ConfigMgr 2007 SP2 Server as a member to the Security Group Created Active Directory OU for Client Management Controller Objects Added ConfigMgr Primary Site Servers Security group to the Management Controller OU Gave Full Control for ConfigMgr Primary Site Servers Security group to the Management Controllers OU Enterprise PKI Changes Configured PKI Web Server Certificate Template Applied Security Permission to Web Server Certificate Template Issued Web Server Certificate Template for use by ConfigMgr 2007 SP2 Created RADIUS Client Template and issued for RADIUS certificates Configure Root CA to Allow Revocation of Client Management Controller Certificates
52
Lab Module 2 Install and Configure Configuration Manager 2007 SP2 Out of Band Service Point to support Intel® vPro™ Systems
53
Launch the Microsoft Virtual PC ConfigMgr Image
Double Click the shortcut SCCM SP2 on the host OS to start the SCCM SP2 VM image (leaving the Infrastructure running in parallel) Note: To Maximize/Minimize the Virtual Image window CTRL + ALT + ENTER As needed, Use CTRL+ ALT + Insert to login Login Information Domain Admin: ITproadmin Password: Domain: VPRODEMO
54
ConfigMgr 2007 SP2 Out-of-Band Management Service Point
OOB Management : Out of band management allows an administrator to connect to a computer's management controller (a.k.a. Management Engine) when the computer is turned off, in sleep or hibernate modes, or otherwise unresponsive through the operating system. ( OOB Service Point – ConfigMgr 2007 SP2 Service component (role) responsible for provisioning and managing Management Controllers (aka Intel® AMT). Installing: ME is referenced as a Management Controller by Microsoft
55
ConfigMgr 2007 SP2 Prerequisites http://technet. microsoft
Prior to ConfigMgr 2007 SP2 install, ensure ALL prerequisites are met (see link above of complete list) Telnet is installed on computers running the OOB management console with Vista and Windows 2008 (used for SoL) IE / Kerberos authentication on non-standard port HotFix (KB908209) – hotfix is for IE6 but registry key applies to all IE versions If ConfigMgr 2007 SP2 is not installed, install prior to ConfigMgr 2007 SP2 setup and config Refer to Microsoft’s Install and Configuration documentation Download and Install ConfigMgr 2007 SP2: Create a ConfigMgr 2007 SP2 Site Boundary
56
Install Out of Band Service Point
Open the ConfigMgr Console (short-cut located on the desktop of the SCCM image) Navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site > Site Settings > Site Systems Right-click \\MSSCCM and click New Roles to launch the New Site Roles Wizard
57
Install Out of Band Service Point
On the General page, click Next (default settings)
58
Install Out of Band Service Point
On the System Role Selection page, check Out of band service point, and click Next
59
Install Out of Band Service Point
On the Out of Band Service Point page, click Next Click Next again on Summary page
60
Install Out of Band Service Point
Once the Wizard completes, click Close You have now added the required Service Role to support Intel® vPro™ Systems through ConfigMgr 2007 SP2.
61
Install Out of Band Service Point
You will now see ConfigMgr out of band service point listed under the \\MSSCCM Roles Note: After installing the ConfigMgr 2007 SP2 Out of Band Service Point, the log file C:\Program Files\Microsoft Configuration Manager\Logs\AMTSPSetup.Log can be reviewed to inspect the success or failure of the installation.
62
Configure Out of Band Component - General
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site> Site Settings > Component Configuration Right-click Out of band management component, and click Properties
63
Configure Out of Band Component - General
In the Out of Band Management Properties window on the General tab, Under the Provisioning Settings, click Browse to select the Active Directory container to store each Intel® AMT object Note: These fields may already be populated with the correct information from past lab exercises – use this screen as a reference if that is the case. Select Out of Band Management Controllers from vProDemo Domain Note: This is the OU created in Exercise 1 Click OK
64
Configure Out of Band Component - General
Click Set and provide the Intel® MEBX admin password (please us for this exercise) to be set during provisioning Click OK Note 1: This Intel MEBX password setting is used for ConfigMgr 2007 SP2 to change the local password on the Management Controller during the provisioning process. By default, the factory setting for the password is admin. If this local password was manually changed on the Intel MEBX or from a previous provisioning process, this setting will be ignored. The local Intel MEBX password can only be changed remotely if the password is set to factory default (admin). Note 1
65
Configure Out of Band Component - General
Check the box to Allow out of band provisioning Note 1: Out of Band provisioning provides alternative methods to provision devices without an OS or SCCM Client. The preferred method is to use inband SCCM agent based provisioning shown in later modules. Intel® AMT Provisioning port can be modified if necessary, but requires modification (physical touch) on each Management Controller (leave default 9971). Click Yes in the Security Warning to Allow for Out of Band Provisioning. Note: OOB Provisioning is not required if you are going to leverage inband SCCM Agent based provisioning (preferred method). This option is for scenarios like bare metal provisioning when no host OS or SCCM client agent is available. Note 1
66
Configure Out of Band Component - General
Check the box to Register ProvisionServer as an alias in DNS Note: This creates an Alias in your DNS environment to allow provisioning hello packets from AMT to get routed to the ConfigMgr 2007 SP2 server used in PSK / Bare Metal Provisioning and SCS -> ConfigMgr 2007 SP2 migration. This would not apply or be necessary for in-band ConfigMgr 2007 SP2 Agent initiated Provisioning.
67
Configure Out of Band Component - General
Under the Certificates section, Click Browse and select the Intel(R) Client Setup Cert – GoDaddy vProDemo.com and vProDemo.us UCC Backup.pfx (located in z:\GoDaddy_vProDemo) Click Open Note: This is the Remote Configuration Certificate (previously purchased from GoDaddy* which could also be purchased from VeriSign*, Comodo, or Starfield) and used for Remote Provisioning. The Root hash that issued this certificate can be found pre-configured in the Management Controller’s firmware that ships from the OEM. Enter the password for this certificate (Pr0t3ct!0n) and click OK Note: Zeros are used in the above password Note: If the password is incorrect, you will receive and Invalid Password message. If the certificate is not a valid Remote Configuration Certificate, you will receive an Invalid Certificate message.
68
Configure Out of Band Component - General
Click Select for the AMT Certificate Template Select Issuing CA: DC1.vprodemo.com CA name: DC1.vprodemo.com AMT certificate template: ConfigMgr AMT Web Server Certificate Note: This is the Certificate Template created in Exercise 1 on the Infrastructure Domain image. Click OK Click Apply SCCM requires the use of Web Server certificates that are issued by an internal PKI environment. This requirement can only use Enterprise PKI. The purpose of these Web Server certificates are to store one unique certificate on each AMT system for the purpose of TLS when managed by SCCM via OOB management console.
69
Configure Out of Band Component – Intel® AMT Settings
Note: These fields may already be populated with the correct information from past lab exercises – use this screen as a reference if that is the case. On the AMT Settings tab, click icon to add AMT User Accounts In the AMT User Account Setting window, click Browse and add the VPRODEMO\AMTAdmins account, click OK Check the Platform Administration box which will automatically select all options by default Click OK Click Apply Note: This account specifies the rights to the management controller for selected capabilities to Intel® AMT. Kerberos accounts are the only option available for SCCM to manage vPro systems. In the last Provisioning Settings tab, you can add Digest Accounts only for the purpose of other ISV console to manage with the listed Digest accounts. The check box for the Supported AMT features equate to what was referred to as Realms in SCS.
70
Configure Out of Band Component – Intel® AMT Settings
In the Default IDE-redirect image text box, enter \\DC1\IDER\rds_rw.iso In the drop down menu for Manageability is on in the following power states: select Always on (S0-S5) Note: This setting will ensure the Management Controller is on regardless of the state of the Operating System (on, sleep, hibernate, off) Check the boxes: Enable Web interface Enable serial over LAN and IDE-redirect Allow ping responses Enable BIOS password bypass for power on and restart commands Enable Support for Intel WS-MAN Translator (covered in Legacy Provisioning Class) Default setting for Kerberos clock tolerance (5) Click Apply IDE-R location must be a network share and not a local drive
71
Configure Out of Band Component – Provisioning Settings
On the Provisioning Settings Tab, click to add a Digest User and Password for Provisioning Enter: Name: admin Password: Confirm Password: Description: Digest Account Click OK Click APPLY Note: This digest account will be used for provisioning if the default remote admin password has been modified. Determine if this account is necessary for your environment
72
Configure Out of Band Component – Audit Settings
On the Audit Settings Tab, check All of the AMT features to enable auditing Click APPLY Note: To unprovision a system from the MEBx you have to disable audit log first. Select the audit settings that are applicable to your production environment.
73
Configure Out of Band Component – Provisioning Schedule Settings
On the Provisioning Schedule Tab, change the Simple Schedule to 1 hour Click OK Note: By default, Intel AMT systems will attempt to initiate in-band provisioning every 24 hours. This default option is modified by these settings so the provisioning will occur on a more frequent basis. Another Option is to use the Custom Schedule so you can configure a start date and time with a reoccurrence pattern.
74
Lab Module 2. 1 Advanced Out of Band Configuration The following 2
Lab Module Advanced Out of Band Configuration The following 2.1 module is an advanced topic on 802.1x and Wireless Profiles
75
802.1x and Wireless Profiles
Requirements: This section is for advanced vPro users that are familiar with 802.1x networking and RADIUS server for authentication Wireless AP = Linksys Dual-Band Wireless N Gigabit router that supports 802.1x There are many options available for wireless and 802.1x profiles and this training will only cover one set (refer to Microsoft TechNet for complete list of supported protocols) The RADIUS Server (Microsoft NPS – Windows 2008 Server) has been Pre-Configured for training How to:
76
Configure Out of Band Component – 802.1x Settings
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site> Site Settings > Component Configuration Right-click Out of band management component, and click Properties On the 802.1x and Wireless Settings Tab, check the box for Enable 802.1x authentication for wired network and click Set Note: This setting will provision the vPro system with proper 802.1x credentials in order for the device to authenticate to a protected 802.1x network. The RADIUS server is pre-configured for this lab and steps to setup this RADIUS server is out of scope for this training module.
77
Configure Out of Band Component – 802.1x Settings
In the 802.1x Wired Network Access Control window, click the Select button In the Trusted Root Certificate for Radius authentication window, select the radio button for From certificate authority (CA): and select DC1.vprodemo.com from the drop down menu Click OK Note: This certificate is the root certificate from the Enterprise CA on the infrastructure image to communicate with the Radius server. The Radius server is pre-configured on the infrastructure server for training purposes.
78
Configure Out of Band Component – 802.1x Settings
In the 802.1x Wired Network Access Control window, select EAP-TLS from the drop-down menu for Client Authentication Method Click the Select button to select a Client Authentication Client Certificate template In the RADIUS Client Certificate Configuration windows, select the following: Issuing CA: DC1.vprodemo.com CA name: DC1.vprodemo.com RADIUS client Certificate template: ConfigMgr AMT 802.1X Client Authentication Certificate Click OK twice to complete 802.1x configurations Note: This template will be used by the Site Server during the provisioning process to generate an 802.1x Radius Certificate for each AMT device.
79
Configure Out of Band Component – Wireless Settings
On the 802.1x and Wireless Settings Tab, click the icon to create a wireless profile In the Wireless Profile Window, enter the following information: Profile Name: ProDemoAP Network name (SSID): ProDemoAP Security Type: WPA2-Enterprise Encryption method: AES
80
Configure Out of Band Component – Wireless Settings
In the 802.1x authentication section, click the Select button under Server authentication In the Trusted Root Certificate for Radius Authentication window, select the radio button for From certificate authority (CA): and select DC1.vprodemo.com from the drop down menu Click OK In the 802.1x authentication section, click the Select button under Client authentication In the RADIUS Client Certificate Configuration windows, select the following: Issuing CA: DC1.vprodemo.com CA name: DC1.vprodemo.com RADIUS client Certificate template: ConfigMgr AMT 802.1X Client Authentication Certificate Click OK twice to complete wireless configurations
81
Configure Out of Band Component – Wireless Settings
In the Security Group for RADIUS authentication section, select the radio button for Automatically add AMT-based computers to security group Click the Browse button to choose a Security group for RADIUS Server In the Select Group window, add AMT RADIUS Clients Click OK – 2 times Note: This completes the configuration for the 802.1x and Wireless profile setting.
82
Configure New Site Boundary
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site > Site Settings Right click on Boundaries and select New Boundary Enter the following fields Description = Net Boundary Site Code = PRO - vPro Demo Primary Site Type = IP address range Starting Address = Ending Address = Network Connection = Fast Click OK Note: This will allow the SCCM agent to discover the ConfigMgr Site Server. Congratulations! You have configured ConfigMgr 2007 SP2 for Intel® vPro™ Clients
83
Lab 2 Exercise Review Installed OOB Service Component and configured Properties Used to Configure General OOB Properties and Intel® AMT Client Profile Configured General Tab Provisioning Settings - Active Directory container Stores Intel AMT Objects Select AD Container previously created: Out of Band Management Controllers Provisioning Settings – Intel® MEBx Account What to set the Intel MEBx Password (if not already set) and remote admin account to during Provisioning Register ProvisionServer as an alias in DNS (used for PKI/PSK (Bare Metal) hello packet routing to OOB Service Point) Certificate – Provisioning Certificate PKI / Remote Configuration Certificate Configure with certificate exported during Enterprise CA & Provision Certificate configuration Certificate – Certificate Template Configure with template created during Enterprise CA & Provision Certificate configuration: ConfigMgr AMT Web Server Certificate and RADIUS Certificate
84
Lab 2 Exercise Review Configured Intel® AMT Settings Tab
Intel AMT User Accounts Allows you to define Kerberos user who can invoke Intel AMT features Define which accounts have which Intel AMT realm permissions Default IDE-redirect image Default location of image files Manageability Power States Sets power state for when you want to manage the AMT-based computer out of band (S0 – S5) Enable Web interface Enables / Disables Intel AMT web interface for provisioned Intel AMT clients Enable Serial Over LAN and IDE redirection Enables / Disables SOL and IDER for provisioned Intel AMT clients Allow ping responses Enables / Disables ping responses for provisioned Intel AMT clients Enable support for Intel® WS-MAN translator Enables support within ConfigMgr 2007 SP2 to forward Provisioning and Intel AMT operation command to the Intel WS-MAN Translator for firmware less than 3.2.1
85
Lab 2 Exercise Review Configured Provisioning Settings Tab
Add Provisioning and Discovery Accounts Allows you to define additional Digest accounts that can be used to provision and discover AMT systems if the standard default account has been modified Configured 802.1X and Wireless Tab Created wired and wireless profiles to be added to AMT during the provisioning process to allow AMT to authenticate to an 802.1x protected network Automatically added AMT devices to a security group for RADIUS authentication Configured Audit Settings Tab Enabled the features to be audited by AMT Configured Provisioning Schedule Tab Specified a specific schedule for AMT systems to initiate provisioning Configured Site Boundary for Agent discovery
86
Lab Module 3 Configuration Manager 2007 SP2 Collections and In-Band Provisioning
87
ConfigMgr 2007 SP2 Agent Installation and InBand Provisioning
In this exercise, you will Install the ConfigMgr 2007 SP2 Client Agent on an Intel® vPro™ system (e.g. Intel vPro Laptop/Desktop) Create an Unprovisioned vPro Client Collection to place discovered Unprovisioned systems and enable the auto-provisioning policy on this collection Initiate an InBand remote configuration provisioning of an Intel vPro system with native ConfigMgr 2007 SP2 support NOTE: Bare Metal / Out-of-Band provisioning (No OS or SCCM Client) is supported but not covered in this training) – for information on this process see: SCCM Out of Band Provisioning (Bare Metal Provisioning)
88
Agent Based Provisioning Process
Based on policy, the Configuration Manager Agent will assess if the Client can be provisioned,. If I can, it will create a One Time Password and send the OTP to both the OOB Service and into the Intel® AMT Firmware OOB Service Point secures connection with the Intel AMT client through Embedded AMT Self Sign Certificate, Present Provisioning Certificate along with the OTP for initial Authentication OOB Service Point sets et Remote Admin and Intel® MEBX password (if not changed) OOB Service Point requests a web server certificate on behalf of the Intel AMT client OOB Service Point created an Object in AD for the Intel® vPro™ Client OOB Service Point pushes web server certificate to Intel AMT client OOB Service Point pushes ACL, power schema, and other configuration data to Intel AMT to finalize provision
89
Install ConfigMgr 2007 SP2 Client Agent on local system
Login to the Intel® vPro™ Laptop User: ITproadmin Password: Domain: VPRODEMO Once logged into the Intel® vPro™ client, map a drive to \\mssccm\c$ Go to Program Files\Microsoft Configuration Manager\Client In the Client folder, double click ccmsetup.exe Note: This will install the SCCM SP2 client from you SCCM Site server. This Intel vPro system must be joined to the infrastructure domain – Prior to the client setup.
90
Monitor ConfigMgr 2007 SP2 Client Agent Install
Track the setup by monitoring the Process ccmsetup.exe in Task Manager Installation is complete once the CcmExec.exe process is running in Task Manager You can track the agent installation on the client in c:\windows\system32\ccmsetup\ccmsetup.log (for Vista 64bit file is located in c:\windows\SysWOW64\CCM) Note: Once the installation is complete, you will see CcmExec Service running in Task Manager. A reboot of the vPro system will help speed up the SCCM agent to check in with the Site Server.
91
SCCM Agent discovered in ConfigMgr
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections Right Click on All System and select Update Collection Membership After a few moments, right click All Systems and select Refresh Note: You will see the client system in All Systems that you installed the SCCM Client. You will also see a Yes in the Client Column and listed as Approved. This integration into ConfigMgr happens after the SCCM Client has been installed and checked in with the site server. This may take several minutes. Do not proceed until this client shows up in SCCM.
92
Configuration Manager 2007 SP2 Collection Configuration for Automatic Provisioning of Management Controllers
93
Collection Configuration
In this exercise, you will Create an Intel® AMT Collection to group Intel AMT systems that are AMT Capable and unprovisioned Configure an Intel AMT Collection to automatically provision Out of Band Management Controllers
94
Agent Based Provisioning Configuration Overview
To provision via the ConfigMgr 2007 SP2 Client Agent, you must configure ConfigMgr 2007 SP2 to allow agent integration Requirements for Agent Prerequisites for Configuration Manager Client Deployment Configure Collection for Automatic Provisioning Recommend Collection Created for “Unprovisioned vPro Clients” Create Collection Membership Rules based on Intel® AMT Hardware Inventory Ensure “Enable Automatic out of band management controller provisioning” checked in Collection Name Settings: Out of Band Tab for Collection Install ConfigMgr 2007 SP2 client on Intel AMT Client
95
Create Intel® AMT Unprovisioned Collection
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections Right click on Collections and select New Collection In the New Collection Wizard, enter the name Unprovisioned vPro Clients and add optional Comments as required Click Next
96
Modify Membership Rules for the Unprovisioned Collection
In the Membership Rules window, click the Query Rule Properties (it is the Database icon)
97
Edit Query Statement in the Membership Rules
In the Query Rule Properties window, enter the name Unprovisioned vPro Clients Click Edit Query Statement... In the Unprovisioned vPro Clients Query Statement Properties window, click Show Query Language
98
Add AMTStatus check to Query Statement
In the Query Statement textbox, type: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System inner join SMS_G_System_AMT_AGENT on SMS_G_System_AMT_AGENT.ResourceID = SMS_R_System.ResourceId where SMS_G_System_AMT_AGENT.AMT >= "0" and (SMS_R_System.AMTStatus != "3" or SMS_R_System.AMTStatus is NULL) Note: This query statement can be found in a text file under w:\SCCM New Hardware Inventory Query.txt. This will pull all the clients into this collection that are discovered Intel® vPro™ capable and not provisioned. Note: Additionally you can setup up a collection for Provisioned Clients, in the Query Statement textbox, you will use: Select * from SMS_R_System where AMTStatus=3 This will show ALL vPro systems that have been provisioned. Click OK and OK again on the Query Rule Properties Window In the Membership Rules window, click Next
99
Create Intel® AMT Unprovisioned Collection
In the Advertisements window, click Next
100
Create Intel® AMT Unprovisioned Collection
In the Security window, add any appropriate users or groups and click Next (keep defaults for this exercise) In the Confirmation window, click Close Note: Optional step - Repeat foils to create a collection for Provisioned vPro Clients. See note on foil 98 for Select * from SMS_R_System where AMTStatus=3
101
Enable Automatic OOB provisioning for the Unprovisioned Collection
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections > Unprovisioned vPro Clients Right click on Unprovisioned vPro Clients and select Modify Collection Settings In the Unprovisioned vPro Clients Settings window, click the Out of Band tab Check the checkbox Enable Automatic out of band management controller provisioning and click OK Note: This setting enables ConfigMgr 2007 SP2 Clients to automatically provision Intel® AMT with ConfigMgr 2007 SP2.
102
DON’T THINK WE NEED THIS STEP WITH NEW QUERY
Add Intel® AMT Display Columns to the collection In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections > Unprovisioned vPro Clients Click the Unprovisioned vPro Clients collection, right click in the right hand window, and select View > Add/Remove Columns In the Add/Remove Columns window, add AMT Status and AMT Version to the Displayed columns and move these fields below the Name field for easy viewing Click OK Note: Perform these same steps for the All Systems collection. This will allow you to see Intel AMT related information in the collection. DON’T THINK WE NEED THIS STEP WITH NEW QUERY
103
Configure Site Parameters to Use Secure Remote Power Control
To allow ConfigMgr 2007 SP2 to use AMT Power On commands with advertisements, Wake On LAN for the site needs to be Enabled In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site Right click on PRO – vPro Demo Primary Site server and select Properties Select the Wake on LAN tab Check the Enable Wake on LAN for this site Select Use power on commands only Click OK Note: This will allow ConfigMgr 2007 SP2 to wake-up Intel® AMT enabled systems with secure and authenticated wake-up methods in Intel AMT for scheduled activities.
104
Initiate Action on the ConfigMgr 2007 SP2 Client Agent
On the Intel® vPro™ System, open the Control Panel After the Agent installation is complete, you will see a Configuration Manager Icon under System and Security Note: It may be helpful to reboot the client at this time Double Click the Configuration Manager Icon Select the Actions Tab Note: On Vista 64bit OS, you will find the Configuration Manager Icon under View 32-bit Control Panel Items Icon In the Control Panel
105
Initiate Action on the ConfigMgr 2007 SP2 Client Agent
Click on Machine Policy Retrieval & Evaluation Cycle and click Initiate Action button Click OK in the window indicating the action has been initiated Note: This process will speed up the provisioning cycle rather than waiting for the schedule event to occur as you would do in a production environment. You may need to initiate the Machine Policy action more than once to start the provisioning process immediately. Note: You can track the progress by monitoring the logs directory c:\windows\system32\CCM\Logs (on Vista 64bit OS, the logs folder is located under c:\windows\SysWOW64\CCM\Logs) OOBMGMT.log will track the progress of the auto provisioning of AMT. You should see a log entry stating “Successfully activated the device.” This indicates the SCCM agent has initiated the provisioning process PolicyAgent.log will track all of the policies pulled down by the agent from ConfigMgr 2007 SP2 server. Refer to the SendSched Utility in the Appendix to launch the provisioning immediately (click here)
106
Provision AMT via In-Band ConfigMgr 2007 SP2 Client Agent
After a few minutes, provisioning will automatically complete and you can update your collection membership Right Click Collections and select Update Collection Membership Click Yes to confirm that you want to proceed Right click on All Systems collection and select Refresh The client will now appear in All Systems Collection as Provisioned and no longer be listed in the Unprovisioned vPro Clients collection Note: You can track the provisioning progress under C:\Program Files\Microsoft Configuration Manger\Logs\Amtopmgr.log This process length depends on the time it takes for ConfigMgr 2007 SP2 Agent to check in with the Server and pull down its policies. Congratulations! You have just successfully completed InBand provisioning in ConfigMgr 2007 SP2 and enabled Intel® vPro™ systems to be manageable out of band by ConfigMgr 2007 SP2 console.
107
Lab Module 3 Review Installed the SCCM Client Agent on the Intel vPro system Created Intel® AMT Unprovisioned Collection Modify Membership Rules for the Unprovisioned Collection Added AMT Hardware Inventory check to Query Statement Enabled Automatic OOB provisioning on the Collection Added Intel AMT Display Columns to the collections Configured Site Parameters to Use Secure Remote Power Control (used in Real World Use Cases module) Initiated an InBand agent based provisioning Updated Collections to see Provisioned AMT System
108
Lab Module 4 Configuration Manger 2007 SP2 Out of Band Management Console
109
Using the Out Of Band Management Console in ConfigMgr 2007 SP2 to manage Intel® vPro™ Systems
110
ConfigMgr 2007 SP2 OOB Mgt Console
The following screen captures show the ConfigMgr 2007 SP2 OOB console interfaces for each of the OOB management capabilities.
111
OOB Management Console
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections > All Systems Right click on a Provisioned System Select Out of Band Management > Out of Band Management Console Note: This will launch the OOB Management console that allows you to perform all of the OOB management capabilities in ConfigMgr 2007 SP2. You can also perform Power Control, Update / Delete Data in the Management Controller, Enable/Disable/Clear Audit Log without opening the OOB Management Console. Update = Reprovisioning Update Provisioning Data in the Management Controller is equivalent to what we call ReProvisioning.
112
OOB Management Console – System Status
Once the OOB Management Console opens, you will see System: Connected/Busy Serial connection: Inactive Note: SCCM SP2 no longer automatically connects a serial connection. Instead, the serial connection is left inactive until you select Tools > Open Serial-over-LAN Connection. You will see a warning indicating that if this device is connected wirelessly, the connection may be disconnected during the SoL session. In this screen, you can view Power IP Address Host Name Domain Suffix System ID (UUID) Date of last refresh Time of last refresh
113
OOB Management Console – System Information
In this screen, you can view all of the System Hardware Inventory stored in the Intel® ME firmware
114
OOB Management Console – Power Control
In this screen, you can perform all of the OOB power function capabilities Power ON Power OFF Restart Computer IDER to ISO Boot to BIOS Bypass BIOS Password Lock remote keyboard Take a few minutes to perform a few power option features: Power on/off the Desktop Redirect BIOS to see system BIOS in Serial Connection Window Perform IDER to a local ISO (this will be covered in depth in our “real world” Use Case section) Note: Remember to start a Serial-over-LAN session before redirecting to an ISO or BIOS so you can view/control the session in the serial connection tab. A new feature from SMS, SCCM allows you to change the directory location in this window to a different ISO location. This use to be down in the configuration of the SMS addon and not on the fly like in the SCCM OOB console….very convenient. Note: When you select to power cycle a vPro system, you will be warned that this action can cause data loss on the system if they system has opened applications and unsaved data (this is not a graceful shut down)
115
OOB Management Console – System Event Log
In this screen, you can View System Event log Set Log Level
116
OOB Management Console – IDE-Redirect Log
In this screen, you can view the IDE-Redirect log
117
OOB Management Console – System Audit Log
In this screen, you can view the System Audit log and can Export this information to a file
118
OOB Management Console – Serial Connection
In this screen, you can view and control the Serial Connection of the remote screen (e.g. Bios or DOS based ISO image)
119
OOB Management Console – Data Storage
In this screen, you can enter information into the 3rd Party Data Store (3PDS) and save this information for later viewing Type any random data in the window and select save Note: Intel has provided Powershell scripts that can be used to push/pull data down to this 3PDS from a central location (e.g. Site Server). This would allow you to push data remotely (e.g. asset tag and location information) and access this data through the OOB console. For more information on these scripts: Real World Use Case #4 Powershell Scripts for 3PDS
120
Use Internet Explorer* to manage Intel® AMT
On your ConfigMgr 2007 SP2 server, open Internet Explorer Type If the system is successfully provisioned with a TLS certificate, you will see the Intel AMT WebUI interface. Click Log On In the login Window, use the Account setup in the OOB Componet User name: vprodemo\ITproadmin Password: If you successfully authenticate to Intel AMT, you will see the WebUI to manage Intel AMT System Status Hardware Information Event Log Remote Control Power Policies Network Settings User Accounts Note: Accessing the WebUI and successfully logging in confirms both your Kerberos authentication is successful and your TLS certificate is functioning properly. This is a good testing steps to ensure the system was successfully provisioned by SCCM. This is a good troubleshooting step for validating the web certificate and kerberos account…plus it has some vPro functionality through a simple web browser
121
Lab Module 4 Review The Out of Band Management Console is the ConfigMgr 2007 SP2 interface to perform Out of Band Management Features Power Up/Down Restart Boot to BIOS Redirect to an ISO Hardware Inventory System Information You can also perform Power Up/Down and Management Controller reprovisioning/delete from within ConfigMgr 2007 SP2 directly Use the Web Interface in IE to manage Intel® AMT Systems
122
Lab Module 5 Real World Use Cases for Intel vPro Systems with SCCM SP2
123
Real World Use Cases The following “Real World” Use Cases have been developed to help customers with drop-in solutions that will enable them to gain immediate value with Intel® vPro™ and SCCM within a production environment Wake On Advertisements Remote KVM Remote Drive Share Powershell Scripts for 3PDS
124
Real World Use Case #1 Intel Wake-On Advertisement
124
125
Using Intel® AMT Power Options to wake up a system with a SCCM Advertisement
When creating software distribution in ConfigMgr 2007 SP2, you can leverage Intel AMT power options to wake up system (e.g. after hour patching scenarios). Make sure your vPro Client is Powered Off for the next exercise.
126
Create a Task Sequence to be used in an Advertisement
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Operating System Deployment > Task Sequences Right click on Task Sequences, select New > Task Sequence In the New Task Wizard window, select Create a New custom task sequence Click Next
127
Create a Task Sequence to be used in an Advertisement
In Task Sequence Information, Enter in Task Sequence Name: Just Shutdown and add appropriate Comments Click Next Confirm information in the Summary and click Next Once the Wizard completes, click Close
128
Edit Task Sequence to be used in an Advertisement
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Operating System Deployment > Task Sequences Right click on Just Shutdown Task Sequences (created in previous step), select Edit In the Just Shutdown Task Sequence Editor, click Add > General > Run Command Line In the Name Field, type Shut Down In the Command Line window, type shutdown –s –f Click OK
129
Create an Advertisement to use Intel® AMT power up and run Task Sequence
In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections > All Systems Right click on All Systems, select Advertise Task Sequence In the New Advertisement Wizard, enter Shut Down Client in the name field In the Task Sequence Field, click Browse In the Select Task Sequence window, select Just Shutdown Task Sequence In the Collections Field, Click Browse and select All Systems Click OK Click Next
130
Create an Advertisement to use Intel® AMT power up and run Task Sequence
In the Schedule Screen, Enter an Advertisement start time (leave default) Under Mandatory Assignments, Click the New button In the Assignment Schedule window, select Assign Immediately after this event and select as soon as possible in the drop down list Click OK Check Enable Wake On LAN box Note: This check box will enable ConfigMgr 2007 SP2 to use Intel AMT secure Power on feature to wake up the system per the settings defined in a previous step: Site Power Controls Select Priority as High Click Next
131
Create an Advertisement to use Intel® AMT power up and run Task Sequence
On the Distribution Screen, leave the defaults and click Next On the Interaction Screen, leave the defaults and click Next On the Security Screen, leave the defaults and click Next On the Summary Screen, click Next On the Wizard Complete, click Next Note: As soon as the advertisement is seen, it will begin powering up the Intel® vPro™ provisioned system using the Intel AMT power up command and run the Task sequence to shut it back down.
132
Real World Use Case #2 Intel KVM integrated into SCCM SP2 and Microsoft Diagnostic and Recovery Tools 132
133
Intel® vPro™ KVM Keyboard, Video and Mouse Redirection over IP
Intel® AMT 6.0 platform (Piketon and Calpella) with integrated graphics Similar to a full IP-KVM experience, without expensive hardware ISV Support: RealVNC will be shipping soon: Others to be announced
134
Keyboard, Video and Mouse Redirection over IP
Video - redirected from managed machine to Management Console Keyboard and Mouse - redirected from Management Console to managed machine Blue screen Console Dsfsd.sys failed at mem location 0x Memory dump: 3409afed 3409afed Logo _ X Computer State Comp A Unhealthy Comp B Repair mode Comp C S3 - Standby Comp D Booting Comp A Screen Dsfsd.sys failed at mem location 0x Memory dump: 3409afed 3409afed OS-unresponsive/ Repair Mode Select a machine to remote TLS / Kerberos Wake from S3 TLS / Kerberos AT Console TLS / Kerberos Admin TLS / Kerberos Booting Allows remote operator to securely access a remote system as if he/she was sitting in front of it
135
KVM typical session flow
136
Install KVM Viewer on SCCM Site Server
On the MSSCCM VM image, double click KVMViewSetup.exe to install the KVM Viewer In the KVMView Setup Wizard, click Next In the Select Installation Folder window, click Next In the Confirmation Installation window, click Next In the Installation Complete window, click Close Note: This installation will install the KVMViewer application in c:\program files\Intel\KVMView After installation is complete, delete the KVMCerts.PEM file in the KVMView Folder Recreate a KVMCerts.PEM file by creating a new text file (New Text Document.txt) and renaming it to KVMCerts.PEM (file size will now be 0KB)
137
Integrating KVM into SCCM Site Server
Close the ConfigMgr Console in the VM image Copy the file vpro_client.xml and place into c:\Program Files\Microsoft Configuration Manager\AdminUI\xmlstorage\Extensions\Actions\7ba8bf bdb dcf6\ Note: This file will give you the ability to right click on a provisioned vPro KVM system and launch the KVMViewer from within the ConfigMgr Console.
138
Launching Integrated KVM Console
Open the ConfigMgr Console (short-cut on the desktop) In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Computer Management > Collections > All Systems Right click on a Provisioned vPro system that is KVM Capable Select Intel KVM Remote Control > Start Session The KVMView Console will Launch and will start to automatically recreate the trusted root certificate file (.PEM file) for securing a connection to the device Note: This new right click KVM remote control feature calls the KVMView Console installed previously.
139
Authenticating with KVM Console
The KVM Console will connect to the KVM system and prompt the user for a User Consent Code (Note 1) The end user will read the User Consent Code to the Remote KVM administrator so it can be entered into the KVM Console (Note 2) This will establish a secure KVM session between the KVM Console and the Intel vPro KVM system Note: This User Consent Code is for privacy and security protection but can be disabled for your environment. Note 2 Note 1
140
Managing with KVM Console
After you the remote KVM Console is authenticate with the User Consent Code, a full secure KCM session is established With the KVM Console, restart the remote vPro System With a KVM session established, you can see the entire boot process Note: You can perform all functions remotely within the OS, similar to using the standard inband agent based remote control functions. Intel vPro KVM extends this reach and allows you to see the system regardless of the OS state (on, off, BSoD, hung, etc).
141
Intel KVM and MSDaRT During the reboot process, select MSDaRT at the Windows Boot Manager Click Enter Note: This will load a WinPE image from a local partition on the drive that contains Microsoft’s Diagnostic and Recovery Utilities.
142
Intel KVM and MSDaRT Click Yes to initialize the network connectivity
Click Yes to remap drives from host OS Click Next for System Recovery Options Select Windows 7 and click Next to repair OS Enter Account Information User Name: admin Password: Note: This will load a WinPE image from a local partition on the drive that contains Microsoft’s Diagnostic and Recovery Utilities.
143
Managing with KVM Console
In the System Recovery Options window, click Microsoft Diagnostic and Recovery Toolset This will bring up the MSDaRT Tools to allow you to remote troubleshoot the Intel vPro System Note: Depending on the issues experienced with this remote system, many of these tools can be used to diagnosis and repair the remote system without having to make a “deskside” visit.
144
Real World Use Case #3 IDER Remote Drive Share (RDS)
144
145
IDE Redirection Remote Drive Share
Redirect to a small Linux based .iso that allows a remote share to the NTFS drive Using Remote Drive Sharing and Intel vPro Technology to Perform a Remote Kernel Memory Dump Analysis Using Remote Drive Sharing and Intel vPro Technology to Perform a Remote Virus Scan
146
Real World Use Case #4 Powershell Scripts for 3PDS
146
147
Powerscript Shells for 3PDS
148
Lab Module 6 Requirements and Prerequisites for ConfigMgr SP2 2007
149
Requirements for ConfigMgr 2007 SP2
ConfigMgr 2007 SP2 requires… Intel® AMT v3.2.1 systems and beyond (If your customer has Intel AMT systems prior to v3.2.1, please talk to Intel/Microsoft about WS-Management Translator Utility: Active Directory (AD) and Kerberos For client authentication ConfigMgr 2007 SP2 AD schema extensions are not required to take advantage of ConfigMgr 2007 SP2 Out of Band Management capability; however, it may be required for use non-Intel AMT related ConfigMgr 2007 SP2 features TLS For server authentication Requires a Microsoft Enterprise Certificate Authority Remote Configuration Zero Touch configuration or called PKI (public key infrastructure) Standard remote configuration procedures apply from provisioning ConfigMgr 2007 SP2 provides its own remote agent provisioning support through the SCCM client agent Provisioning authorization can also be done through OOB Import Wizard (no agent required ConfigMgr 2007 SP2 does not require or support… Mutual TLS This functionality is redundant with Kerberos for client authentication ConfigMgr 2007 SP2 only uses Mutual TLS during the Intel AMT set-up/provisioning Digest User Accounts Microsoft only supports Kerberos user accounts Although not used by ConfigMgr 2007 SP2, Digest Accounts can be defined Pre-shared Keys (PSK) Also referred to as PID/PPS provisioning ConfigMgr 2007 SP2 can support PID/PPS provisioning through the Intel® WS-Management Translator 149
150
Prerequisites for ConfigMgr 2007 SP2 OOB Management
ConfigMgr 2007 SP2 Site Server Windows Remote Management (WinRM) version 1.1 (or later) If Windows 2003, Service Pack 2 or Later Hotfix KB MSXML 6.0 is required on computers that run the out of band management console If Windows 2008 or Vista running the OOB console, Telnet Client installed to perform Serial-over-LAN Active Directory Intel® vPro™ Clients being managed must belong to the same AD Forest as the OOB Service Point AD Schema Extensions are not required for Intel vPro support; however, are required for other ConfigMgr 2007 SP2 features and make ConfigMgr 2007 SP2 Client Agent Deployments easier (required for Agent Based provisioning) Microsoft Enterprise Certification Authority Issue and Manage certificates required for TLS based out of band management Must automatically approve certificate request from the site server Key Length not to exceed 2048 (4096 for newer AMT firmware) Microsoft SCCM PKI provisioning support for 2.2 and 2.6 firmware. Summary: Issue identified in PKI provisioning support for 2.2 and 2.6 due to ConfigMgr 2007 SP2 assumption that it can handle all PKI provisioning traffic (without going through the translator for firmware less than 3.2.1) and inconsistent certificate calls between Averill, Santa Rosa, and Weybridge platforms. Issue impacts both PKI bare metal and Agent Based provisioning; PSK (PID/PPS) provisioning is not impacted. Current Status: Issue is being investigated by Microsoft; there is currently no ETA on resolution. 150
151
Prerequisites for ConfigMgr 2007 SP2 OOB Management
Remote Configuration Certificate - Supported 3rd party CA (Verisign, Godaddy, Comodo, Starfield) DNS / DHCP / Network Ports provisionserver associated to ConfigMgr 2007 SP2 Out of Band Service Point Active DCHP Scope with Option 6 (DNS servers) and Option 15 (Domain Name) configured Open Network ports: Provisioning Port; and through OOB Management Ports Dynamic updates to DNS from DHCP (Option 81) Intel® vPro™ Client Intel® AMT HECI and SoL Driver for ConfigMgr 2007 SP2 Client Agent based Provisioning Firmware >=3.2.1 for Native Support Administrators Checklist and Prerequisties 151
152
Intel AMT Firmware Requirements
ConfigMgr SP2 can work with a mixed AMT Firmware environment Any pre firmware requires WS-MAN Translator; avoid if at all possible Recommend to upgrade to latest AMT Firmware version made available by your OEM for your chosen platform Typically systems won’t be shipped with latest firmware Depending on OEM, might be bundled with BIOS Firmware upgrade sometimes requires BIOS upgrade as well Download from OEM website If not available, contact OEM Distribute like any other software package
154
Glossary Legacy Provisioning/Managing – Provisioning and Managing Intel® vPro™ systems that are less than Intel® AMT firmware 3.2.1 Native Provisioning/Managing – Provisioning and Managing Intel vPro systems that have Intel AMT firmware (today) and higher (future releases) Intel® Manageability Engine (Intel® ME) – microprocessor in Intel vPro platforms that perform the Intel AMT functions and capabilities Intel® Manageability Engine BIOS Extension (Intel® MEBX) - the user interface to the Intel ME; it allows for the configuration of settings that control the operation of the Intel ME
155
Lab Extras ConfigMgr 2007 SP2 Logs and Troubleshooting Tips
156
SendSched Utility to start provisioning
In order to start the Inband agent based provisioning immediately, you can use the sendsched utility to initiate the process from the vPro Client This is the Windows Management Instrumentation Tester Open a command prompt and type wbemtest After the Windows Management Instrumentation Tester Utility Opens, click Connect In the Namespace of the Connect Window, type the remote system name you want to force the check followed by \root\ccm (requires admin rights on the remote system) Click Connect You can also simply run the command on the local system by simply leaving out the host name Example: \root\ccm After you successfully connect to the target system, click the Execute Method Button In the Get Object Path window, type sms_client in the Object Path field Click OK In the Execute Method Window, enter TriggerSchedule in the Method Field Click the Edit In Parameters Button In the Object editor for _PARAMETERS window, Double Click the sScheduleID in the Properties field In the Property Editor Window, change the Value to Not NULL and add the following { } This value is the Object ID to initiate this OOB auto-provisioning check Click the Save Property button In the Object editor for _Parameters window, click the Save Object button In the Execute Method window, click the Execute Button After you Execute the method, you should see a message that the Method was executed successfully To confirm that your method was executed, look at the target systems c:\windows\system32\CCM\Logs\oobmgt.log You should now see a new entry in the log GetProvisioningSetting indicating that the policy has been re-evaluated Click Here to return
157
Helpful ConfigMgr 2007 SP2 Logs for Troubleshooting Intel® AMT Provisioning and Management
C:\Program Files\Microsoft Configuration Manger\Logs Amtopmgr.log - log for tracking provisioning process Amtproxymgr.log – log used for tracking activities like Certificate generation, OU creation, etc C:\Program Files\Microsoft Configuration Manger\AdminUI\AdminUILog OOBConsole.log - Log for tracking OOB Management Console activity (note: for more detailed information - change "Error" to "Verbose" in the following file c:\Program Files\Microsoft Configuration Manager\AdminUI\bin\oobconsole.exe.config
158
Helpful ConfigMgr 2007 SP2 Logs for Troubleshooting on the Intel® vPro™ Client
C:\windows\system32\ccm\logs oobmgmt.log – log to track the provisioning of Intel® AMT C:\windows\system32\ccmsetup ccmsetup.log – log to track installation progress of ConfigMgr 2007 SP2 Client Agent
159
Troubleshooting ConfigMgr 2007 SP2 Agent Auto-provisioning policy
If you do not see your system automatically provision in ConfigMgr 2007 SP2, look in the c:\windows\system32\CCM\Logs (on Vista 64bit OS, the logs folder is located under c:\windows\SysWOW64\CCM\Logs) OOBMGMT.log If you see the log stating Auto Provision Policy Disabled, perform the following steps. MORE TO BE ADDED If you see the OOBMGMT.log showing autoprovisioning policy disabled, this indicates the agent has not found a collection that has enabled automatic provisioning.
160
ConfigMgr 2007 SP2 Resources
Intel® vPro™ Expert Center devoted to Microsoft products and Intel vPro Technology - Intel® vPro™ Expert Center; Known Issues, Best Practices, and Workarounds -
161
Manually Unprovision Intel® AMT in the Intel® MEBX
Reboot the HP7800 and hit CTRL + P to enter the Intel MEBX Interface Enter the password; Select Intel (R) AMT Configuration and hit Enter Select Un-Provision and Enter Click Y for Yes to reset Intel AMT Select Full Unprovision and Enter Note: This will fully unprovision the Intel AMT system and set it back to factory default mode with the exception of the Intel MEBX password.
162
SCCM Out of Band Provisioning (Bare Metal Provisioning)
Out of Band Management Controller Import Wizard invoked from Collections menu Wizard requests Computer Name, FQDN, MAC, UUID Intel vPro client(s) imported into collection allowing additional non-AMT SCCM 2007 SP1 related discovery When Hello Packet received, SCCM 2007 SP1 will perform the provisioning process Process: OOB Import -> Hello Packet Received -> SCCM 2007 SP1 Provisions Client
163
SCCM Out of Band Provisioning
Admin imports provisioning data for Client being provisioned into ConfigMgr 2007 SP1 vPro Client sends PKI hello packet to provisioning server (defined firmware schedule) OOB Service Point secures connection with AMT client through Embedded AMT Self Signed Certificate and Present Provisioning Certificate for initial Authentication OOB Service Point sets Remote Admin and MEBx password (if not changed) OOB Service Point requests a web server certificate on behalf of the AMT client OOB Service Point created an Object in AD for the vPro Client OOB Service Point pushes web server certificate to AMT client OOB Service Point pushes ACL, power schema, and other configuration data to AMT to finalize provision
164
REMOVED SLIDES
165
2010 Additions to Intel® vPro™ Technology
Enhanced Security Manageable data protection with integration of drive encryption solutions Asset & data protection with anti-theft features and services Expanded Manageability Uninterrupted keyboard, video & mouse control Local wake capability to ensure local management tasks are executed Energy Efficient Performance New micro-architecture and partitioning to support better application performance with continued energy savings Cross Client Consistency Same security and manageability features for both desktop and notebook DASH 1.1 and full IPv6 support Lower TCO with more efficient, more secure, more manageable platforms
166
Removed Slide and used for Reference / Backup
Provision AMT via In-Band ConfigMgr 2007 SP2 Client Agent After a few minutes, provisioning will automatically complete and you can update your collection membership Right Click Collections and select Update Collection Membership Click Yes to confirm that you want to proceed Right click on All Systems collection and select Refresh The client will now appear in All Systems Collection Provisioned and no longer be listed in the Unprovisioned vPro Clients collection Note: You can track the provisioning progress under C:\Program Files\Microsoft Configuration Manger\Logs\Amtopmgr.log This process length depends on the time it takes for ConfigMgr 2007 SP2 Agent to check in with the Server and pull down its policies. Removed Slide and used for Reference / Backup Congratulations! You have just successfully completed InBand provisioning in ConfigMgr 2007 SP2 and enabled Intel® vPro™ systems to be manageable out of band by ConfigMgr 2007 SP2 console.
167
Lab Module 4 Collection Configuration for In-Band Provisioning
Removed Slide and used for Reference / Backup
168
Removed Slide and used for Reference / Backup
Monitor Policies being applied to ConfigMgr 2007 SP2 Client After the Agent has pulled down the machine policies from the ConfigMgr 2007 SP2 server, you will see more Actions listed in the Actions tab of the Configuration Manager Removed Slide and used for Reference / Backup
169
Removed Slide and used for Reference / Backup
Discover Systems with ConfigMgr 2007 SP2 Discovery In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Primary Site > Site Settings > Discovery Methods Double Click on Active Directory System Discovery Note: With the collection defined, you can use any of the discover methods that ConfigMgr 2007 SP2 provides (AD System Group, AD Security Group, AD System , AD User, Heartbeat, or Network) to discover the client. If you decide to use Network discovery (refer back to steps on required configuration) Note: For more information about network discovery and how to schedule it to run, see About Network Discovery and How to Schedule Network Discovery. Removed Slide and used for Reference / Backup
170
Removed Slide and used for Reference / Backup
Enable Active Directory System Discovery In the Active Directory System Discovery Properties window General Tab, check Enable Active Directory System Discovery Click the Button In the New Active Directory Container window, select Local Domain and click OK In the Select New Container window, select Computers Click OK….proceed to next foil Removed Slide and used for Reference / Backup
171
Removed Slide and used for Reference / Backup
Initiate the Polling Schedule for Discovery On the Polling Schedule, check the box to Run discovery as soon as possible Click Apply Click OK Note: This will initiate a discovery of all the systems listed in the computer OU in the Active Directory. Removed Slide and used for Reference / Backup
172
Removed Slide and used for Reference / Backup
Update Collection to see Discovered System After you run the discover method Right Click All Systems and select Update Collection Membership Click OK to confirm that you want to proceed Right click on All Systems and select Refresh (f5) The client will now appear in the All Systems and Unprovisioned vPro Cleints Collection Note: It may take a couple minutes for the system to show up. You may continue to click Refresh All Systems Collection until you see the client in the collection. The Intel® AMT status of the device will be in a unknown state. Ensure the firewalls on the virtual images, host OS running the virtual images, and the vPro system are not enabled. The Windows Client firewall can inhibit communications. Update Images Removed Slide and used for Reference / Backup
173
Removed Slide and used for Reference / Backup
Use Out of Band Management to Discover Management Controllers After the client is populated in the All Systems Collection, check to see if any of the systems are Intel® vPro™ capable Right Click on the newly discovered system > Out of Band Management > Discover Management Controllers Click OK Note: This will scan the system and validate which clients are Intel vPro capable and ready to be provisioned. You can also scan an entire collection for AMT systems. Note: You can monitor the discovery process by watching the amtopmgr.log located in C:\Program Files\Microsoft Configuration Manger\Logs (you will find a short cut to this log on the SCCM Virtual Image desktop) Update Images Removed Slide and used for Reference / Backup
174
Removed Slide and used for Reference / Backup
Update Collection membership to see Intel® vPro™ system Not Provisioned After a few minutes, depending on the size of your collection, you can update your collection membership Right click Collections and select Update Collection Membership Click Yes to confirm that you want to proceed After one minute, right click on Collections and select Refresh The client will now appear in Unprovisioned vPro Clients Collection and listed as Not Provisioned and when the ConfigMgr 2007 SP2 Agent checks in for its policies, this collection will start the automatic provisioning process. Note: If you look back at the All Systems collection, you will now see the system as listed as Not Provisioned. You will also see the version of Intel® AMT listed. If you do not see your system in the Unprovisioned Collection, the collection query or discovery method failed (refer back to previous steps). Removed Slide and used for Reference / Backup Note: If the system is listed as Detected, remove client from ConfigMgr, boot client into the Intel MEBX and SMB provision, unprovision, repeat AD Discovery (p.96-97), and repeat Discover Management Controllers (p.98-99)
175
Removed Slide and used for Reference / Backup
Lab Module 3 Review Installed ConfigMgr 2007 SP2 Client Agent on local system Initiated Action on the ConfigMgr 2007 SP2 Client Agent to check in with the ConfigMgr 2007 SP2 server to receive its policies Validated Policies were being applied to the ConfigMgr 2007 SP2 Client through associated logs Updated the ConfigMgr 2007 SP2 Collection Membership and found that Intel® vPro™ system was successfully provisioned using ConfigMgr 2007 SP2 Inband agent. Removed Slide and used for Reference / Backup
176
Removed Slide and used for Reference / Backup
Configure Network Discovery for Management Controllers In the Configuration Manager console, navigate to System Center Configuration Manager > Site Database > Site Management > PRO – vPro Demo Site > Site Settings > Discovery Methods In the right hand window, Right-click Network Discovery, and click Properties On the General tab, select Enable Network Discovery and Select Topology radio button Select Enable discovery of out of band management controllers Click OK Note: This will allow ConfigMgr 2007 SP2 to detect if a system is Intel® AMT capable. Removed Slide and used for Reference / Backup
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.