Intel® Active Management Technology Developers Guide

ID 772055
Date 1/05/2021
Document Table of Contents

Intel® Active Management Technology Developers Guide

Welcome to the Intel® Active Management Technology (Intel® AMT) Developers Guide. The goal of this guide is to simplify the adoption of Intel AMT functionality by IT technicians and developers.

What is Intel® vPro™ Technology?

Intel® vPro™ technology is a marketing term that includes a variety of underlying technologies. Some of those technologies are Intel AMT, Intel® Virtualization Technology (Intel® VT), and Intel® Trusted Execution Technology (Intel® TXT).

While Intel vPro technology is conveniently built into the devices, some of its unique features require action to deploy them, based on the organization’s needs and policies. Thanks to Intel® Setup and Configuration Software, IT managers can configure Intel AMT in a matter of minutes for the purpose of remote management.

As Intel vPro is primarily hardware, a device cannot be upgraded to the Intel vPro specification after purchase. This technology comprises multiple components:

  • Intel vPro enabled processor
  • Chipset
  • Wired and wireless LAN adapters
  • OEM BIOS enablement

What is Intel® AMT?

Intel AMT is built into the Intel  vPro processor family, consisting of the Intel® Core™  i5 processor, Intel® Core™ i7 processor, Intel® Core™ M processor and Intel® Xeon® processor family products (Windows* Client OS only), Intel® chipsets, and network adapters that solve these critical IT challenges.

Intel AMT can be found on devices outside of the Intel vPro family, however only vPro devices can be configured for remote management. The configuration process is what allows the device to be accessed for the purpose of in-band and out-of-band remote access.

Configuration can enable a wide variety of features, such as:

  • Discovery
  • General information
  • Hardware asset information
  • KVM
  • SOL Redirection
  • Storage Redirection
  • Remote access
  • Remote control
  • User consent
  • Agent presence
  • Alarm clock
  • Event manager
  • Fast call for help
  • System defense
  • Eventing and alerting


*No product or component can be absolutely secure.