User Manual

16
Proactive network defense, which uses filters to block incoming threats while isolating
infected clients before they impact the network
Remote hardware and software asset tracking, helping to track computer assets and keep
virus protection up-to-date
Keyboard, video and mouse (KVM) remote control, which allows redirection of a managed
system’s video to a remote console which can then interact with it using the console’s own
mouse and keyboard
NOTE
Intel AMT requires a network connector and an Intel AMT enabled remote management console.
Setup requires additional configuration of the platform.
For information about
Refer to
Intel® Active Management Technology
http://www.intel.com/technology/platform-technology/intel-
amt/index.htm
2.11.3 Trusted Platform Module (TPM)
The TPM version 2.0 component is specifically designed to enhance platform security above-and-
beyond the capabilities of today’s software by providing a protected space for key operations and
other security critical tasks. Using both hardware and software, the TPM protects encryption and
signature keys at their most vulnerable stagesoperations when the keys are being used
unencrypted in plain-text form. The TPM shields unencrypted keys and platform authentication
information from software-based attacks.
2.12 Intel® Virtualization Technology
Intel® Virtualization Technology (InteVT-x) is a hardware-assisted technology that, when
combined with software-based virtualization solutions, provides maximum system utilization by
consolidating multiple environments into a single server or client.
NOTE
A processor with Intel VT does not guarantee that virtualization will work on your system. Intel VT
requires a computer system with a chipset, BIOS, enabling software and/or operating system,
device drivers, and applications designed for this feature.
For information about
Refer to
Intel® Virtualization Technology
http://www.intel.com/technology/virtualization/technology.htm