Quantcast
Channel: Intel Communities : Discussion List - Intel® vPro™ Platform
Viewing all 632 articles
Browse latest View live

Vpro, AMT, Intel ME, Disable Consent

$
0
0

Is there a way to disable the consent feature for all of my vPro capable machines in my environment?

I have a Dell KACE appliance that I am using to push out the configuration xml file using the following command;

ACUConfig.exe /Output File vProConfigLog.txt ConfigAMT "AMTSettings.xml" /DecryptionPassword xxxxxxxxxx

This allows me to connect to my client PC's using VNC Plus directly from the KBOX, but I can't figure out how to disable the consent code remotely.

Maybe this is just not possible?

 

I created the xml file using the ACU wizard, but I see no option to change or disable user consent/Opt-In settings.

As far as I can tell the only way to disable this is to use a USB key for configuring KVM.


Security Questions About SCS SCCM Add-on

$
0
0

I'm looking to setup AMT in my environment. We decided to use the SCCM add-on with RCS integration. I have two major security concerns with this: First, the instructions in the Intel(R)_SCS_Addon_SCCM_2012.pdf call for giving the Operations Administrator role to the Domain Computers group. That's was a huge security concern to me, since the Operations Administrator role is an extremely powerful one. I was able to find advice on this from another discussion that I found on this site.

 

This brings me to the second issue, on which I have yet to make any progress. In section 2.7 of the guide, it gives the option to run the packages used by the add-on either as the system account on the host computer (default) or designate an account for running the package. If I go with the system accounts, then it requires me to give every computer Remote Enable rights to the site_<sccm site code> namespace in WMI. This is opening up my SCCM infrastructure to any person who can run something as the system account on any host computer, which is not very difficult to do, so this is not a good option.

 

The second option (using a dedicated account) also has problems, as I need to grant this account admin rights to all of my hosts and open up the same WMI namespace to it. This is fine so long as I can keep this one account safe. But for this to work, the add-on has to use the “Run this step as the following account” option in the task sequence and store its credentials there. This is a problem, because that password can easily be extracted from any host computer which is able to run the task sequence. In order to verify this, I ran a test of it and was able to get the password for this account from a host, using one very simple step followed by a one-liner. I'm not going to post that here for obvious reasons. This is why Microsoft has multiple warnings about accounts used to “run as” from a task sequence. This issue presents a huge concern because the instructions are calling for this account to have admin rights to all of my hosts, plus the ability to remotely connect to SCCM's WMI namespace. I don't want to leave such a powerful account so exposed.

 

So, given all of the above, does anybody know of a reasonably secure way to handle this?  This can't be the only way to make this work. Of all the companies using AMT, somebody else must have already discovered this problem and developed a more secure method.

 

Thank you,

-Joe

Cannot Provision Any AMT Devices Using SCCM 2012 R2

$
0
0

I am doing a POC before possible live implementation. This POC will dictate whether we purchase vPro on all future devices world wide, so there is a fair amount riding on this. My test devices are a selection of four laptops and desktops with different AMT versions.

 

I am highly experienced in SCCM. I am using a 2012 R2 single server environment, which has no issues. I have a domain with a CA (Server 2012 R2, so its an enterprise CA as far as we care here).

 

I have gone through the setup and everything seems fine, no issues reported in the SCCM logs regarding the health of the OOB or the Enrolment service points. One issue I did resolve (which appeared because there is no mention in any of the guides i have read, is i needed to bind the provisioning cert with the IIS default website. Following that the OOBSP setup fine.

 

Basically the errors I am receiving are all to do with authentication during the initial provisioning. All devices are showing as Not Supported or Detected.

 

Here is a relevent section of log:

 

AMT Discovery Worker: Wakes up to process instruction files SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Wait 3600 seconds... SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Wakes up to process instruction files SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Reading Discovery Instruction C:\Program Files\Microsoft Configuration Manager\inboxes\amtopmgr.box\disc\{88ED1AA6-A9CF-4645-924D-FFA1665C9DBF}.RDC... SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Execute query exec AMT_GetThisSitesNetBiosNames NULL, '16777219', 'S01' SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: CSMSAMTDiscoveryWorker::RetrieveInfoFromResource - Found machine MEDIA1 (Media1.Home.local), ID: 16777219 IP: 192.168.0.61 from Resource 16777219. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Execute query exec AMT_GetAMTMachineProperties 16777219 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

Discovery will use ip resolved from netbios: SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

192.168.0.61 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Execute query exec AMT_GetProvAccounts SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Finish reading discovery instruction C:\Program Files\Microsoft Configuration Manager\inboxes\amtopmgr.box\disc\{88ED1AA6-A9CF-4645-924D-FFA1665C9DBF}.RDC SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Parsed 1 instruction files SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Send task Media1.Home.local to completion port SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

General Worker Thread Pool: Current size of the thread pool is 1 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

General Worker Thread Pool: Work thread 3120 started SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Discover MEDIA1 using IP address 192.168.0.61 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

AMT Discovery Worker: 1 task(s) are sent to the task pool successfully. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

DoPingDiscoveryForAMTDevice succeeded. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

STATMSG: ID=7203 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_AMT_OPERATION_MANAGER" SYS=SCCM2012.Home.local SITE=S01 PID=2464 TID=8160 GMTDATE=Fri Jan 30 20:38:54.557 2015 ISTR0="1" ISTR1="0" ISTR2="0" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=0 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: There are 1 tasks in pending list SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Wait 20 seconds... SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Wakes up to process instruction files SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: There are 1 tasks in pending list SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

AMT Discovery Worker: Wait 20 seconds... SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 8160 (0x1FE0)

Error 0x80090325 returned by InitializeSecurityContext during follow up TLS handshaking with server. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

**** Error 0x3b68b200 returned by ApplyControlToken SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

DoSoapDiscovery failed with user name: admin. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Flag iWSManFlagSkipRevocationCheck is set. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

session params : https://Media1.Home.local:16993   ,  2011001 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

ERROR: Invoke(get) failed: 80020009argNum = 0 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Description: A security error occurred SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Error: Failed to get AMT_SetupAndConfigurationService instance. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

DoWSManDiscovery failed with user name: admin. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Start Kerberos Discovery SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Flag iWSManFlagSkipRevocationCheck is set. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

session params : https://Media1.Home.local:16993   ,  2484001 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

ERROR: Invoke(get) failed: 80020009argNum = 0 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Description: A security error occurred SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Error: Failed to get AMT_SetupAndConfigurationService instance. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

DoKerberosWSManDiscovery failed. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Flag iWSManFlagSkipRevocationCheck is set. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

session params : https://192.168.0.61:16993   ,  2015001 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

ERROR: Invoke(get) failed: 80020009argNum = 0 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Description: A security error occurred SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Error: Failed to get AMT_SetupAndConfigurationService instance. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

DoWSManDiscovery failed with user name: admin. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

Discovery to IP address 192.168.0.61 succeed. AMT status is 1. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

CSMSAMTDiscoveryTask::Execute, discovery to MEDIA1 succeed. AMT status is 1. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

CSMSAMTDiscoveryTask::Execute - DDR written to C:\Program Files\Microsoft Configuration Manager\inboxes\auth\ddm.box SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

CStateMsgReporter::DeliverMessages - Queued message: TT=1201 TIDT=0 TID='Unspecified' SID=10 MUF=0 PCNT=1, P1='Media1.Home.local' P2='' P3='' P4='' P5='' SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

CStateMsgReporter::DeliverMessages - Created state message file: C:\Program Files\Microsoft Configuration Manager\inboxes\auth\statesys.box\incoming\bbo4n48o.SMX SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

General Worker Thread Pool: Succeed to run the task Media1.Home.local. Remove it from task list. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

General Worker Thread Pool: Work thread 3120 has been requested to shut down. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

General Worker Thread Pool: Work thread 3120 exiting. SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 3120 (0x0C30)

General Worker Thread Pool: Current size of the thread pool is 0 SMS_AMT_OPERATION_MANAGER 30/01/2015 20:38:54 404 (0x0194)

AMT Discovery Worker: Wakes up to process instruction files SMS_AMT_OPERATION_MANAGER 30/01/2015 20:39:14 8160 (0x1FE0)

AMT Discovery Worker: Wait 3600 seconds... SMS_AMT_OPERATION_MANAGER 30/01/2015 20:39:14 8160 (0x1FE0)

 

I presume its the default MEBx password thats the issue? The devices have been reset to defaults, in SCCM you cant set the password to be 'admin'.

 

Any ideas?

Intel vPro/AMT for IT consultants?

$
0
0

How would I implement/deploy/manage Intel vPro/AMT for out-of-band management across multiple different client sites?

 

Thanks.

Valid certificate for PKI configuration not found - Intel SCS 9.1

$
0
0

Hello,

 

I am using Intel SCS 9.1. Machines are listed in SCS console but with status "Configuration Failed" and connection status "Not Discovered". I tried manual discovery by selecting the machine and "Discover data", I am getting below error.

 

Failed while calling

WS-Management call

GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error

0xc000521f: An SSL error occurred. Verify the username and password, and the PSK or certificate settings, where applicable.

Valid certificate for PKI configuration not found.

 

What i did so far

1. Certificates are created in Subordinate CA. I went trough the certificate and validated the settings. Looks like verification are good. I used two documents as a reference to created certificates.

     a) SCCMGuru - Integrating Configuration Manager 2012 R2 with Intel SCS 9.0 – Part 3 : Certification Authority | SCCM GURU

     b) Intel SCS user guide - Section "9.2.5 Defining Enterprise CA Templates"

 

2. Did some research on this form and followed the suggestion of creating a basic low security profile

acuconfig.exe /lowsecurity /output console /verbose ConfigureViaRCSOnly <$SCSServerName> <ProfileName> /wmiuser domain\AMTAdmin /wmiuserpassword P@ssw0rd

(Valid certificate for PKI configuration not found during vPro Provisioning)

     This test failed as well. I get below error

 

Exit with code

75.

Details: Failed to complete remote configuration of this Intel(R) AMT device.

Failed while calling

WS-Management call

GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error

0xc000521f: An SSL error occurred. Verify the username and password, and the PSK or certificate settings, where applicable.

Valid certificate for PKI configuration not found.


My final intention is to get it working from SCCM 2012. Since i am unable to do it from SCCM, Started with SCS console to get at-lest few machines going and then think of getting it to work from SCCM.

 

Any suggestion to right direction is appreciated.

 

Thank you

how to debug intel txt and MLE code.

$
0
0

how to debug intel txt and MLE code.

How can we debug intel txt and its mle code effectively.

thanx in adv.

hilly

Cannot discover AMT Status from SCCM 2012

$
0
0

Hello, I have installed SCS Add-On for SCCM. Enabled Task sequence for discovery and configuration. I have 2 machines configured and showing up in "Intel AMT: Configured" collection. Right clicked on machine --> Manage Out of Band --> Discover AMT Status, I get below error.

 

Any troubleshoot direction ?

 

AMT Discovery Worker: Error, CSMSAMTDiscoveryWorker::ParseInstructionFile failed - open file

 

Thank you

Some help with certs

$
0
0

We are looking into using SCCM to tap into the vPro our Dells have built in.

We are getting a little bogged down on the cert stuff and there does not seem to be a clear guide on what we actually need to make this work.

One of our main questions is, if we buy a cert from go daddy or the other resellers, do we need to hand install that cert on each of workstations?

If anyone can also just link a good guide or maybe write a quick summery of what we need to do for the cert stuff that would be a huge help, We are getting a little lost in the official intel docs.

 

Thanks so much for any help you can provide!


Problem while provisioning in a new OOB Structure

$
0
0

Hello,
I tried to build a OOB Structure in our productive Site. After getting it to work in the Test-Center I copied the configuration and steps I did before.

We use a VeriSign Certificate with Intel SCS 9.1.2 and the SCCM Add-On for SCCM 2012 R2.

The first Client i tried to Provision is a Fujitsu-Siemens Esprimo Q920 with activated AMT-Features. The Firmware is the latest available.


When i start a provisioning attempt the Log gives me the following error.

 

 

 

2015-02-19 09:16:11: Thread:5652(ERROR) : ACU Configurator, Category: Exit Source: Src\ActivatorMain.cpp : wmain Line: 1254: ***********Exit with code 75. Details: Failed to complete remote configuration of this Intel(R) AMT device. Initial connection to the Intel(R) AMT device failed.  Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

 

In the RCS Log I get the following:

 

 

2015-02-19 09:15:00: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:15:10: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:15:20: Thread:5416(DETAIL) : The.Client.IP, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:15:30: Thread:5416(DETAIL) : The.Client.IP, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:15:30: Thread:5416(ERROR) : Clientname.ourdomain.de, Category: AMT Interface error Source: vProConfigurationInternal.cpp : vProConfigurationNamespace::vProConfigurationInternal::TestConnection Line: 997: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target. , error in discover 0xc000521c

2015-02-19 09:15:31: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: TestAllConnections params Source: vProConfigurationInternal.cpp : vProConfigurationNamespace::vProConfigurationInternal::TestAllConnections Line: 549: Connection data - Connection type: TLS-PKI, FQDN: Clientname.ourdomain.de, IP: The.Client.IP, UserName: admin

2015-02-19 09:15:31: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: Test Connection Source: vProConfigurationInternal.cpp : vProConfigurationNamespace::vProConfigurationInternal::TestConnection Line: 797:

2015-02-19 09:15:31: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: DiscoverAMTConnectionMode Source: vProConfigurationInternal.cpp : vProConfigurationNamespace::vProConfigurationInternal::TestConnection Line: 889: Connection Info-AGGANSMS08.justiz.niedersachsen.de admin PKI: e47112ee34a77e4dff4a3295458c52119f7c4a72

2015-02-19 09:15:41: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:15:51: Thread:5416(DETAIL) : Clientname.ourdomain.de, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:16:01: Thread:5416(DETAIL) : The.Client.IP, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:16:11: Thread:5416(DETAIL) : The.Client.IP, Category: AMTCommunicator Source: WSMANCommunicator.cpp : AMTInterfaceNamespace::WSMANCommunicator::GetAmtVersion Line: 119: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:16:11: Thread:5416(ERROR) : Clientname.ourdomain.de, Category: AMT Interface error Source: vProConfigurationInternal.cpp : vProConfigurationNamespace::vProConfigurationInternal::TestConnection Line: 997: Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target. , error in discover 0xc000521c

2015-02-19 09:16:11: Thread:5416(ERROR) : 4F7AD5CC-E533-4545-946D-4720CFD3D770, Category: Operation Error Source: Src\ConfigThread.cpp : ConfigThread::runConfigure Line: 190: Initial connection to the Intel(R) AMT device failed. Initial connection to the Intel(R) AMT device failed.  Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:16:11: Thread:5416(ERROR) : 4F7AD5CC-E533-4545-946D-4720CFD3D770, Category: Operation Error Source: Src\ConfigThread.cpp : ConfigThread::runConfigure Line: 654: Initial connection to the Intel(R) AMT device failed.  Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category: End function: Status Source: Src\Activator_Impl.cpp : RCS_ActivatorService_WMIProviderImpl::SetupConfigureAMT Line: 878: 0xc00007d2

2015-02-19 09:16:11: Thread:5416(ERROR) : 4F7AD5CC-E533-4545-946D-4720CFD3D770, Category: ConfigAMT request failed.  Source: Src\Activator_Impl.cpp : RCS_ActivatorService_WMIProviderImpl::handleStatusAfterRun Line: 221: Initial connection to the Intel(R) AMT device failed.   (0xc00007d2).

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category:  Source: vProDataAccessorDB.cpp : AMTRepositoryNameSpace::vProDataAccessorDB::GetAmtByUuid Line: 260: Begin GetAmtByUuid AMTSystem

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category:  Source: vProDataAccessorDB.cpp : AMTRepositoryNameSpace::vProDataAccessorDB::GetAmtByUuid Line: 236: Begin GetAmtByUuid DBAmt

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category:  Source: vProDataAccessorDB.cpp : AMTRepositoryNameSpace::vProDataAccessorDB::UpdateAmt Line: 340: Begin UpdateAmt

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category:  Source: vProDataAccessorDB.cpp : AMTRepositoryNameSpace::vProDataAccessorDB::UpdateAmt Line: 345: End UpdateAmt

2015-02-19 09:16:11: Thread:5416(DETAIL) : RCS Server , Category: Finish Configuration; (ERROR) AMT details: UUID: 4F7AD5CC-E533-4545-946D-4720CFD3D770, FQDN: Clientname.ourdomain.de, IP: The.Client.IP. Return code: 0xc00007d2 . Details: Initial connection to the Intel(R) AMT device failed.  Failed while calling  WS-Management call  GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error  0xc000521c: A TCP error occurred. Make sure that the destination settings are correct and that a network connection exists to the target.  Source: Src\RCSServer.cpp : CServiceModule::Log Line: 1270:

2015-02-19 09:16:11: Thread:5416(ERROR) : WMI Protocol, Category: ConfigAMT Source: C:\TeamCity\BuildAgent\work\5f8e22057159680a\Components\RCSServer\MethodCallData.h : SCS_WMI::WMICallDetails::SendErrorReport Line: 93: Finished operation with Error.   (0xc0001c89).

 

The connection between Server and Client exists and works fine. Firewall Rules allow communication on 16993 and 16995. The RCD Server has IIS installed and configured with a PKI Certificate for HTTPS-Communication. Everything seems normal but I can't find the CIM_SoftwareIdentity Class via WMI-Explorer on the client so the GetAMTVersion can't work.

Is there a way around this problem? How do i get the mentioned class?

The latest Intel Management Engine Components are installed on the client. The AMT Discovery Task has run and the AMT Hardware-Classes exist.

 

Thank's for your Time.

 

Thomas

Thai reseller asking about Vpro

Problems while, PXE Booting on INTEL AMT provisioned machines

$
0
0

Hi guys,

We have configured an environment with Intel SCS and intel vpro enabled clients. We have successfully created policies and have distributed these to our clients. All of the funtions/settings are working as expected, we are using the following policy

 

 

 

Profile Name: KerberosProfile

 

Profile Type: Intel AMT

 

 

Network Settings

     FQDN will be the same as the Primary DNS FQDN

     IP will be taken from DHCP

 

Active Directory Integration

     Active Directory OU:OU=AMT Objects,DC=Demo,DC=local

Access Control List (ACL)      

     User 1: administrator

          User Type: Digest

          User has both remote and local access to the realms listed below

          Realms: Redirection, PT Administration, Hardware Asset, Remote Control, Storage, Event Manager, Storage Administration, Agent Presence Local, Agent Presence Remote, Circuit Breaker, Network Time, General Info, Firmware Update, EIT, Local User Notification, Endpoint Access Control, Endpoint Access Control Administrator, Event Log Reader, User Access Control

          

     User 2: Demo.LOCAL\AMT-Admins

          User Type: Active Directory

          User has both remote and local access to the realms listed below

          Realms: Redirection, PT Administration, Hardware Asset, Remote Control, Storage, Event Manager, Storage Administration, Agent Presence Local, Agent Presence Remote, Circuit Breaker, Network Time, General Info, Firmware Update, EIT, Local User Notification, Endpoint Access Control, Endpoint Access Control Administrator, Event Log Reader, User Access Control

          

     User 3: adminkvm

          User Type: Digest

          User has both remote and local access to the realms listed below

          Realms: Redirection, PT Administration, Hardware Asset, Remote Control, Storage, Event Manager, Storage Administration, Agent Presence Local, Agent Presence Remote, Circuit Breaker, Network Time, General Info, Firmware Update, EIT, Local User Notification, Endpoint Access Control, Endpoint Access Control Administrator, Event Log Reader, User Access Control

          

     User 4: Demo.LOCAL\Domain Users

          User Type: Active Directory

          User has local access to the realms listed below

          Realms: Redirection, PT Administration, Hardware Asset, Remote Control, Storage, Event Manager, Storage Administration, Agent Presence Local, Agent Presence Remote, Circuit Breaker, Network Time, General Info, Firmware Update, EIT, Local User Notification, Endpoint Access Control, Endpoint Access Control Administrator, Event Log Reader

   

Transport Layer Security (TLS)

     Server authentication used for remote interface

     Server Authentication Certificate Properties:      

          Certificate Authority: TEMPCA-IntelSCS.Demo.local\Demo Temp CA

          Certificate Template: IntelTLSaccesscertificate

          Common Names (CNs) in certificate: DNS Host Name (FQDN), Host Name, SAM Account Name, User Principal Name, UUID

 

Network Configuration  

     WiFi

     Do not enable synchronization of Intel® AMT with host platform WiFi profiles

 

Wired 802.1x

802.1x setup: 802.1x Setup1

Protocol: EAP-TLS

Root Certificate Authority: Demo Temp CA, Demo, local      

          Certificate Authority: TEMPCA-IntelSCS.demo.local\Demo Temp CA

Certificate Template: IntelSCSprovisioningcert

Common Names (CNs) in certificate: DNS Host Name (FQDN), Host Name, SAM Account Name, User Principal Name, UUID

Do not allow roaming identity

Do not verify RADIUS server certificate subject name

Enable 802.1x for Intel® AMT even if host is not authorized for 802.1x

Keep 802.1x session after boot to allow PXE boot for 60 minutes

 

Trusted Root Certificates

Below are the trusted root certificates used in this profile:

          Root certificate 1: Demo Temp CA, Demo, local

 

System Settings 

     Enabled Management Interfaces:

  • Web UI

RFB password set

 

Power Management Settings: Always On (S0-S5), Timeout if idle: 0 minutes

The Intel® AMT clock will be synchronized with the operating system clock

Intel® AMT set to respond to ping requests

Fast Call for Help (within the enterprise network) is Disabled

 

 

Problem statement

Now since Intel AMT has been configured we can focus on the problem area:

 

We use PXE boot on a non 802.1x network to initially install machines. And during the install process machines are provisioned using Intel SCS, with the configuration described as above. When machine is running in full windows we are able to perform all actions like remote control, power feature like shutdown and cold reboot etc.

 

But if we now try to reinstall the machine the process fails.

 

Machines, where intel AMT has now been configured they can no longer PXE boot, neither on 802.1x enabled network nor on network without 802.1x. What we are seeing is that machines are able to PXE boot, but during the transfer of WINPE. The PXE boot process stards, boot.sdi is downloaded and then starts the process where WINPE is downloaded. This download fails randomly between 30%-70%. We are using IP helper, and have tried placing the machines on the SAME VLAN as the server, but we get Errorcode 1460 on WDS which indicated TFTP timeout. Just for the sake of testing, we have also tried to set DHCP options 66 and 67. But I must emphasize that, the SAME machine works just fine if we delete the Intel Vpro configuration from BIOS.

 

Conclusion:

We think that this problem is related to Intel AMT intercepting network communication. But what we find odd is that the problem occurs both on 802.1x enabled and network without 802.1x, why is PXE boot process being effected by enabling/configuring INTEL AMT? Has anyone seen this problem or anything like this? I am wondering if there can be something in the policy that we have attached.  During testing, we have also tried to remove the following

     Enable 802.1x for Intel® AMT even if host is not authorized for 802.1x

Keep 802.1x session after boot to allow PXE boot for 60 minutes

  1. Because we are still struggling to get this to work on a non 802.1x network. Any help, pointer and tips is much appreciated as we have exhausted most of our options regarding testing J

 

Thanking you all in advance for your contribution.

 

Best regards,
Sean

Beginner questions about Intel AMT (kvm/VNC and web-interface)

$
0
0

Hi all

 

I have an PC based on an DQ87PG motherboard (Intel AMT 9.x) and  i5-4570 CPU and I would like to use the out-of-band VNC/KVM features, and the web control panel to restart and power on/off. I have already succeeded in using both by trail-and-error clicking through the Manageability Developer Tool Kit (MDTK), but I lack some basic understanding which I hope to gain by asking some questions:

 

# KVM and VNC?

KVM is keyboard-video-mouse, and VNC is Virtual Network Computing. How are the two linked? VNC already includes all the KVM concepts it seems. Using VNC you can view displays, and keyboard+mouse inputs are transmitted as well. So why not just call it "out-of-band-VNC", or Intel AMT VNC, why have KVM there at all?

 

# Alternatives to RealVNC?

Can the out-of-band KVM/VNC features be used with other VNC clients without limitations? I see guides around on the internet for using TightVNC, but they always include setting an "Allow / use port 5900"-setting. Is RealVNC special in any regards - is their product specially made for Intel AMT, or is Intel AMT specially made for RealVNC?

 

# TLS

Does configuring TLS help protect the "AMT / KVM setup" from unauthorized use? My scenario is that the machine is placed a remote location on an untrusted network. People might try to access the AMT features. As far as I understand there is always the 8 char password (upper/lower case letters, numbers and special chars) protecting all features (KVM/VNC, using MDTK Director/Commander Tool to reconfigure, maybe even entering the ME part of the BIOS). What additional security does TLS provide here? Using the Manageability Director Tool I can create some certificates, set a security profile with "Intel AMT security" set to "TLS security" instead of "Password security only", and then specify some of the home-made certificates. It provides network encryption, of course, but what does that mean practically? Will it make it harder to abuse the AMT features for an attacker, or will it just keep an attacker from seeing my computer screen?

 

# Setup of AMT

Is using the Manageability Developer Tool Kit (MDTK) the way to go when configuring a single machine once in a while (before placing it at some remote location where you would like the option to recover from a crashed OS without driving there)? There is something else, called Intel SCS (Setup and Configuration Software). Will that do all the same things, and is it easier to use?

 

Thank you for your input!
JonasCJ

CPU i3 4th Generation

$
0
0

I have assembled the following list for my new CPU

 

Intel DH87MC 4th Generation Motherboard

Intel Core I-3-4150 Processor

Corsair Vengeance DDR3 4 GB (1 x 4 GB) PC DRAM (CMZ4GX3M1A1600C9)

1TB WD SATA internal DESKTOP Hard Drive Western Digital 1 TB WD10EZEX 7200 RPM

 

But, when ever I am trying to switching my computer I can see only green light on motherboard & Processor hot led or VR hot led blinks. No other movements..

 

Can any one help me to fix the issue.

AMT just simply stops working.

$
0
0

When I try to browse to http://<server>:16992 sometimes it works, then it will just stop working. When it stops I can't even telnet to port 16992. Multiple reboots of the server will *sometimes* make it start working again, but inevitably it will stop again after a few mins.

 

I use a VNC KVM connection to manage this server, but as you would imagine it only works sometimes. It also stops working when the above URL stops working. ALL system and AMT bios are updated to the latest version and the fact that it works sometimes obviously tells me it's not a configuration issue. WHAT is going on here? It's unbelievably frustrating.

Vpro

$
0
0

whatPC configurationrequiredto use technologyVpronow?


SCCM 2012 R2 - Unable to connect using Out of Band Management Console / KVMView

$
0
0

Hello,

 

I have been working on this for two weeks now, with some progress. I would really appreciate any suggestions.

 

Overview of setup:

SCCM 2012 R2 w/

Intel SCS 10.0.11.35 integrated

Intel SCS_SCCMAddon 2.1.6.3

and Intel vPro SCCM add on -v2

I setup the SCS integration using the following documentation:

Integrating Configuration Manager 2012 R2 with Intel SCS 9.0 – Part 1 : Introduction | SCCM GURU

 

PKI Hierarchy

I have setup a Two-Tier PKI Hierarchy using the following documentation:

Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy

 

At this point, I am able to run the following 3 task sequences:

Intel SCS: Platform Discovery

Intel AMT: Discovery

Intel AMT: Configuration

 

Once this is complete, I see

AMT Status: Externally Provisioned &

AMT Version: 10.0.33

 

I am able to utilize the "power control" under Manage out of band.

 

I am unable to:

Use the Out of Band Management Console

Connect to the webui using https://fqdn:16993

Use KVMView

 

To elaborate

Use the Out of Band Management Console

When I attempt to connect I see "System: Connecting" and then it changes to "System: Disconnected"

Under the AdminUILog I see the following:

[15, PID:20500][03/19/2015 14:02:17] :GetAMTPowerState fail with result:0x80072F8F

[12, PID:20500][03/19/2015 14:02:26] :GetAMTPowerState fail with result:0x80072F8F

[14, PID:20500][03/19/2015 14:02:36] :GetAMTPowerState fail with result:0x80072F8F

[15, PID:20500][03/19/2015 14:02:36] :OOBPrepareNormalBootOption: BypassPassword:False, LockKeyboard:False, EnableSOL:False. fail with result:0x80072F8F

[1, PID:20500][03/19/2015 14:02:37] :Microsoft.ConfigurationManagement.ManagementProvider.SmsException\r\nSystem error.\r\n   at Microsoft.ConfigurationManagement.AdminConsole.OobConsole.Utilities.AmtWSMan.CheckResult(Int32 result)

   at Microsoft.ConfigurationManagement.AdminConsole.OobConsole.Utilities.AmtWSMan.PrepareNormalBootOption(Boolean enableBypassPassword, Boolean enableLockKeyboard, Boolean enableSOL)

   at Microsoft.ConfigurationManagement.AdminConsole.OobConsole.Utilities.AmtDevice.CleanUpAmtSettings(Object sender, DoWorkEventArgs e)

   at System.ComponentModel.BackgroundWorker.OnDoWork(DoWorkEventArgs e)

   at System.ComponentModel.BackgroundWorker.WorkerThreadStart(Object argument)\r\nNo details are available for this error.\r\n

 

Connect to the webui using https://fqdn:16993

I reach the webpage I can see my rootca has identified the webpage as the fqdn of the computer / amt device

However, when I attempt to login with my AD credentials, it fails repeatedly.

I have completed the registry fix for IE

 

Use KVMView

 

Initializing Viewer...

 

Using TLS security

 

Connecting to: fqdn

 

Using Kerberos authentication

 

AMT version is 10.0.33

 

Enabling KVM service access point

 

Applying KVM settings

 

The sender was not authorized to access the resource.

 

Intel.Management.Wsman.WsmanFault

 

Connecting to: fqdn

 

Using Proxy 127.0.0.1:57705

 

Disconnected

 

A few things I have noted:

1. I was only able to complete the 3 task sequences when I disabled CRL checking. However, when I check the CRL Distribution Point of the certificate, and plug in the URL, the .crl file opens right up. If I have CRL checking enabled, I receive the following error in the amtopmgr.log:

ERROR: Invoke(get) failed: 80020009argNum = 0 SMS_AMT_OPERATION_MANAGER 3/19/2015 9:17:24 AM 4904 (0x1328)

Description: A security error occurred SMS_AMT_OPERATION_MANAGER 3/19/2015 9:17:24 AM 4904 (0x1328)

Error: Failed to get AMT_SetupAndConfigurationService instance. SMS_AMT_OPERATION_MANAGER 3/19/2015 9:17:24 AM 4904 (0x1328)

DoWSManDiscovery failed with user name: admin. SMS_AMT_OPERATION_MANAGER 3/19/2015 9:17:24 AM 4904 (0x1328)

2. Although all 3 task sequences have completed, if I login to the MEBx in the bios

A. The admin password has NOT been set (although defined in my profile)

B. The current provisioning Mode says PKI, Provisioning Record says "Provision Record is not present"

C. I have pulled the cmos battery, reimaged the machine, & provisioned the computer dozens of times (after every change I made to ensure nothing was left behind)

D. I can see my CA issue a certificate each time I run the Intel AMT: Configuration task sequence

 

Thank you for any help you can provide,

Jay

 

 

 

Valid certificate for PKI configuration not found - Intel SCS 9.1

$
0
0

Hello,

 

I am using Intel SCS 9.1. Machines are listed in SCS console but with status "Configuration Failed" and connection status "Not Discovered". I tried manual discovery by selecting the machine and "Discover data", I am getting below error.

 

Failed while calling

WS-Management call

GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error

0xc000521f: An SSL error occurred. Verify the username and password, and the PSK or certificate settings, where applicable.

Valid certificate for PKI configuration not found.

 

What i did so far

1. Certificates are created in Subordinate CA. I went trough the certificate and validated the settings. Looks like verification are good. I used two documents as a reference to created certificates.

     a) SCCMGuru - Integrating Configuration Manager 2012 R2 with Intel SCS 9.0 – Part 3 : Certification Authority | SCCM GURU

     b) Intel SCS user guide - Section "9.2.5 Defining Enterprise CA Templates"

 

2. Did some research on this form and followed the suggestion of creating a basic low security profile

acuconfig.exe /lowsecurity /output console /verbose ConfigureViaRCSOnly <$SCSServerName> <ProfileName> /wmiuser domain\AMTAdmin /wmiuserpassword P@ssw0rd

(Valid certificate for PKI configuration not found during vPro Provisioning)

     This test failed as well. I get below error

 

Exit with code

75.

Details: Failed to complete remote configuration of this Intel(R) AMT device.

Failed while calling

WS-Management call

GetAmtVersion (CIM_SoftwareIdentity.Get). Intel(R) AMT connection error

0xc000521f: An SSL error occurred. Verify the username and password, and the PSK or certificate settings, where applicable.

Valid certificate for PKI configuration not found.


My final intention is to get it working from SCCM 2012. Since i am unable to do it from SCCM, Started with SCS console to get at-lest few machines going and then think of getting it to work from SCCM.

 

Any suggestion to right direction is appreciated.

 

Thank you

Core i3 + QM87 + Intel NIC + Intel WiFi set has Intel Standard Manageability?

$
0
0

Hi guys, I need confirm if a system with Core i3 4th generation + QM87 + Intel NIC + Intel WiFi has the requirements to use Intel Standard Manageability (on/off, SOL and IDE-R) I don't need KVM.

AMT 6.2+ host based config issue

$
0
0

I have multiple client machines(HP DC8100 and DELL 790) with AMT 6.2 and above.  I'm getting the following failures when trying to use host based configuration on both the 6.2 and 7.0 firmwares.  My command line is \\ti-amt-01\amtconfig\acuconfig.exe /output console /verbose /lowsecurity configamt \\ti-amt-01\amtconfig\amtconfig.xml /decryptionpassword ****

 

I have also included my unecrypted xml file that I am using to load.  I have starred out the password.  My guess is that some of the options selected are admin mode only?  I need to push this out to a few thousand machines so any help would be great!

 

2014-02-26 17:20:10: Thread:2724(ERROR) : ACU Configurator , Category: ConnectServer Source: Src\WMIAccess.cpp : ConnectToNamespace Line: 129: A call to this function has failed - (0xc000278b) (Invalid namespace -2147217394)

2014-02-26 17:20:10: Thread:2724(DETAIL) : ACU Configurator , Category: WMI_GetRequiredRealms Source: Src\SBAWMIMethods.cpp : SBAWMIMethods::WMI_GetRequiredRealms Line: 259: A call to this function has failed - (0xc000278b) ((ExecMethod WMI_GetRequiredRealms) Failed to connect to the RCS.  Invalid namespace (0xc0002779). )

2014-02-26 17:20:10: Thread:2724(ERROR) : ACU Configurator , Category: ConfigAMT failed Source: Src\ActivatorDll.cpp : ClientControlConfiguration Line: 3279: A call to this function has failed - (0xc000278b) (Connection to the Remote Configuration Service is necessary, but the RCSParameters tag is missing in the profile. (RCSAddress))

2014-02-26 17:20:10: Thread:2724(DETAIL) : ACU Configurator , Category: -END- Source: Src\ActivatorDll.cpp : ClientControlConfiguration Line: 3281: ***** END ClientControlConfiguration ******

2014-02-26 17:20:10: Thread:2724(DETAIL) : ACU Configurator , Category: -END- Source: Src\ActivatorDll.cpp : ClientControlConfiguration Line: 3387: ***** END ClientControlConfiguration ******

2014-02-26 17:20:10: Thread:2724(ERROR) : ACU Configurator, Category: Exit Source: Src\ActivatorMain.cpp : wmain Line: 1223: ***********Exit with code 68. Details: Invalid parameter was found.  (RCSAddress)

Error when provisioning Intel AMT: "The value for MEBx Password was not supplied"

$
0
0

I'm trying to provision Intel AMT on one of our machines before deploying more widely in our organisation, but when attempting to do so via either the ACUConfig tool, or the SCS Console, I receive the error message "The value for MEBx Password was not supplied.  Error missing mandatory parameter. ". I've google this error, and apparently the string "The value for MEBx Password was not supplied." doesn't exist on the web.


Here's what I've done to get to this point...

  • Installed SCS Console on a server and issued a certificate from our Root CA as per official documentation.
  • Added the hash of our Root CA to MEBx.
  • Configured a profile in the SCS Console named "default", setting only the system settings.
  • Along the way I've used the same password for everything to temporarily avoid any confusion between digest passwords, MEBx passwords, and so on.

 

I've since attempted to provision the machine, first by running: ACUConfig.exe /output console ConfigViaRCSOnly intelrcs.domain.local default /AdminPassword "******". That failed with the aforementioned error.


I then successfully ran a system discovery to populate the SCS Console with this machine: ACUConfig.exe /output console SystemDiscovery /ReportToRCS /RCSAddress intelrcs.domain.local. After doing so, I setup a provision job via the SCS Console and upon running got the same error regarding the missing MEBx password.

 

Honestly, this whole experience has been epically painful and complicated. There's so many different modes of configuration, each with their own limitations and caveats. I understand that security is important as we're talking about low-level remote access to machines here (even powered off ones), but information is spread everywhere. It's shocking.

 

Anyway, I'm hoping someone can help me here.

 

Cheers

Viewing all 632 articles
Browse latest View live