vPro security technologies and methodologies are designed into the PC's
chipset and other system hardware. During deployment of vPro PCs, security credentials, keys, and other critical information are stored in
protected memory (not on the
hard disk drive), and erased when no longer needed.
Security and privacy concerns According to Intel, it is possible to disable AMT through the BIOS settings, however, there is apparently no way for most users to detect outside access to their PC via the vPro hardware-based technology. Moreover, Sandy Bridge and future chips will have, "...the ability to remotely kill and restore a lost or stolen PC via 3G ... if that laptop has a 3G connection" Many vPro features, including AMT, are implemented in the
Intel Management Engine (ME), a distinct processor in the chipset running
MINIX 3, which has been found to have numerous
security vulnerabilities. Unlike for AMT, there is generally no official, documented way to disable the Management Engine (ME); it is always on unless it is not enabled at all by the OEM.
Security features Intel vPro supports industry-standard methodologies and
protocols, as well as other vendors' security features: • Intel
Total Memory Encryption (Intel TME) • Intel
Trusted Execution Technology (Intel TXT) • Support for
IEEE 802.1x,
Preboot Execution Environment (PXE), and Cisco SDN in desktop PCs, and additionally
Microsoft Network Access Protection (NAP) in laptops Intel Boot Guard was first released in
Haswell processors in June 2013. Although there are some isolated cases of successful circumvention of Intel Boot Guard technology, these are rather exceptions that prove the rule.
Technologies and methodologies Intel vPro uses several industry-standard security technologies and methodologies to secure the remote vPro
communication channel. These technologies and methodologies also improve security for accessing the PC's critical system data,
BIOS settings, Intel AMT management features, and other sensitive features or data; and protect security credentials and other critical information during deployment (setup and configuration of Intel AMT) and vPro use. •
Transport layer security (TLS) protocol, including
pre-shared key TLS (
TLS-PSK) to secure communications over the out-of-band network interface. The TLS implementation uses
AES 128-bit encryption and
RSA keys with modulus lengths of 2048 bits. • HTTP digest authentication protocol as defined in RFC 2617. The management console authenticates IT administrators who manage PCs with Intel AMT. •
Single sign-on to Intel AMT with
Microsoft Windows domain authentication, based on the Microsoft
Active Directory and
Kerberos protocols. • A
pseudorandom number generator (PRNG) in the
firmware of the AMT PC, which generates high-quality
session keys for secure communication. • Only
digitally signed firmware images (signed by Intel) are permitted to load and execute. • Tamper-resistant and access-controlled storage of critical management data, via a protected, persistent (nonvolatile)
data store (a memory area not on the
hard drive) in the Intel AMT hardware. •
Access control lists for Intel AMT realms and other management functions. ==vPro hardware requirements==