Skip navigation
1 2 3 Previous Next

Intel vPro Expert Center Blog

1,192 posts

While working with the new SCCM version, I noticed that I was missing some Intel AMT Integration that I used to have, and decided to look into it and made a right click menu to get back some of the functionality. After building this plugin, options for restarting, power on\off, and KVM should show under a vPro Tab on the right click menu.

 

Installation of PowerShell AMT 1:1 Reboots from SCCM Console

  1. Close SCCM Console
  2. Download and install vPro Powershell Module on SCCM Server (Download Intel® vPro™ Technology module for Windows* PowerShell) 1.PNG
  3. On SCCM Server go to C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\XmlStorage\Extensions\Actions\2.PNG
    1. Create folder 3fd01cd1-9e01-461e-92cd-94866b8d1f39

      This folder title is a GUID that translates to where the menu will pop up (there are different GUIDs for other locations)

    2. Inside Folder create xml file – IntelvProExt.xml
      3.PNG
    3. Edit file to include following

<ActionDescription

                class="Group"

                DisplayName="Intel vPro"

                MnemonicDisplayName="Intel vPro"

                Description="Contains commands for Intel vPro hardware">

                <ShowOn>

                                <string>DefaultHomeTab</string>

                                <string>ContextMenu</string>

                </ShowOn>

                <ActionGroups>

<ActionDescription

                                                class="Executable"

                                                DisplayName="PowerShell Reboot"

                                                MnemonicDisplayName="PowerShell Reboot"

                                                Description="Sends a forced PowerShell Reboot"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe</FilePath>

                                                                <Parameters>Invoke-AMTForceBoot ##SUB:Name##.vprodemo.com -tls -operation reset -device harddrive</Parameters>

                                                </Executable>

                                </ActionDescription>

                               

                </ActionGroups>

</ActionDescription>

  1. d. Save and Close File
  2. e. Restart SCCM Console
  3. Right click menu will now have Intel vPro menu with PowerShell Reboot Options

 

From here we have a basic powershell reboot for AMT systems. should look something like this

5.PNG

 

 

After having reboots taken care of I figured I would expand this menu a bit and get some more functionality baked in.

 

  1. To Add KVM options with RealVNC Viewer Plus - This will take advantage of the AMTKVM options for Out of Band KVM

                              <ActionDescription

                                                class="Executable"

                                                DisplayName="Start KVM"

                                                MnemonicDisplayName="Start KVM"

                                                Description="Starts a KVM session with Intel hardware"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\Program Files (x86)\RealVNC\VNCViewerPlus\vncviewerplus.exe</FilePath>

                                                                <Parameters>-uri kvm://##SUB:Name##</Parameters>

                                                </Executable>

                                </ActionDescription>

 

  1. To add Reboots\Power Down\Power On via AMTSDK – REQUIRES AMTSDK (https://software.intel.com/en-us/amt-sdk/download)
    1. Extract files needed to C:\AMT (or location of your choosing – make sure to adjust location in descriptions) from .\AMTSDK\Windows\Intel_AMT\Bin and .\AMTSDK\Windows\Intel_AMT\Bin Ws-Management\C++
      1. CPPCimFramework.dll
      2. CPPCimFrameworkUntyped.dll
      3. RemoteControlTyped.exe

7.PNG

                                   <ActionDescription

                                                class="Executable"

                                                DisplayName="Power On"

                                                MnemonicDisplayName="Power On"

                                                Description="Sends a Power On Command"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\AMT\RemoteControlTyped.exe</FilePath>

                                                                <Parameters>-p On -host ##SUB:Name## -krb -tls</Parameters>

                                                </Executable>

                                </ActionDescription>

                               

                                <ActionDescription

                                                class="Executable"

                                                DisplayName="Reboot"

                                                MnemonicDisplayName="Reboot"

                                                Description="Sends a Reboot Command"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\AMT\RemoteControlTyped.exe</FilePath>

                                                                <Parameters>-p powercycle -host ##SUB:Name## -krb -tls</Parameters>

                                                </Executable>

                                </ActionDescription>

                                                               

                                <ActionDescription

                                                class="Executable"

                                                DisplayName="Power Off"

                                                MnemonicDisplayName="Power Off"

                                                Description="Sends a Power Off Command"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\AMT\RemoteControlTyped.exe</FilePath>

                                                                <Parameters>-p Off -host ##SUB:Name## -krb -tls</Parameters>

                                                </Executable>

                                </ActionDescription>

                               

                                <ActionDescription

                                                class="Executable"

                                                DisplayName="Graceful Reboot (AMT 9+ only)"

                                                MnemonicDisplayName="Graceful Reboot (AMT 9+ only)"

                                                Description="Sends a graceful reboot command (AMT 9+ only)"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\AMT\RemoteControlTyped.exe</FilePath>

                                                                <Parameters>-p gracefulreset -host ##SUB:Name## -krb -tls</Parameters>

                                                </Executable>

                                </ActionDescription>

                               

                                <ActionDescription

                                                class="Executable"

                                                DisplayName="Graceful Shutdown (AMT 9+ only)"

                                                MnemonicDisplayName="Graceful Shutdown (AMT 9+ only)"

                                                Description="Sends a graceful shutdown command (AMT 9+ only)"

                                                RibbonDisplayType="TextAndSmallImage">

                                                <ShowOn>

                                                                <string>ContextMenu</string>

                                                                <string>DefaultHomeTab</string>

                                                                <string>DefaultContextualTab</string>

                                                </ShowOn>

                                                <Executable>

                                                                <FilePath>C:\AMT\RemoteControlTyped.exe</FilePath>

                                                                <Parameters>-p gracefuloff -host ##SUB:Name## -krb -tls</Parameters>

                                                </Executable>

                                </ActionDescription>

 

At the end we have something like this

6.PNG

 

 

Enjoy the right-click menu

Have a SE7210TP1-E server board and since I added a nvidia ge force 6200  pci graphics card the system reserved 1 gig of ram for it self.

 

Question is WHY?

Have 4 gig ram onboard, if I unplug graphics card I have 4 gig system ram available again. WHY?

 

The onboard graphics card is a ATI rage 2 xl chipset with 8 meg ram.

The onboard graphics cant handle video data of today anymore.

john262

Intel 7260 Bluetooth issues

Posted by john262 Jan 14, 2016

I had the same issues as many that posted: No Bluetooth connectivity, Bluetooth showing the yellow triangle in device manager, etc.I even purchased a Bluetooth dongle which showed as functioning properly in device manager most of the time. Sometimes the yellow triangle showed up with that also. To remedy this issue with the dongle, I would disable it, then enable it and the yellow triangle would disappear. But, I still could not connect any Bluetooth devices to my PC. They would pair, but not be able to connect.I discussed this issue with tech support of my PC manufacturer and he agreed with my theory that the cause was probably Windows 10 and I would likely have to wait for a future update. Believe me. I tried everything I saw on blogs to fix this and nothing worked. Then on a whim, I decided to uninstall everything related to the Wi-Fi card and Bluetooth. I used Revo Uninstaller Pro (there's a free version). It does a better job of removing everything associated with the program you want removed than Programs and Features in Control Panel. When I restarted the PC after uninstalling, I noticed that I still had connection to my router and the yellow triangle on Intel Wireless Bluetooth in device manager disappeared. I did not use the driver disc that came with the card. I immediately attempted to connect my Soundblaster Jam headset to the PC and, what do you know, it worked! It has worked for the last two days, knock on wood. Maybe, my solution would be helpful to others.

Cyberthreats, unfortunately, never take a holiday. In fact, with each passing day, attacks become more numerous, organized, powerful, and, with the explosion in smart devices and cloud-based systems, more opportunistic.

 

No wonder 50 percent of the 182 IT professionals who participated in Computerworld’s Forecast 2016 survey said they plan to increase spending on security technologies in the next 12 months. Security ran a close second after cloud computing as the most important technology project currently underway at their organizations.

 

Security’s ‘Perfect Storm’


Mike Seawright, director of security business development at Intel, discussed these challenges in Secure Your Business, our latest webinar in the Business Devices Webinar Series. Not only are IT security professionals facing increasing complexity with more devices and the shift to cloud computing, but they must act quickly, as organizations can be compromised in mere minutes, while utilizing limited staffing and budget resources.

 

The latest devices with Intel vPro technology offer a solid first line of defense in preventing threats. Built on Intel’s security technologies, each successive generation delivers evolutionary security capabilities. Intel Core vPro processors feature remote capabilities that allow scarce IT staff resources to maximize their efficiency in protecting compute devices across the enterprise.


What Aspects of Security Are Most Important?


Unfortunately, there is no easy strategy to take in IT security. “Security is complicated—sorry folks!” Mike said. To be truly secure, he explained, IT departments need to defend all areas against modern attacks: identity, platform, data, and applications.


However, Mike explained, a whopping half of all security breaches stem from identity and authentication gaps, so stronger authentication is a key part of security. Fortunately, Intel and Microsoft work collaboratively to combat security threats with user-friendly features and technologies such as True Key by Intel Security, Microsoft Credential Guard, and Intel Identity Protection Technology Multifactor Authentication.


These and other multifaceted defensive tactics and tools were explained in the hour-long webinar, which included a Q&A session. Here is a sample of what webinar participants had on their minds:


Q: I have health care clients. Do you have a security checklist?

 

Mike: Our health care team has a presentation you could use for this. Send me a note at michael.seawright@intel.com.

 

Q: Does True Key update itself?

 

Mike: True Key is like most software in that some portions will update automatically if that setting is applied. But then as we have major releases, it will usually require a user update.

 

Q: Are there any encryption key "manager" apps available for SMBs or partners that are acting as the IT department for multiple SMBs?

 

Mike: The McAfee ePolicy Orchestrator does a nice job of this. Another vendor to look at would be Venafi.

 

If you missed the webinar, you can listen in to the on-demand version available now and hear other questions and answers as well as download the presentation slides.

 

Ask a Question, Win a Tablet


This month, the lucky winners of a new Intel-based tablet and a new set of SMS Audio BioSport Smart Earbuds are Ed Goad of MeteorComm and D. Komnick of Advanced Business Technology Services, respectively. Congrats to both! And, if you didn’t win this time, you’ll have another chance to ask questions and win at the next webinar, which is sure to be a popular one: Introducing 6th Gen Intel Core vPro.

 

If you’ve already registered for the Business Devices Webinar Series, you’re all set: just click on the link in the reminder email you’ll receive a day or two before the event. But if you need to register, you can join our next webinar by clicking here.

 

  With the latest Intel Core vPro processor-based devices, more businesses big and small can set and reach their New Year’s resolution to make their entire enterprise more secure.

By the time a couple is married 21 years, they’ve had their share of disagreements, unlocked the mysteries of the other, and, happily, come to the realization that they’re better together than not.

 

Such is the double-decade partnership between Intel and Microsoft, which has persevered through tech booms and busts. The “Better Together: Windows 10 and Intel Core vPro Processor-based Devices” webinar glimpsed into the future with the Intel Core vPro processor and Microsoft OS, Windows 10. We saw how they work together to raise the bar in enterprise computing, with much excitement from end users, IT and business decision makers, and OEMs.

 

Windows 10 fully supports the Intel vPro pillars of strength—productivity, security, and manageability—with a familiar Windows 7-based user interface and numerous new dynamic features. For example, for better productivity, Microsoft host expert Stephen Rose explained how a device used as a PC with a keyboard and mouse can switch for optimal tablet use. Windows 10 responds automatically by adjusting window size for touch-based actions and biometrics.


Sixth-gen Intel Core vPro processor-based devices “are the most manageable, most productive, and most secure platform for enterprise,” webinar Intel technology expert Greg Reiff said. Intel Core vPro has enabled the creation of more streamlined form factors that are 50 percent thinner, 50 percent lighter than devices more than four years old, and use much less power.


With the newest features in Windows 10, users and IT departments can build more security around their data and devices. Features such as Intel Virtualization Technology prevent unauthorized software from being loaded, and Intel SSD Pro Series Data Protection guards data off-network. These features on the back end support the mission on the front end to “kill the password,” according to Rose, by “moving away from what you know [passwords] to what you have; things like your face (detected via Intel RealSense and Microsoft Hello), fingerprints, and wearables.”


Webinar attendees were clamoring to know more, asking many questions during the interactive Q&A. Here’s a sample:


Q: Can you add biometric devices to older PCs that run Windows 10?


Steve Forsberg (Intel host expert): You could attach an external RealSense camera if your older hardware does not have an infrared camera integrated.


Q: Are the new Intel Q170 chipset machines shipping now?


Greg Reiff (Intel host expert): Some are shipping but not as enterprise Intel Core vPro platforms [those are scheduled for release soon].


Q: Is the Microsoft Surface Pro 4 tablet available through distribution?


Stephen Rose (Microsoft host expert): Yes. We have a wide variety of resellers including Dell, CDW, and others.


Q: Is the process/recommendation of upgrading the UEFI published somewhere?


Greg Reiff: Upgrading a platform’s BIOS to UEFI is OEM-specific. Each OEM should have an upgrade guide on their support site under drivers > firmware > download. If vPro is enabled, we have best practices documents on www.intel.com.


As with all webinars in the Business Devices Webinar Series, participants were entered into a drawing for an Intel-based tablet or a set of SMS Audio BioSport smart earbuds. Congratulations to tablet winner Kent Liu of Williams-Sonoma and to Andy Yu of American Portwell Technologies for scoring the cool earbuds!


Our next webinar is happening December 9, 10 a.m. PST. Be sure to attend, because it’s all about security: what the key risks are, how to manage them, and ways to prepare with the latest solutions from our top technology experts.


If you’ve already registered for the Business Devices Webinar Series, click on the link in the reminder email you’ll receive a day or two before the event. If you need to register, we’d love to have you join our next session by clicking here.


The “Better Together: Windows 10 and Intel Core vPro Processor-based Devices” webinar can be watched anytime on demand if you missed it. For more on how Windows 10 and the latest Intel technology can help businesses overcome their challenges, read this recent white paper.


It’s exciting to see how ongoing collaboration between Intel and Microsoft continues to advance better, more efficient, and more amazing experiences in the world of enterprise computing.

With ePO Deep Command v2.4 you can activate Intel AMT v7+ out of the box without using Intel RCS or the need of purchasing configuration certificate. You can even put the Systems into Admin Control Mode. Please refer to the blog post.

hero16.jpg

Coming soon, now I am in testing step....

jb2559

Graphics Driver issue

Posted by jb2559 Aug 25, 2015

I recently upgraded from Windows 7 to Windows 10 and now when my grandson tries to play Minecraft he gets an error message that the graphics driver needs updated.  I determined that it currently has a Intel Driver and I ran the Intel Driver Utility and it came back and said no drivers were needed.  I thought I would try and manually download a driver but when I went to the list of Intel drivers there was not one for Windows 10.  Only Windows 7 and Vista.  I tried to download that one and received an error message that my computer did not meet the minimum requirements.  Has anyone else run into a similar issue and if so how did you resolve it?

I have a new Windows 10 HP Laptop.  A popup is suggesting I install this software to keep my system up to date and will I agree to the terms.  I find this intrusive and wish to ask if it's important. Why do I need this?

Tmowreader

Multiple Alarms Feature

Posted by Tmowreader Jul 9, 2015

Hello, I am trying to remotely configure 150ish PC's with multiple AMT Alarms.  I can see from this webpage that AMT 8.0 and later supports the Multiple Alarm Feature, and all of our machines are 8.1 or newer.  I have successfully created individual alarms on multiple machines at once using the Intel vPro PowerShell GUI.  (Very hand tool BTW.)  I assume however that the tool was built before the ability to have multiple alarms as the option to set them does not exist in the GUI.  When I run a Get-Help command on Set-AMTAlarmclock I don't see a reference to the "ElementName" filed mentioned in the link above that appears to identify the individual alarms.

 

I'm fairly new to AMT and PowerShell and would appreciate any guidance you can provide.

 

I apologize if this is not the correct Forum, I couldn't find another that was more relevant.  I realize this is not related to Intel SCS.

 

Thank you for your time,

 

 

Tyler

Hi,

 

I am trying to setup an Intel SCS server to deploy AMT profiles to HP Intel vPro PCs.

 

In order to do this, I need to provision a Certificate, I got one from Comodo, but Intel SCS is asking for a CA Plugin couldn't find this anywhere

Is only giving me the option to use Domain Internal CA Certificates.

 

Any help

An enterprise customer wanted to enable Active Directory integration with Intel AMT on their large Intel vPro client estate. However their security team wanted the permissions for the Intel SCS service account against the Organisational Unit (OU) where Intel AMT computer objects are stored to support Kerberos, to be as restrictive as possible.

 

As defined in the Intel® Setup and Configuration Software User Guide, permissions for the SCS service account on the OU container are “Create Computer objects”, “Delete Computer objects” and “List content” (the latter seems to be default) and full control on descendant computer objects. The latter was not acceptable so ...

 

SCS_AD_Perms_OU_Create_Delete.jpgSCS_AD_Perms_OU_List.jpg

... to support AMT maintenance tasks such as updating the password of the AD object representing the Intel AMT device and ensuring the Kerberos clock remains synchronised, the following explicit permissions are required on all descendant computer objects within the OU.

SCS_AD_Perms_Descendant_Change_Password.jpgSCS_AD_Perms_Descendant_Write_All_Properties.jpg

The customers security team were happier with these permissions and they are now activating their Intel vPro systems to enable the powerful manageability and security capabilities that Active Management Technology, available on Intel vPro Technology platforms provides.

Take from an original (deleted) post by TerryCutler.

 

Intel AMT Remote Configuration enables the authentication of the firmware for an initial Intel AMT configuration event.  Remote configuration supports Admin Control Mode configuration of the Intel AMT firmware and is typically done using valid provisioning certificate for the customers environment.

 

This authentication process has to be completed without user interaction. If the requesting application i.e. Intel SCS is prompted every time access to the private key is required, the autonomy is lost.

 

When importing the certificate to your target server, if the strong key protection option is selected and grayed out, this indicates a conflicting group policy for cryptography has been applied to the server.

 

Changing the group policy setting of the server will remove this barrier, so set the System Cryptography policy to the "User input is not required when new keys are stored and used"

Periodically the question comes up “Can I use Intel vPro Technology to remotely unlock an encrypted hard drive ?”, either because unattended encrypted systems need to be booted outside of business hours and patched or because there is a significant cost associated with IT helpdesk calls when helpdesk technicians must remotely guide end users through a recovery process if they forgot their drive encryption passphrase or PIN.

 

Here are some available solutions for remotely unlocking encrypted drives using Intel vPro Technology…

 

Intel Hardware KVM Technology: Using Intel AMT and a hardware KVM viewer like VNC RealVNC Viewer Plus or McAfee KVMView (part of McAfee ePO Deep Command), it is possible for an IT helpdesk technician to remotely connect to an encrypted Intel vPro system and manually enter the recovery password at the pre-boot authentication screen to unlock the encrypted drive so Windows can boot. The remote connection to the Intel vPro system can be made over a wired or wireless LAN and the system can be connected directly to the internal enterprise network or through a Client Initiated Remote Access (CIRA) session. The recovery password needs to have been previously escrowed to a backup database (usually done automatically as part of standard IT policy) such as Microsoft Active Directory, McAfee Managed Native Encryption (MNE) or Microsoft BitLocker Administration and Monitoring (MBAM) and the helpdesk technician needs access to that database. This solution is compatible with Windows Vista, Windows 7 and Windows 8 and is suitable for on-demand 1:1 type scenarios but it is not suitable for automated 1:Many type scenarios.

 

Windows PowerShell: Using Intel AMT and Windows PowerShell it is possible to execute a PowerShell script on a central server or IT helpdesk workstation and have that script automatically retrieve previously escrowed BitLocker recovery passwords from a backup database, remotely connect to an encrypted Intel vPro system and use Serial-over-LAN (SOL) functionality to automatically input the recovery password to the pre-boot authentication screen to unlock the encrypted drive so that Windows can boot. This scripted approach automates the entire encrypted drive unlock process and can be invoked on-demand by a helpdesk operator or scheduled to run when systems need to be patched. This solution can be used with systems connected over a wired or wireless network and connected directly to the internal enterprise network or through a CIRA session. This solution is compatible with Windows Vista, Windows 7 and Windows 8 and is suitable for on-demand 1:1 type scenarios and automated 1:Many type scenarios. The video at http://www.youtube.com/watch?v=2ioN5BlD96Q shows an example of such a solution working. A consideration for using this with BitLocker is that when the recovery password is being automatically entered into the pre-boot authentication screen, the password is momentarily visible to the end user. If this is an issue then the recovery password could be programmatically changed as part of the IT procedure associated with unlocking systems.

 

McAfee Drive Encryption: Using Intel AMT, McAfee ePO Deep Command and McAfee Drive Encryption (MDE) 7.X it is possible to configure MDE policies so that the MDE pre-boot authentication code automatically retrieves a disk unlock password from the centralized McAfee EPO server using a Serial-over-LAN (SOL) connection and uses this password to unlock the encrypted drive so Windows can boot. The Serial-over-LAN connection between Intel vPro systems and the McAfee EPO server can be made over a wired or wireless LAN and systems can be connected directly to the internal enterprise network or through a Client Initiated Remote Access (CIRA) session. MDE supports a variety of unlock policies including the ability to limit the number of consecutive unlock operations, the ability to control the times and weekdays when unlock operations are valid and the ability to configure unlock operations to operate inside our outside the enterprise network. This solution is compatible with Windows Vista, Windows 7 and Windows 8 and is suitable for on-demand 1:1 type scenarios and automated 1:Many type scenarios. It is worth noting that this solution operates automatically with Intel vPro systems regardless of whether they require user consent or not.

There are some situations in which it would be nice to be able to export and import Intel Setup and Configuration Service (Intel SCS) provisioning profiles...

 

  • Environments with multiple Intel RCS servers to accomodate provisioning workload where profiles need to be duplicated across servers
  • Environments with multiple Intel RCS servers because of organization administration demands (i.e. politics, segregation...) where profiles need to be copied across servers
  • Situations in which it is required to simply backup and restore profiles

 

 

Exporting profiles from Intel RCS is simple enough; from the Intel SCS console you use the toolbar to export profiles to an encryted XML format file. But there is no import function on the Intel SCS console to import profiles from a backup file or another Intel RCS server.

 

So here's a simple solution; Intel RCS supports a WMI provider which is used to communicate with other software such as the SCS console and ACUConfig utility. Intel SCS provisioning profiles (amongst other things) can be read and written using this WMI provider. Windows PowerShell includes built-in cmdlets to provide easy access to WMI providers. With a little effort we can construct a couple of lines of PowerShell script to do everything we need to export, backup, restore and import profiles with Intel RCS servers.

 

The following code reads all Intel SCS profiles from an Intel RCS server and stores them in a PowerShell variable...

 

# Configure source RCS server
$SourceRCSServer = "SourceRCSServerHostname"


# Read profiles from source RCS server
$RCSProfiles = Get-WmiObject -Class "RCS_Profile" -Namespace "root/Intel_RCS_Editor" -Authentication PacketPrivacy -ComputerName $SourceRCSServer

 

Once we've read all the profiles, we may want to back them up. The following code copies our prevously read profiles to a backup file...

 

# Save profiles to backup file

$RCSProfiles | Export-Clixml .\ProfilesBackup.xml

 

Sometime later we may want to restore our profiles. The following code restores our profiles from the backup file to a PowerShell variable...

 

# Restore profiles from backup file

$RCSProfiles = Import-Clixml .\ProfilesBackup.xml

 

And finally, if we want to write our profiles to one or more Intel RCS servers, the following code writes our profiles from a PowerShell variable to Intel RCS...

 

# Configure one or more destination RCS servers
$DestinationRCSServers = "DestinationRCSServer1", "DestinationRCSServer2", "DestinationServerN"


# Write profiles to destination RCS servers
foreach ($DestinationRCSServer in $DestinationRCSServers)
{
   # Read and delete any existing profiles on the destination RCS server
   Get-WmiObject -Class "RCS_Profile" -Namespace "root/Intel_RCS_Editor" -Authentication PacketPrivacy -ComputerName $DestinationRCSServer | Remove-WmiObject

 

   # Write all profiles to the destination RCS server
   foreach ($RCSProfile in $RCSProfiles)
   {
      Set-WmiInstance -Class "RCS_Profile" -Namespace "root/Intel_RCS_Editor" -Authentication PacketPrivacy -ComputerName $DestinationRCSServer -Arguments @{ElementName=$RCSProfile.ElementName;InstanceId=$RCSProfile.InstanceId;Text=$RCSProfile.Text;ProfileDescription=$RCSProfile.ProfileDescription;SolutionGUID=$RCSProfile.SolutionGUID;SolutionName=$RCSProfile.SolutionName} | Out-Null
   }
}

 

All of the above code assumes the currently logged on Windows user has access to the Intel_RCS_Editor WMI namespace and appropriate DCOM permissions on the Intel RCS server (see the Intel SCS Users Guide for information on configuring these permissions during Intel RCS installation). The example code can easily be enhanced, for example scheduling it to run regularly to automatically synchronize profiles across multiple Intel RCS servers or by using PowerShell's filtering capabilities to save some profiles and delete others.

 

Two cautionary notes:

 

  1. The code shown above to backup profiles to a file does not encrypt those files, therefore any plaintext credentials in the profile (e.g. the MEBX password, a fixed AMT admin password, AMT digest credentials or KVM RFB password) will be visible in the backup file. The Intel SCS package includes a file encryption utility called SCSEncryption that can be used to encrypt/decrypt profile backup files or the files can be stored such that they are only accessible to authorized personnel.
  2. Profiles containing Microsoft Active Directory domain accounts, domain groups or certificate template information are tied to specific Active Directory installations because profiles store domain account, domain group and certificate template information by SID information rather than by name. SID's are specific to individual Active Directory installations therefore profiles cannot be transported between installations if they contain domain accounts, domain groups or certificate template information. So this means you can use the above scripts with Intel RCS servers if they are all part of the same Active Directory structure (which is typically the case with most organizations). But profiles containing domain accounts, domain groups or certificate templates cannot be copied between different customer environments or between customer test environments and production environments if they are based on different Active Directory installations.

 

Details of the Intel SCS WMI provider classes and methods are available in the downloadable Intel SCS SDK at https://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=20921

 

Filter Blog

By date: By tag: