One of the powerful features of vPro is our hardware based KVM.


The easiest way to invoke an Intel vPro KVM session?


Install VNC Viewer Plus(built in Intel vPro amt support) from, apply a trial license, then call from PowerShell:


PS C:\Windows\system32> Import-Module intelvpro
PS C:\Windows\system32> cd 'C:\Program Files (x86)\RealVNC\VNCViewerPlus'
PS C:\Program Files (x86)\RealVNC\VNCViewerPlus> \vncviewerplus.exe -amtusername=admin -amtusefqdn=0

call VNCviewerplus.png


After calling I type in my digest password:

starting VNCviewerplus.png


There you go! Hardware KVM.


So let me explain how I called VNC Viewer Plus. My demo system is provisioned with a digest user name of (you guessed it) "admin". So I must pass that to VNC Viewer Plus via the -amtusername parameter. I also do not have TLS security on my (demo) network so therefore I set the parameter -amtusefqdn=0 to indicate I do not want to use a fully qualified domain name for TLS. Of course if you are using TLS when managing your Intel vPro endpoints, you will need to change this.