Intel (R) MEBX User Guide PDF
Intel (R) MEBX User Guide PDF
May 2015
Revision 1.0
Intel Confidential
By using this document, in addition to any agreements you have with Intel, you accept the terms set forth below.
You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products
described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes
subject matter disclosed herein.
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN
INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS
ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES
RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER
INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or
death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY
AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF
EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF,
DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH
MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE,
OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or
characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no
responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change
without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the product to deviate
from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling
1-800-548-4725, or go to: http://www.intel.com/design/literature.htm%20
This document contains information on products in the design phase of development. All products, platforms, dates, and figures specified
are preliminary based on current expectations, and are subject to change without notice. All dates specified are target dates, are provided
for planning purposes only and are subject to change.
ENERGY STAR is a system-level energy specification, defined by the Environmental Protection Agency that relies on all system components,
such as processor, chipset, power supply, etc.) For more information, visit http://www.intel.com/technology/epa/index.htm
Intel® Active Management Technology (Intel® AMT) requires activation and a system with a corporate network connection, an Intel® AMT-
enabled chipset, network hardware and software. For notebooks, Intel® AMT may be unavailable or limited over a host OS-based VPN,
when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and
configuration. For more information, visit http://www.intel.com/technology/platform-technology/intel-amt.
KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel®
Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported.
Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup
and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro
Intel® Small Business Advantage (Intel® SBA) requires an Intel® Small Business Advantage enabled system and proper configuration.
Availability of features will depend upon the setup and configuration by your PC manufacturer. Consult your system manufacturer.
Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for
release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing
of any product or services and any such use of Intel's internal code names is at the sole risk of the user.
Intel, the Intel logo, Core™, Pentium®, Celeron®, and Intel® vPro™ are trademarks of Intel Corporation in the U.S. and other countries.
2 Intel Confidential
Contents
1 Introduction ...................................................................................................... 6
1.1 Intel® Management Engine BIOS Extension (Intel® MEBX) Overview ............. 6
1.2 Scope of Document ................................................................................. 6
1.3 Target Audience ..................................................................................... 6
1.4 Acronyms .............................................................................................. 7
1.5 Related Documentation............................................................................ 8
2 Client System Requirements ............................................................................... 9
Intel Confidential 3
Figures
Figure 3-1: Intel® MEBX Configuration User Interface Main Menu.......................... 11
Figure 3-2: Intel® ME Platform Configuration ..................................................... 13
Figure 3-3: Change Intel® ME Password ............................................................ 14
Figure 3-4: Local FW Update Settings................................................................ 15
Figure 3-5: Intel® AMT Configuration ................................................................ 16
Figure 3-6: SOL/Storage Redirection/KVM ......................................................... 17
Figure 3-7: User Consent ................................................................................. 19
Figure 3-8: Intel® ME Network Setup ................................................................ 21
Figure 3-9: Intel® ME Network Name Settings .................................................... 22
Figure 3-10: Periodic Update Interval ................................................................ 24
Figure 3-11: TTL Screen .................................................................................. 25
Figure 3-12: TCP/IP Settings ............................................................................ 26
Figure 3-13: Wired LAN IPV4 Configuration ........................................................ 27
Figure 3-14: DHCP Mode Disabled .................................................................... 28
Figure 3-15: Activate Network Access ............................................................... 29
Figure 3-16: Unconfigure Network Access .......................................................... 31
Figure 3-17: Intel® Remote Setup and Configuration........................................... 32
Figure 3-18: Current Provisioning Mode ............................................................. 33
Figure 3-19: Provisioning Record ...................................................................... 34
Figure 3-20: Intel® Remote Configuration .......................................................... 36
Figure 3-21: Activate RCFG .............................................................................. 37
Figure 3-22: Intel® Remote Configuration .......................................................... 38
Figure 3-23: Manage Hashes ............................................................................ 39
Figure 3-24: Adding a New Hash Name ............................................................. 40
Figure 3-25: Add Hash - Certificate ................................................................... 41
Figure 3-26: Add Hash - Active......................................................................... 42
Figure 3-27: Deleting a Hash ........................................................................... 43
Figure 3-28: Change Active State of Hash .......................................................... 44
Figure 3-29: View Hash details ......................................................................... 45
Figure 3-30: Power Control .............................................................................. 46
Figure 3-31: Idle Timeout ................................................................................ 48
Figure 3-32: Exit Confirmation ......................................................................... 49
Figure 3-33: Intel® MEBX CPU Replacement Popup Message ................................ 53
Figure 4-1: Configuration Modes ....................................................................... 54
Figure 7-1: Intel® MEBX Options....................................................................... 56
Tables
Table 3-1: Intel® AMT Unprovisioning................................................................ 30
Table 3-2: Supported Power Packages ............................................................... 47
Table 5-1: Intel® MEBX UI Global Reset Options ................................................. 55
4 Intel Confidential
Revision History
Intel Confidential 5
Introduction
1 Introduction
Note: The Intel® ME configuration procedures described in this guide are part of the larger
Intel® vPro™ technology activation and provisioning process. These configuration
procedures can vary significantly (or be performed automatically) and depend on
which third-party management console you are using. See the Related Documentation
section of this guide (section 1.5) for a list of Intel-authored provisioning guides that
are specific to several popular management consoles. These provisioning guides
provide the end-to-end process for provisioning your Intel® vPro™ computers with the
specified management console, and may or may not include references to the Intel®
ME manual configuration procedures in this guide (depending on which provisioning
model is used).
Note: Readers should have a basic understanding of networking and computer technology
terms, such as TCP/IP, DHCP, IDE, DNS, Subnet Mask, Default Gateway and Domain
Name. Explanation of these terms is beyond the scope of this document.
6 Intel Confidential
Introduction
1.4 Acronyms
Acronym Description
FW Firmware
HW Hardware
Intel AMT
®
Intel® Active Management Technology
IP Internet Protocol
OS Operating system
SW Software
Intel Confidential 7
Introduction
Acronym Description
http://communities.intel.com/community/vproexpert?view=documentsln
8 Intel Confidential
Client System Requirements
Intel Confidential 9
Intel® ME Manageability Features
3 Intel® ME Manageability
Features
The Intel® MEBX menu for digital office SKUs provides platform level configuration
options for the IT-administrator to configure the behavior of the Intel® ME platform.
The behavior includes platform configuration such as individual feature enable/disable
and power configurations.
The following section provides the details on each Intel® MEBX configuration option
and the constraints, if any, for a given option.
Note: When you change Intel® ME Platform Configuration settings, some changes are
committed to the Intel® ME’s non-volatile memory when you exit from Intel® MEBX
(the changes are not cached). Therefore, if Intel® MEBX crashes before you exit, the
changed settings are NOT saved. Please refer to Appendix D for detail of Intel® MEBX
options being reflected in firmware.
Note: To enter the Intel® MEBX, press <Ctrl-P> as soon as possible, since this message is
displayed for only a few seconds. Also note that the OEM may replace the control
character <Ctrl-P> with another one or don’t display it at all.
Note: <Ctrl-P> will be hidden when SOL or KVM session is established. Users are not able to
access Intel® MEBX UI in this scenario.
Note: If Intel® AMT has been configured, <CTLR-ALT-F1> will also be displayed along with
<CTRL-P>. It is designed for end users to use Fast call for Help feature either inside
or outside of corporate network environment when Intel® AMT systems are not
discovered by management console.
2. Enter the Intel® Management Engine password under ‘MEBX Password’ and
press Enter. The default password is ‘admin’. This default password must be
altered by the user. Please refer to section 3.3 for Intel® ME password details.
3. The Intel® MEBX screen is displayed, as shown in section 3.2.
4. [Esc] means exit current setting page.
10 Intel Confidential
Intel® ME Manageability Features
The options displayed in the main menu can vary depending on OEM implementation
decisions. The main menu selections are:
• Intel® MEBX Login
• Intel® ME General Settings
• Intel® AMT Configuration
• Intel® MEBX Exit
Note: Intel® MEBX will display only detected options. If one or more of these options does
not appear, verify that the system supports the relevant missing feature.
The new Intel® MEBX password must meet the following requirements for strong
passwords:
1. Password Length: At least 8 characters, and no more than 32.
Intel Confidential 11
Intel® ME Manageability Features
Note: ‘_’ (underscore) and ‘‘(whitespace) are valid password characters but do NOT
contribute to the password’s complexity.
Note: When entering more than 32 characters the software changes the 32nd character on
every new character pressed when in the last character position in the Intel® MEBX
UI. So whatever the last character typed on the 32nd position, it will replace the
existing character in that position.
Note: The password can be reset to the default setting (admin) by shutting down the
system, removing AC and DC power and performing a RTC reset.
12 Intel Confidential
Intel® ME Manageability Features
The Intel® MEBX main menu changes to the Intel® ME Platform Configuration menu.
This menu allows the IT administrator to configure the specific functionality of the
Intel® ME, such as password etc.
Intel Confidential 13
Intel® ME Manageability Features
Note: This password is also the password which Intel® Platform Enablement Test Suit (Intel®
PETS) tool require by default.
14 Intel Confidential
Intel® ME Manageability Features
Intel® ME Firmware Local Update provides the capability to allow or prevent firmware
local update in the field. When the “Enabled” option is selected, the administrator is
able to update the Intel® ME firmware locally via the local Intel® Management Engine
interface.
The following options can be selected:
• Disabled – Do NOT allow Local Intel® ME FW Update
• Enabled – Allow Local Intel® ME FW Update
• Password Protected – Local FW update is protected by Intel® MEBX password
When Hide FW Update Control setting in FIT is set, Intel® MEBX will hide Local
FW Update option.
Intel Confidential 15
Intel® ME Manageability Features
16 Intel Confidential
Intel® ME Manageability Features
Note: SOL, Storage Redirection, and Intel® KVM here are just for enabling CAPABILITY. User
still needs to use other tools like Intel® AMT SDK to execute features.
This option provides the user authentication for SOL/Storage Redirection session. If
Kerberos is used, this option should be set to DISABLED. The user authentication is
handled through Kerberos. If Kerberos is not used, the IT administrator has the choice
to enable or disable user authentication on SOL/Storage Redirection session.
3.5.2.2 SOL
Under the SOL/Storage Redirection/KVM menu:
Intel Confidential 17
Intel® ME Manageability Features
1. Select ‘SOL’.
2. Press Enter to select.
The following options can be selected:
• Disabled
• Enabled
SOL allows the console input/output of an Intel® AMT managed client to be redirected
to a management server console (if the client system supports SOL). If the system
does not support SOL, this value should not be set.
Disabling SOL does not remove this feature but just blocks it from being used.
Disabling Storage Redirection does not remove this feature but just blocks it from
being used.
Disabling Intel® KVM does not remove this feature but disables it. Intel® KVM will not
work in this case.
18 Intel Confidential
Intel® ME Manageability Features
sensitive operations are performed. It also allows the local user to grant permission
before certain remote actions take place. The following features may require user
consent depending on the User Opt-in setting below:
• Storage Redirection
• Intel® KVM
• Remotely setting BIOS boot options
• Changing boot sources for remote boot (e.g. causing a boot from PXE).
• Using Serial Over LAN specifically to redirect BIOS screens and OS Boot text
screens
Intel Confidential 19
Intel® ME Manageability Features
Note: When using Host Based Configuration, Client Control Mode will override this setting
and behave as if the “ALL” option has been selected. More details regarding Host
Based Configuration and Client Control Mode can be found in the "Intel® AMT Release
11.x Start Here" HTML document in the SDK kit
Note: “Privacy/Security Level” in FIT also affects redirection and user consent behavior as
below:
• Default – Enable all ports with no user consent required for SOL/Storage
Redirection/KVM.
• Enhanced – Requires user consent for SOL/Storage Redirection/KVM.
• Extreme – Disable SOL/Storage Redirection/KVM.
20 Intel Confidential
Intel® ME Manageability Features
• Anytime – The Intel® MEBX password can be changed through the network
interface at any time.
Note: The network interface mentioned above is NOT talking about WebUI.
There are two passwords for the firmware. The Intel® MEBX password is the password
that is entered when a user is physically at the system. The network password is the
password that is entered when accessing an Intel® ME enabled system through the
network. By default they are both the same until any of the passwords is changed.
Once changed over the network or the Intel® MEBX user interface, the network
password and the Intel® MEBX password will always be kept separate®.
This option determines when the user is allowed to change the Intel® MEBX password
through the network.
The Intel® MEBX password can always be changed via the Intel® MEBX user interface.
The Intel® AMT Configuration menu changes to the Intel® ME Network Setup menu.
Intel Confidential 21
Intel® ME Manageability Features
The Intel® ME Network Setup menu changes to the Intel® ME Network Name Settings
menu.
A host name can be assigned to the Intel® AMT machine. This will be the hostname of
the Intel® AMT enabled system.
22 Intel Confidential
Intel® ME Manageability Features
This setting determines whether the Intel® ME Fully Qualified Domain Name (FQDN)
(i.e. the "HostName.DomainName") is shared with the host and identical to the
operating system machine name or dedicated to the Intel® ME.
If Dynamic DNS Update is enabled then the firmware will actively try to register its IP
addresses and FQDN in DNS using the Dynamic DNS Update protocol. If DDNS update
is disabled then the firmware acts depending on FQDN setting.
• Under Dedicated FQDN mode: Firmware makes no attempt to update DNS using
DHCP option 81 or Dynamic DNS update. DNS server will not be updated.
• Under Shared FQDN mode: Firmware uses DHCP option 81 for DNS registration
but does not directly update DNS using the DDNS update protocol.
For selecting “Enabled” for Dynamic DNS Update it is required that the Host Name and
Domain Name are set.
Intel Confidential 23
Intel® ME Manageability Features
Defines the interval at which the firmware DDNS Update client will send periodic
updates. It should be set according to corporate DNS scavenging policy. Units are
minutes. A value of 0 disables periodic update. The value set should be equal or
greater than 20 minutes. The default value for this property is 24 hours - 1440
minutes.
1. Select ‘Periodic Update interval’.
2. Press Enter to edit <in minutes>.
3.5.5.1.6 TTL
24 Intel Confidential
Intel® ME Manageability Features
TTL (Time-to-live) here is a period of time that determines how long the record should
not be scavenged in DNS server when dynamic DNS update is enabled. This setting
allows configuring the TTL time in seconds and should be greater than zero. The
default value is 15 min.
1. Select ‘TTL’.
2. Press Enter to edit <in seconds>.
The Intel® ME Network Setup menu changes to the TCP/IP Settings menu.
Intel Confidential 25
Intel® ME Manageability Features
The TCP/IP Settings menu changes to the Wired LAN IPV4 Configuration menu.
26 Intel Confidential
Intel® ME Manageability Features
Intel Confidential 27
Intel® ME Manageability Features
28 Intel Confidential
Intel® ME Manageability Features
Activate Network Access causes the Intel® ME to transition to the POST provisioning
state if all required settings are configured. Without Activating Network Access, Intel®
ME will not be able to connect to the network.
Intel Confidential 29
Intel® ME Manageability Features
Intel® AMT Partial Same as Intel® AMT Full Unprovisioning and more following
Unprovisioning settings Kept:
All Remote Configuration settings (ZTC enable, OTP,
customized hashes, configuration server FQDN, provisioning
DNS suffix)
Network settings - Kept
30 Intel Confidential
Intel® ME Manageability Features
The Intel® AMT Configuration menu changes to the Intel Remote Setup and
Configuration menu.
Intel Confidential 31
Intel® ME Manageability Features
32 Intel Confidential
Intel® ME Manageability Features
Current Provisioning Mode – Displays the current provisioning TLS Mode: None,
PKI.
Intel Confidential 33
Intel® ME Manageability Features
Provisioning Record – Displays the system’s provision PKI record data. If the data
has not been entered, the Intel® MEBX displays a message stating “Provision Record is
not present”.
If the data is entered, the Provision record will display the following:
• TLS provisioning mode – Displays the current configuration mode of the system:
None or PKI.
• Provisioning IP – The IP address of the setup and configuration server.
• Date of Provision – Displays the date and time of the provisioning in the format
MM/DD/YYYY at HH:MM.
• DNS – Indicates whether the "PKI DNS Suffix" was configured in Intel® MEBX
before remote configuration took place or not. A value of 0 indicates that the DNS
Suffix was not configured and the firmware will rely on DHCP option 15 and
compare this suffix to the FQDN in the Configuration Server's client certificate. A
value of 1 indicates that the DNS Suffix was configured and the firmware matched
it against the DNS Suffix in the Configuration Server's client certificate. Host
Initiated – Indicates whether the setup and configuration process was initiated by
the host: ‘No’ indicates that the setup and configuration process was NOT host-
initiated, ‘Yes’ indicates the setup and configuration process was host-initiated
(PKI only).
• Hash Data – Displays the 40-character certificate hash data (PKI only).
• Hash Algorithm – Describes the hash type (PKI only).
34 Intel Confidential
Intel® ME Manageability Features
• IsDefault – Displays ‘Yes’ if the Hash algorithm is the default algorithm selected.
Displays ‘No’ if the hash algorithm is NOT the default algorithm used (PKI only).
• FQDN – FQDN of the provisioning server mentioned in the certificate (PKI only).
• Serial Number – The 32-character string that indicates the Certificate Authority
serial numbers.
• Time Validity Pass – Indicates whether the certificate passed the time validity
check.
FQDN of the provisioning server mentioned in the certificate (PKI only). This
is also the FQDN of the server that Intel® AMT sends hello packets to PKI
3.5.8.5 RCFG
Under Intel Remote Setup and Configuration menu:
1. Select ‘RCFG’.
2. Press Enter to select.
The Intel Remote Setup and Configuration menu changes to the Intel Remote
Configuration menu.
Intel Confidential 35
Intel® ME Manageability Features
36 Intel Confidential
Intel® ME Manageability Features
The Intel Remote Setup and Configuration menu changes to the Intel Remote
Configuration menu.
Intel Confidential 37
Intel® ME Manageability Features
38 Intel Confidential
Intel® ME Manageability Features
Selecting this option will enumerate the hashes in the system and display the Hash
Name and the active and default state.
The Manage Certificate Hash list provides keyboard controls for managing the hashes
on the system. The following keys are valid when in the Manage Certificate Hash list:
• Escape key – exits from the menu
• Insert key – adds a customized certificate hash to the system.
• Delete key –deletes the currently selected certificate hash from the system.
• ‘+’ key – Changes the active state of the currently selected certificate hash.
• Enter key – Displays the details of the currently selected certificate hash.
When the Insert key is pressed in the Manage Certificate Hash list, the following
screen is displayed.
Intel Confidential 39
Intel® ME Manageability Features
Enter the hash name (up to 32 characters). When you press ‘Enter’, you are prompted
to select the algorithm of hash being used for PKI provisioning.
After selecting desired Hash Algorithm, you are prompted to enter the certificate hash
value.
40 Intel Confidential
Intel® ME Manageability Features
The Certificate hash value is a hexadecimal number (for SHA-1 it is 20 bytes). If the
value is not entered in the correct format, the message “Invalid Hash Certificate
Entered - Try Again” is displayed. When you press ‘Enter’, you are prompted to set
the active state of the hash.
Intel Confidential 41
Intel® ME Manageability Features
Your response sets the active state of the customized hash as follows:
• Yes – The customized hash will be marked as active.
• No (Default) – The customized hash will added but will not be active
When the Delete key is pressed in the Manage Certificate Hash list, the following
screen is displayed.
42 Intel Confidential
Intel® ME Manageability Features
When the ‘+’ key is pressed in the Manage Certificate Hashes list, the following screen
is displayed.
Intel Confidential 43
Intel® ME Manageability Features
Answering Y toggles the active state of the currently selected certificate hash. Setting
a hash as active indicates that the hash is available for use during PKI provisioning.
When the Enter key is pressed in the Manage Certificate Hash list, the following screen
is displayed.
44 Intel Confidential
Intel® ME Manageability Features
The details of the selected certificate hash are displayed and include the following:
• hash name
• certificate hash data
• active and default states
The Intel® ME Platform Configuration menu changes to the Intel® AMT Power Control
menu.
Intel Confidential 45
Intel® ME Manageability Features
To comply with ENERGY STAR* and EUP LOT6 requirements, the Intel® ME can be
turned off in various power states. The Intel® AMT Power Control menu configures the
Intel® ME platform power related policies.
Since Intel® ME 9.0, Power Control has moved to Intel® AMT configuration, the way
Intel® MEBX presenting value of Power Package and Idle timeout also changed. These
settings are effective only after Intel® AMT provisioning. In other words, users don’t
need to care about these settings if Intel® AMT remains un-provisioned.
46 Intel Confidential
Intel® ME Manageability Features
Host PP2
ME PP1
S0 ON ON
The selected power package determines when the Intel® ME is turned ON.
Note: Since Intel® ME 9.x, the default power package cannot be modified by using FIT
or by FPT anymore.
The end user administrator can choose which power package to use depending on the
systems usage.
With Intel® ME WOL, after the idle timeout timer expires, the Intel® ME remains in the
CM-off state until a command is sent to the ME. After this command has been sent,
the Intel® ME will transit to CM3 state and will respond to the next command that is
sent. A ping to the Intel® ME will cause the Intel® ME to go into CM3 state.
Since Intel® ME 9.0, a ping to the Intel® ME will transit from CM-off to CM3 state
without resetting the idle timer. As a result, the Intel® ME will re-enter CM-off state in
less than 20 seconds. The Intel® ME takes a short time to transit from the CM-off
state to the CM0 or CM3 state. During this time, Intel® AMT will not respond to any
Intel® ME commands. When the Intel® ME has reached the CM0 or CM3 state, the
system will respond to Intel® ME commands.
Intel Confidential 47
Intel® ME Manageability Features
This setting is used to enable the Intel® ME wake on and to define the Intel® ME idle
timeout in CM3 state. The value should be entered in minutes. The value indicates
the amount of time that the Intel® ME is allowed remain idle in CM3 state before
transitioning to the CM-off state.
Note: If the platform is in DC only state, Intel® ME will not transit to CM3 state.
Note: If the platform is in S0 state, Intel® ME will not transit to CM-off state.
3.6 Exit
Under the Main Menu:
1. Select ‘Exit’.
2. Press Enter to exit.
48 Intel Confidential
Intel® ME Manageability Features
Intel® KVM feature is not supported by Intel® Standard Manageability. The Intel®
KVM-related options are removed in the menus of SOL/Storage Redirection/KVM and
“User Consent”.
Intel Confidential 49
Intel® ME Manageability Features
The Intel® MEBX main menu changes to the Intel® Small Business Technology
Configuration page. This page allows the IT administrator to configure the specific
functionality of the Intel® Small Business Technology, such as Manageability Feature
Selection and un-provisioning.
When installing Intel® Small Business Advantage Software onto an Intel® vPro™
capable system, the Intel® MEBX menu will not display the Intel® Small Business
Technology menu.
Intel® MEBX sends Get Platform Type message to Intel® ME, then changes the menu
title as Intel® AMT, Intel® Standard Manageability, or Intel® Small Business
Technology, according to response of platform brand type.
The scenarios that result in Intel® MEBX displaying CPU Replacement related message
to End User are:
50 Intel Confidential
Intel® ME Manageability Features
1. When CPU Type was Downgraded, e.g. from Intel® Core™ vPro™ processor (Intel®
vPro™ technology eligible) to Pentium® processor or from Intel® Core™ processor
(Non-Intel® vPro™ technology eligible) to Celeron® processor.
In this scenario Intel® ME FW will request End User Approval since Intel® ME FW
feature set strongly relies on plugged in CPU TYPE. The message is displayed to
guard End User before unintentional CPU downgrades which would automatically
result in loosing Intel® ME FW feature set, for example un-configuration of AMT
Feature Set. Instead, End User has option of either accepting CPU change or
rejecting it before Intel® ME FW triggers System Features reconfiguration. If End
User decides to reject the CPU change, it is required to shut down the platform
and replace original CPU. If no End User interaction is provided then after 10
seconds wait time, Intel® MEBX will follow up assuming End User accepted CPU
change.
When the following exceptions are captured, Intel® ME FW will not request CPU
Replacement confirmation from End User (and the CPU Replacement message will not
be shown):
Figure 3-35 represents the message that will be exposed to End User whenever CPU
Replacement took place downgrading CPU capabilities. This message will not be
shown if replaced CPU has the same capabilities as the old one (e.g. changing
Pentium® processor to another Pentium® processor). The message will be shown
for 10 seconds and if End User did NEITHER pressed “y” or “Y” key NOR shut
down the platform Intel® MEBX will proceed with assumption that End User
approved CPU change.
Intel Confidential 51
Intel® ME Manageability Features
The valid changes that will result in the following message are:
1. Intel® Core™ vPro™ processor (Intel® vPro™ technology eligible) changed to
Intel® Core™ processor (Non-Intel® vPro™ technology eligible)
2. Intel® Core™ vPro™ processor (Intel® vPro™ technology eligible) changed to
Pentium® processor
3. Intel® Core™ vPro™ processor (Intel® vPro™ technology eligible) changed to
Celeron® processor
4. Intel® Core™ processor (Non-Intel® vPro™ technology eligible) changed to
Pentium® processor
5. Intel® Core™ processor (Non-Intel® vPro™ technology eligible) changed to
Celeron® processor
6. Pentium® processor changed to Celeron® processor.
The following actions are expected to be done by End User when the message from
Figure 3-35 is shown:
1. Press “y” or “Y” if End User approves CPU change that was performed on purpose.
Platform global reset** will follow in which Intel® ME will populate new feature set
to whole ME infrastructure (kernel and all applications) based on modified CPU
type.
2. Press “n” or any other key if End User disapproves CPU replacement change and
CPU was replaced unintentionally. The system will halt permanently displaying the
message. End User is expected to shut down the platform and replace original
CPU.
3. If no action is performed by End User for 10 seconds Intel® MEBX will follow up
assuming End User accepted CPU change. Platform global reset** will follow in
which Intel® ME will populate new feature set to whole Intel® ME infrastructure
(kernel and all applications) based on modified CPU type.
** Two resets may be observed. The 2nd reset will occur if some Intel® AMT features
(SOL/ Storage Redirection/KVM) get disabled when a Intel® vPro™ technology eligible
CPU is replaced with a non-Intel® vPro™ technology eligible CPU and this information
has synced with BIOS. Please refer to Appendix C for different causes to global reset.
52 Intel Confidential
Intel® ME Manageability Features
Intel Confidential 53
Appendix A: Changes to Configuration Modes
4 Appendix A: Changes to
Configuration Modes
In Intel® AMT 5.0 and under, there were two operational modes – SMB and
Enterprise. In Intel® AMT 6.0 and above, their functionality has been integrated to
provide the same functionality previously available in Enterprise mode. The new
configuration options are “Manual Setup and Configuration” available for SMB
customers and “Automatic Setup and Configuration.
Web UI Enabled
IDER*/SOL/KVM**
Redirection network Enabled, can be disabled at a later time
interface enabled
Legacy Redirection
Mode (Controls FW
listening for incoming Disabled
redirection
connections)
54 Intel Confidential
Appendix B: Global Reset from Intel® MEBX
Reboot – Intel® MEBX must set this flag when an option that requires a global reset
has been edited from its original state. A list of global reset options is itemized in the
table below.
Exit – Intel® MEBX must completely exit the UI immediately after editing the option.
KVM State Y N
SOL state Y N
These global resets happen when BIOS execute Intel® MEBX binary during post. In
these cases Intel® MEBX will pass the global reset flag to BIOS to perform global reset
without going through Intel® MEBX User Interface.
Intel Confidential 55
Appendix C: Intel® MEBX Options Being Reflected in the Firmware
Note: Those settings are located in data region of the FW and, when saved, FW will look at
the saved settings and run the corresponding execution when necessary.
SOL Instantly
56 Intel Confidential
Appendix C: Intel® MEBX Options Being Reflected in the Firmware
Intel Confidential 57