Remote PC Management
New management capabilities keep costs low
In today’s fast-paced business environment, desk-side visits to repair malfunctioning PCs can be time-consuming and costly. With the Intel® Core™ vPro™ processor family, service technicians can remotely configure, diagnose, isolate, and repair an infected PC, even if it’s unresponsive.1 Thanks to hardware-based Keyboard-Video-Mouse (KVM) Remote Control, technicians can gain access to users’ graphical user interface (GUI), including on-screen error messages. This enables IT to repair systems directly rather than talking users through a diagnostic process over the phone.
IT can also centrally schedule diagnostic events to run locally on PCs, even if they’re powered down or disconnected.1 Furthermore, technicians can remotely upgrade PCs to Windows 7* overnight, minimizing disruptions to users or legacy applications. It all amounts to a more efficient, cost-saving IT system.
Remote PC management, powered by Intel’s latest business processors
The Intel® Core™ vPro™ processor family delivers cost-cutting efficiency and maximum productivity with the intelligence of embedded remote support, security, and manageability features.2
With advanced monitoring, remediation, and repair tools in place, you can respond to critical IT issues at any time:
- Remotely monitor wired and wireless PCs, even when they’re idle or disconnected
- Push security updates to users before a breach occurs; diagnose, isolate, and repair infected PCs after a breach takes place
- Identify and remediate noncompliant PCs to simplify compliance management
- Write asset data into protected memory, including hardware asset data and software version information
1. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.
2. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, see http://www.intel.com/content/www/us/en/security/security-at-home.html.