Intel DB65AL DB65AL Technical Product Specification - Page 31
Remote Configuration or Zero Touch Configuration ZTC minimizes the cost - manual
View all Intel DB65AL manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 31 highlights
Product Description • Proactive alerting that decreases downtime and minimizes time to repair. ⎯ Programmable policies ⎯ Operating system lock-up alert ⎯ Boot failure alert ⎯ Hardware failure alerts • Third party non-volatile storage that prevents users from removing critical inventory, remote control, or virus protection agents. ⎯ Nonvolatile storage for agents ⎯ Tamper-resistant • Remote hardware and software asset tracking that eliminates time-consuming manual inventory tracking, which also reduces asset accounting costs. ⎯ E-Asset Tag ⎯ HW/SW inventory • System Defense 2 - In addition to the in-bound and out-bound packet filtering of the previous generation, System Defense 2 is an Intel manageability feature that uses advanced heuristics to help protect against the propagation of worms through the use of preset packet filters. The number of new connections made to a specific port or IP address are counted over a specific time window. If a preset threshold is exceeded, it will alert the Management Console and suspend the client's network activity until the system can be remediated. • Remote Configuration or Zero Touch Configuration (ZTC) minimizes the cost to deploy Intel manageability by eliminating the need for IT personnel to touch each client system prior to configuration. ZTC consists of a single OEM BIOS/Firmware image that provides the Intel manageability client with information to authenticate connections and allows it to remotely perform a secure setup procedure. IT departments must acquire an appropriate Intel Standard Manageability Technology -trusted certificate as well as use a remote management application that supports ZTC. 31