-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
- HP Community
- Desktops
- Desktop Operating Systems and Recovery
- intel amt doesn´t reachable at boot up (advanced management...

Create an account on the HP Community to personalize your profile and ask a question
05-27-2023 06:31 AM
Hello,
based on Quickspecs of HP Prodesk 400 Mini Gen9 every device has INTEL AMT.
I need to remote Power ON and it works well via https://192.168.XX.XX:16992 (pc lan ip)
I tried to configure it on other PC, but left or right STRG+P doesn´t open.
Do you know what is wrong?
AMT is imho enabled ex factory / per default. No need to go to CMOS.
https://h20195.www2.hp.com/v2/GetDocument.aspx?docname=c08017709
Intel® Advanced Management Technology (AMT)1 v16 – An advanced set of remote management features and functionality
which provides network administrators the latest and most effective tools to remotely discover, heal, and protect networked
client systems regardless of the system's health or power state. AMT 16 includes the following advanced management
functions:
• Support for configuration of Intel® AMT 16.0 capabilities
• No reset after provisioning
• Support for Intel® Enterprise Digital Fence
• The Platform Discovery Utility can now discover these additional Intel® products:
o Intel® Identity Protection Technology with One Time Password
o Public Key Infrastructure
o Multi Factor Authentication
• Profile Editor and Profile Editor Plugin Interface
• Required Permissions for Solutions Framework
1. Intel® Active Management Technology requires an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a
power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management
console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of
implementation of new business processes.