Intel Desktop Board D975XBX KD975XBXKRPAK10 ユーザーズマニュアル

製品コード
KD975XBXKRPAK10
ページ / 98
Intel Desktop Board D975XBX Technical Product Specification 
36 
 
1.11.3  Alert Standard Format (ASF) Support 
The board provides the following ASF support for PCI Express x1 bus add-in LAN cards and PCI 
Conventional bus add-in LAN cards: 
•  Monitoring of system firmware progress events, including: 
⎯  BIOS present 
⎯  Primary processor initialization 
⎯  Memory initialization 
⎯  Video initialization 
⎯  PCI resource configuration 
⎯  Hard-disk initialization 
⎯  User authentication 
⎯  Starting operating system boot process 
•  Monitoring of system firmware error events, including: 
⎯  Memory missing 
⎯  Memory failure 
⎯  No video device 
⎯  Keyboard failure 
⎯  Hard-disk failure 
⎯  No boot media 
•  Boot options to boot from different types of boot devices 
•  Reset, shutdown, power cycle, and power up options 
•  LAN Subsystem Software 
LAN software and drivers are available from Intel’s World Wide Web site. 
1.11.4 Intel
®
 Active Management Technology (Intel
®
 AMT) (Optional) 
Intel Active Management Technology (Intel AMT) offers IT organizations tamper-resistant and 
persistent management capabilities.  Specifically, Intel AMT is a hardware-based solution that 
offers encrypted and persistent asset management and remote diagnostics and/or recovery 
capabilities for networked platforms.  With Intel AMT, IT organizations can easily get accurate 
platform information, and can perform remote updating, diagnostics, debugging and repair of a 
system, regardless of the state of the operating system and the power state of the system.  Intel 
AMT enables IT organizations to discover, heal, and protect all of their computing assets, 
regardless of system state in the manner described below.  
•  Discovering hardware and software computing assets: 
⎯  Intel AMT stores hardware and software asset information in non-volatile memory and 
allows IT to read the asset information anytime, even if the PC is off 
⎯  Users cannot remove or prevent IT organization access to the information because it does 
not rely on software agents