Intel Desktop Board D945GRW BOXD945GRWLK User Manual

Product codes
BOXD945GRWLK
Page of 90
Intel Desktop Board D945GRW Technical Product Specification 
34 
 
1.11.3  Alert Standard Format (ASF) Support (Optional) 
The board provides the following ASF support for PCI Express x1 bus add-in LAN cards and PCI 
Conventional bus add-in LAN cards installed in PCI Conventional bus slot 2: 
•  Monitoring of system firmware progress events, including: 
⎯  BIOS present 
⎯  Primary processor initialization 
⎯  Memory initialization 
⎯  Video initialization 
⎯  PCI resource configuration 
⎯  Hard-disk initialization 
⎯  User authentication 
⎯  Starting operating system boot process 
•  Monitoring of system firmware error events, including: 
⎯  Memory missing 
⎯  Memory failure 
⎯  No video device 
⎯  Keyboard failure 
⎯  Hard-disk failure 
⎯  No boot media 
•  Boot options to boot from different types of boot devices 
•  Reset, shutdown, power cycle, and power up options 
•  LAN Subsystem Software 
LAN software and drivers are available from Intel’s World Wide Web site. 
1.11.4 Intel
®
 Active Management Technology (Intel
®
 AMT) (Optional) 
Intel Active Management Technology (Intel
®
 AMT) offers IT organizations tamper-resistant and 
persistent management capabilities.  Specifically, Intel AMT is a hardware-based solution that 
offers encrypted and persistent asset management and remote diagnostics and/or recovery 
capabilities for networked platforms.  With Intel AMT, IT organizations can easily get accurate 
platform information, and can perform remote updating, diagnostics, debugging and repair of a 
system, regardless of the state of the operating system and the power state of the system.  Intel 
AMT enables IT organizations to discover, heal, and protect all of their computing assets, 
regardless of system state in the manner described below.  
•  Discovering hardware and software computing assets: 
⎯  Intel AMT stores hardware and software asset information in non-volatile memory and 
allows IT to read the asset information anytime, even if the PC is off 
⎯  Users cannot remove or prevent IT organization access to the information because it does 
not rely on software agents