Intel Ema Server Installation and Maintenance Guide
Intel Ema Server Installation and Maintenance Guide
Assistant
(Intel® EMA)
This software and the related documents are Intel copyrighted materials, and your use of them is governed by the
express license under which they were provided to you ("License"). Unless the License provides otherwise, you may
not use, modify, copy, publish, distribute, disclose or transmit this software or the related documents without Intel's
prior written permission.
This software and the related documents are provided as is, with no express or implied warranties, other than those
that are expressly stated in the License.
Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this
document.
Intel disclaims all express and implied warranties, including without limitation, the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course
of performance, course of dealing, or usage in trade.
The products and services described may contain defects or errors known as errata which may cause deviations from
published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware,
software or service activation. Performance varies depending on system configuration. No computer system can be
absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting
from such losses. Check with your system manufacturer or retailer or learn more at
http://www.intel.com/technology/vpro.
Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and
brands may be claimed as the property of others.
1 Introduction 1
1.1 Before You Begin 1
1.2 Supported Operating Systems 2
1.3 Installation Prerequisites 2
1.3.1 Computer 2
1.3.2 Operating System 3
1.3.3 Database 3
1.3.4 Web Server 4
1.3.5 Intel AMT PKI Certificate 4
1.3.6 Microsoft .NET Framework Versions 4
1.3.7 Firewall 5
1.3.8 Network 5
1.3.9 Network Ports 5
1.4 Security Recommendations 6
1.4.1 Back Up Important Data 6
1.4.2 Modify the Access Control List (ACL) for Key Configuration Files 7
1.4.3 Enable Transparent Data Encryption on SQL Server Enterprise 7
1.4.4 Secure all Certificates and Keys 7
1.4.5 Samples files for Intel® EMA REST API and JavaScript library 7
1.4.6 Disable Insecure Cipher Suites 7
1.4.7 Strong Encryption Protocols 8
1.4.8 IIS – Replace the Temporary Web TLS Certificate 8
1.4.9 IIS – Change IIS User Account 9
Note: A simplified tutorial installation procedure for learning purposes is available in the Intel® EMA Quick
Start Guide.
The Global Administrator is responsible for installation, configuration, and management of the Intel EMA server as a
whole, as well as creating Tenant usage spaces within the Intel® EMA server. Other Intel EMA users, such as Tenant
Administrators and Account Managers are responsible for setting up and maintaining the users, user groups,
endpoint groups, and managed endpoint client systems for each Tenant hosted on the Intel EMA server.
Note: Key concepts such as user roles, tenants, and endpoint groups are described in detail in the Intel® EMA
Administration and Usage Guide, which also provides detailed information about the setup and maintenance
of Intel® EMA Tenants and their managed endpoint systems.
We recommend that you read this guide carefully before performing the installation. This document provides the
installation requirements, explains the configuration parameters, and provides detailed installation steps for the Intel®
EMA server and its components.
1.3.1 Computer
A computer or virtual machine with sufficient capability for the expected traffic. Systems not meeting these
minimum specifications could experience performance issues.
2 Intel® Xeon® Processors, 16 threads, 24GB RAM, 1TB Mirrored: This configuration should be able to handle over 20k
connections.
1.3.3 Database
Install the Microsoft SQL Server*. The database may run on a separate server on the network or on the same system
as the Intel EMA Server. For demonstration or test purposes, Microsoft SQL Server Express edition can be used if
installed with Advanced Features. For production environments, we recommend using Microsoft SQL Server
Enterprise. A strong working knowledge of installing, configuring, and using SQL and Active Directory is required (if
using 802.1x).
IMPORTANT: To achieve security in-depth, we recommend to use Microsoft SQL Server Enterprise and enable
Transparent Data Encryption. Additionally Windows authentication mode is recommended as the authen-
tication mode.
Notes:
l Microsoft SQL Server, 2014, 2016, 2017, and 2019 (English-US version only) are supported.
l The operating system of the machine on which SQL Server is running must be a supported operating
system version and needs to have English-US Windows display language, English-US system locale,
and English-US format (match Windows display language). See Supported Operating Systems, section
1.2.
l The collation value in SQL Server must be set to SQL_Latin1_General_CP1_CI_AS.
l Be sure to allocate enough resources (CPU, memory, SSD, etc.) to SQL Server. If your SQL Server's
resources are dynamically allocated, ensure enough guaranteed fixed resources are allocated. If not,
you may see error messages like "Unable to get database connection, all connections are busy" in the
component server log files in Program Files (x86)\Intel\Platform Manager\EmaLogs.
l Intel EMA uses query notification in SQL Server to reduce the number of database reads. That feature
requires "Service Broker" to be enabled in SQL server. If Service Broker is disabled, you will see warn-
ings to that effect in the component server log files in Program Files (x86)\Intel\Platform Man-
ager\EmaLogs.
l Before installing Intel EMA, ensure that an SQL account exists on the SQL server that can be used by
the Intel EMA installer to connect to the SQL server. If you are not the SQL database administrator
(SQL DBA), contact the SQL DBA to have this account set up. This account must exist before you
install Intel EMA, since you will be asked to specify the SQL connection account during the installation
process. This account may be a Windows account under Windows Authentication or an SQL account
under SQL Authentication. In addition, the SQL account must have a default database configured. The
default database can be any existing database on the SQL server. This default database is required so
that the Intel EMA installer can confirm that the specified SQL account/user can contact the SQL server
and its databases.
See Section 1.4.18 for information about changing these permissions and roles.
Note: If IIS is already installed, ensure that all authentication methods are disabled except for “Anonymous”
and “Windows” (only those two should be enabled). This only applies to Windows Authentication mode.
1.3.8 Network
During the installation, you must specify the value (either hostname or IP address) to use for communication among
various components. If you choose hostname or FQDN, you need to make sure the value is resolvable by a DNS
server in the network. If you do not have the DNS server, a fixed IP address should be used during installation.
Incorrect hostname/IP address will cause Intel EMA features to not function properly. In a distributed server
archecture implementation, if using Active Directory, ensure all computers (including the computer hosting the load
balancer) are listed in Active Directory.
l For certain features/usages, the AJAX server and Manageability server will establish a TCP connection (locally
or remotely) with the Swarm server.
l The endpoint and the Swarm server communicate via a secure TCP connection. Intel AMT (CIRA) and the
Swarm server communicate via a secure TCP connection.
l The Platform Manager service uses a named pipe to talk to other Intel EMA component servers on the same
machine. The Platform Manager client application talks to the Platform Manager service via a secure TCP con-
nection.
Table 1: Server network ports
TCP 1433 SQL server remote access. This is used between the internal Intel EMA
server and the internal SQL server; only needed if Intel EMA server and
the SQL server are not on the same machine. This is the default port
that SQL server uses.
TCP 8000 The default TCP port for communication between Platform Manager ser-
vice and Platform Manager client. You can change this port during
installation.
TCP 8080 Agent, console, and Intel AMT CIRA port. This is between client end-
points and the Intel EMA Swarm server. See note below.
TCP 8084 Web redirection port. This is used between the web browser and the
web server.
TCP 8085 Recovery port. This is used by the Recovery component server. If you
change this port on the Recovery Server tab of the Server Settings page,
you will be prompted to update port bindings. See "Appendix - Modi-
fying Component Server Settings" on page 46.
TCP 8089 Communication between the various Intel EMA component servers and
Intel EMA Swarm server. This port number is the default, and can be
changed in the Server Settings page. See "Appendix - Modifying Com-
TCP 8092 Port on which Ajax component server listens for internal component-
to-component communication. This port number is the default, and
can be changed in the Server Settings page. See "Appendix - Modifying
Component Server Settings" on page 46.
TCP 8093 Port on which Swarm component server listens for internal com-
ponent-to-component communication. This port number is the
default, and can be changed in the Server Settingspage. See "Appendix
- Modifying Component Server Settings" on page 46.
TCP 8094 Port on which Manageability component server listens for internal com-
ponent-to-component communication. This port number is the
default, and can be changed in the Server Settings page. See "Appendix
- Modifying Component Server Settings" on page 46.
TCP 8095 Port on which Recovery component server listens for internal com-
ponent-to-component communication. This port number is the
default, and can be changed in the Server Settings page. See "Appendix
- Modifying Component Server Settings" on page 46
LDAPS/LDAP 636/389 The LDAPS secure port is 636. The standard non-secure LDAP port is
389. These ports are for use with Active Directory and/or 802.1x con-
figuration.
Global Catalog 3269/3268 The secure (3269) and non-secure (3268) Global Catalog ports. These
(secure/non- ports are for use with Active Directory and/or 802.1x configuration.
secure)
1.4.2 Modify the Access Control List (ACL) for Key Configuration Files
After the Intel EMA server installation, you should modify the ACL to limit access to the following files\folders:
l [Intel EMA website root folder (e.g., C:\inetpub\wwwroot)] \ web.config.
l [Intel EMA server installation folder (e.g., C:\Program Files (x86)\Intel\Platform Manager)] \ Platform Manager
Server \ settings.txt
l [Intel EMA server installation folder (e.g., C:\Program Files (x86)\Intel\Platform Manager)] \ Runtime \ MeshSet-
tings \ connections.config
l [Intel EMA server installation folder (e.g., C:\Program Files (x86)\Intel\Platform Manager)] \ Runtime \ MeshSet-
tings \ app.config
l [Intel EMA server installation folder (e.g., C:\Program Files (x86)\Intel\Platform Manager)] \ EMALogs
1.4.5 Samples files for Intel® EMA REST API and JavaScript library
The sample files are in the folder [Intel EMA installation package folder] \Samples. These files are not automatically
hosted on the Intel EMA website during installation. These sample files are implemented using bare-minimum code
to demonstrate how to use the API and do not use secure coding practices to guard against security concerns like
cross-site scripting.
For hosting in a test environment for development purposes, copy the Samples folder to the Intel EMA website root
folder (e.g., C:\inetpub\wwwroot\).
One workaround to avoid these threats and warnings is to download IIScrypto from this website:
https://www.nartac.com/Products/IIScrypto. This product helps to change schannels and cipher settings.
You must run the IIScrypto program and de-select the multi-protocols: unified hello, PCT 1.0, SSL2.0, MD5, and all
ciphers above triple DES. This helps clear all the aforementioned warnings (except for the SHA1 warning).
IMPORTANT! Intel EMA and Intel AMT require one of the following Cipher Suites to be enabled in order to
effectively communicate and function. As an example, enabling “TLS_RSA_WITH_AES_128_GCM_SHA256”
would work for all versions of Intel AMT currently supported by Intel EMA.
Intel AMT version 14 and earlier:
l TLS_RSA_WITH_AES_128_GCM_SHA256
l TLS_RSA_WITH_AES_256_CBC_SHA
l TLS_RSA_WITH_AES_128_CBC_SHA
Intel AMT version 15:
l TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
l TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
l TLS_DHE_RSA_WITH_AES_256_GCM_SHA384.
Note: If your environment includes endpoints with Intel AMT versions below 11.8.77.3664, you need to leave
TLS 1.1 enabled to ensure proper communication with these endpoints.
Note:
l This TLS certificate can also be used for the Platform Manager TLS certificate if you are running Plat-
form Manager on the same system as the IIS server. See section 4.2.
Header Value
X-Content-Type-Options nosniff
X-XSS-Protection 1; mode=block
X-Frame-Options SAMEORIGIN
Referrer-Policy strict-origin
The CORS header is added but commented out by default. To enable it, edit the web.config file and remove the
comment tags and add your domain information.
<!--
<add name="Access-Control-Allow-Origin" value="https://<YOURDOMAINHERE>" />
<add name="Access-Control-Allow-Headers" value="Content-Type" />
<add name="Access-Control-Allow-Methods" value="GET,POST,PUT,DELETE,OPTIONS"
/>
-->
Lastly, the X-Robots-Tag header is added, which disables web search engines from finding installed instances of the
Intel® EMA server.
Note: Intel EMA grants the default IIS DefaultAppPool account read access to the web.config file. If you
change the account that the IIS default application pool will run under, you must also change the access con-
trol accordingly.
Note: Whatever account you set Platform Manager to run under will be the account that all Intel
EMA component server services (i.e., Manageability Server, Swarm Server, etc.) run under as well. After the Plat-
form Manager account is changed, the component server services will use the new account once they are
restarted. In a distributed server environment this must be done for each Platform Manager instance.
First, give the account access to Intel EMA assets (files and folders, certificate's private key).
1. Skip these steps if the account already has the necessary privileges.
2. If the SQL connection is using Windows authentication, ensure the new user account satisfies the permission
and role requirements for the SQL Server account. See section 1.4.18.
3. Change the service to run under the desired account.
4. Give read and write access to [System drive]\Program Files (x86)\Intel\Platform Manager\EMALogs.
5. Give full control to the following:
l [System drive]\inetpub\wwwroot: also for all sub-folders and files.
l [System drive]\inetpub\wwwroot\web.config
l [System drive]\Program Files (x86)\Intel\Platform Manager
l [System drive]\Program Files (x86)\Intel\Platform Manager\Runtime\MeshSettings\app.config
l [System drive]\Program Files (x86)\Intel\Platform Man-
ager\Runtime\MeshSettings\connections.config
l [System drive]\ProgramData\Intel\EMA\USBR - Or the USBR image path if you have updated it as
described in Section 6.3, "Manageability Server" on page 48.
6. Use the Windows certlm tool to open the certificate store for Local Computer\Personal\Certificates and give
"read" permission for the following certificates by right-clicking the target certificate and selecting All
Tasks\Manage Private Keys:
l Temporary Web TLS certificate. "Issued To" is the Intel EMA web site FQDN or IP. "Issued By" is
"MeshRoot-XXXX".
l Recovery certificate. "Issued To" is the Intel EMA web site FQDN or IP. "Issued By" is "MeshRoot-
XXXX".
l Settings certificate. "Issued To" is "MeshSettingsCertificates-XXX". "Issued By" is "MeshRoot-XXXX".
l Inter-component TLS certificate for web server. "Issued To" is "EmaMtlsWeb-XXX". "Issued By" is
"MeshRoot-XXXX".
l Note that the Temporary Web TLS certificate and the Recovery certificate look similar in the listing, but
if you open them and go to the Details tab, you can see which is which.
Next, ensure the file settings.txt in the Intel EMA installation folder has read/write permissions for the new Platform
Manager service account.
Lastly, find Intel Platform Manager in Windows services and change the user account under which this service is
running, then restart all the Intel EMA component servers.
C:\Program Files (x86)\Intel\Platform Contains settings for the Platform Manager, including the
Manager\Platform Manager Server\settings.txt port number and password.
C:\Program Files (x86)\Intel\Platform Man- Contains the database connection string (encrypted).
ager\Runtime\MeshSettings\app.config and con-
nections.config
C:\Program Files\Intel\Ema Agent Install location for 64 bit Intel EMA Agent files. For 32 bit
agent, see Program Files (x86).
Note: Performance can vary greatly from one implementation to another depending on a variety of envir-
onmental factors. The following test result information is provided solely to aid in pre-implementation
decision making and is not intended as any claim of actual performance.
Based on the following test result data, for example, you could expect a single Intel EMA server with 4 CPUs and 16
GB of RAM to satisfactorily support approximately 82K managed endpoints (the 10% memory column below). Note
that if CIRA will be used, we recommend that you reduce the number of endpoints in any column below by half.
Furthermore, the data below is based on an idle state for the Intel EMA agent on the managed endpoint. You should
allow some headroom (for example, 20%) for usage such as KVM sessions on the endpoint.
Given the above considerations, for a single Intel EMA server with 4 CPUs and 16 GB of RAM in an implementation
where CIRA will be used, we recommend no more than approximately 33K managed endpoints (82K/2 * .80 = 32.8).
Table 3: Scaling Consideration Data
Notes:
l If you are using a SQL server installed on
the same machine as Intel® EMA then you
can use localhost.
l If you are using a remote SQL server,
ensure the SQL server’s account is set up
for your IIS Default Application Pool to con-
nect.
l For security purposes, we recommend that
Windows authentication mode is used for
SQL Authentication. If using SQL Authentic-
ation, you must ensure the target credential
is set up in the SQL server first.
Note: If Intel EMA will be installed under domain/Windows authentication mode (Kerberos) in the next step,
we recommend using the FQDN of your machine at Hostname field. You still need to ensure that other end-
points or other client web browsers can connect to the value you entered here. If you decide to use another
value, follow IT best practices to set up the Service Principle Name (SPN) after Intel EMA is installed. Choosing
Use IP address does not work for Kerberos.
2.1.7 Summary
Review your installation settings and then click Install.
All required Windows components will be installed,
followed by the Intel® EMA software itself.
At this point, you are ready to log in as the Global Administrator and click View Getting Started tips under Getting
Started on the overview page. See section 3.
Click OK.
Click Next.
2.2.3 Summary
Review your installation settings and then click Install.
All required Windows components will be installed,
followed by the Intel® EMA software itself.
Note: The installer requires a relative path to the installer executable EMAServerInstaller.exe. You cannot use
an absolute path when issuing the installer command. Change directory to the directory where EMAServer-
Installer.exe is located and issue the command from that folder.
Note: For updates from previous Intel EMA versions, the installer detects the connection string automatically.
Note: During single server standard installation, the Intel EMA installer creates a folder for use with the USB
Redirection (USBR) and One Click Recovery (OCR) features, which allow you to boot a managed endpoint to an
image file (.iso or .img) that is stored in this folder. This folder is created with the following permissions:
SYSTEM, Administrators, and IIS AppPool\DefaultAppPool. If you alter these permissions, the next time you
perform an update installation to Intel EMA a warning message will be logged informing you that permissions
for the folder do not meet requirements.
Open a command prompt in Administrator mode in the folder where you unpacked the installation package.
If you want to install under “user name/password” mode (i.e., normal account mode), the command line structure
requires you to enter a username and password for the global administrator. These required parameters are identified
as follows:
If you want to install under “domain/window authentication” mode, specify -–domainauth flag and do not enter --
guser, --gpass.
Use the command example below to update the Intel EMA server machine.
EMAServerInstaller FULLINSTALL --updateinstalltype=<single/distributed> --accepteula -c -
v
Notes:
l For updates from previous Intel® EMA versions, only the updateinstalltype, accepteula, console (c), and
verbose (v) parameters are accepted. Do not enter any other parameters for updates. Doing so will
cause the installation to abort and an error message to be displayed.
2.4 Uninstalling
Do not abort or exit the installer before the uninstallation is complete.
Notes:
l Before uninstalling, ensure the account used in the Intel EMA SQL connection string has at least db_
creator rights, which allow it to create, modify, and delete any database. This account must also have
the database level roles db_owner, db_datawriter, and db_datareader.
4. To uninstall and remove the settings certificate, add the --deletesettingscert option.
5. To uninstall and remove the database, add the --deletedb option, shown below (to remove both the set-
Notes:
l In a single server installation, this option will also remove the default shared USBR image file
storage folder. If you specify a custom USBR image storage folder in Server Settings, that folder
will not be deleted.
l If the database is managed and/or cloud-based, Intel EMA cannot delete the database so do
not specify this option.
Note: If you specified domain authentication, the Global Administrator Overview page is automatically dis-
played.
1. At the bottom of the Overview page, under Getting Started, click View Getting Started tips.
2. On the Getting started page, follow the steps (in order) to Create a Tenant, Add a Tenant Administrator, and
then Add Additional Users (if desired). Note that you MUST create at least one Tenant Administrator for each
Tenant you create. The Global Administrator cannot perform many of the tasks in Tenants.
Note: In order to perform the Tenant setup tasks as described in the section 3 of the Intel® EMA Admin-
istration and Usage Guide, you must be logged in as the Tenant Administrator user of that Tenant. See the
Intel® EMA Administration and Usage Guide for details.
Logging out
To log out, click the user name in the top bar of the Overview page and select Log out.
Notes:
l The last Global Administrator user cannot remove its account, nor edit it.
l If you configured Intel EMA to use Active Directory authentication, ensure the username of any user
you create corresponds to the userPrincipalName attribute of the Active Directory user. The Password
field is not shown or needed in this mode.
To edit a user, go to the Users tab of the Manage Users page, click the down-arrow for the target user, and select
Edit....
If you are editing your own user account, in order to change the password, you will need to enter your current
password first. If you are editing other accounts (that your role can manage), you do not need to enter the user’s
current password.
For “locked” users, use the Edit option to unlock the user’s account.
Note: Be sure to change the user account under which the Platform Manager service runs. See Section 1.4.17
for details.
Notes:
l If you are using Windows Authentication, ensure the system running Platform Manager is
joined to the domain, and that the Global Administrator account you are using is logged into
the domain. Otherwise you will be prompted for credentials.
8. The Intel EMA Platform Manager window is displayed, with the application servers shown in the left-hand
pane. If the screen prompts you to Connect, check to ensure you entered a user with Global Administrator
rights in the Connection Credentials dialog.
Note: The trace file will not be present if tracing is not enabled for the selected component server.
l swarmid: Print the this Swarm server's id and the lead Swarm server's id. This is useful when you have mul-
tiple Swarm servers under load balancer. The leader is usually the Swarm server just started recently and with
highest ID.
l agentpingtime: Print the current ping time for maintaining Intel EMA agent TCP connection. If you provide a
numerical argument, it will set the ping time to this value in seconds.
l agentrequireping: Print if we need all the Intel® EMA agents to respond with a pong to a ping sent by the
Swarm server. 1 is true, and 0 is false. If this setting is true, then the Swarm server will drop the agent TCP con-
nection if a pong is not received. If you provide an argument (1 or 0), you can set the value.
l ignoredupagents: By default, this is disabled. When the Intel EMA Swarm server receives an incoming Intel
EMA agent connection, if this connection has an endpoint ID that is the same as an existing connection, then
we will disconnect and remove the existing connection and accept the new one. However, if this is enabled,
we will do nothing and just ignore the new incoming connection. This prints 1 or 0. 1 is true/enabled, and 0 is
false/disabled. If you provide an argument (1 or 0), you can set the value.
l swarmpeers: Print the other peer Swarm servers' IDs and IP addresses.
Note: If you have an older version of Intel EMA, you can use Platform Manager to upload and deploy newer ver-
sions without touching your Intel EMA database. However, if the new release includes Intel EMA database
changes, then you must still use the Intel EMA installer to perform an update.
Note:
l You must restart all Intel EMA component servers (i.e., Swarm Server, .Manageability Server, etc.) in
order for the new connection string to take effect.
l A copy of the previous connection string file c:\Program Files (x86)\Intel\Platform Man-
ager\Runtime\MeshSettings\connections.config is created.
l In a distributed server architecture environment, the connection string must be updated on all Intel
EMA server systems.
For ports 443 and 8084, you should see binding details like this (with 443 or 8084 port):
Please see Section 4 of this guide for information on viewing the log
file, trace file, or events for each of the Intel® EMA component servers.
Intel® EMA Server Installation Error Intel® EMA Platform Manager Package path not set correctly
The installer can find an existing Platform Manager settings file (e.g.,
C:\Program Files (x86)\Intel\Platform Manager\Platform Manager
Server\settings.txt), but cannot find the Intel EMA packages (e.g.,
C:\Program Files (x86)\Intel\Platform Manager\Packages) listed in
that settings file.
To fix:
1. Uninstall the Intel EMA Server, selecting all options.
2. Ensure that Intel EMA Platform Manger is no longer installed
and there is no content in the Intel EMA installation folder
(e.g., C:\Program Files (x86)\Intel\Platform Manager).
3. Re-install the Intel EMA Server.
Intel® EMA Platform Manager Service Like all Windows services, the Intel EMA Platform Manager Service will
not starting timeout if the service takes too long to start (30 seconds by default).
On slow machines, this timeout limit may be reached while the Intel
EMA Platform Manager Service is starting. If this happens Intel EMA
will not work correctly.
Check the status, events, and log of this service:
l In the Windows Services viewer, check to see if it is started
successfully.
l In the Windows Event Viewer, go to Windows Logs \ System
and look for entries with Level: Error and Source: Service Con-
trol Manager.
Error when trying to access the Intel® Ensure the website is deployed. The website may not be deployed due
EMA website to the package path issue mentioned above.
To fix:
Use Windows IIS Manager to determine the folder of the Intel® EMA
website (click Explore under Actions, top right). In that folder you
should see many subfolders and files.
If not, use the Platform Manager to “sync site” and redeploy the
website.
Using Internet Explorer on a Windows The default security settings of Internet Explorer on Windows Server
The target Intel® EMA website URL must If the URL used to access the Intel EMA website does not match the
match the Intel® EMA website’s cer- Issued to field of Intel EMA website certificate, the web browser’s
tificate security filtering will block many features.
To fix:
Ensure Intel EMA URL matches the Issued to field of the certificate.
Warnings and errors during Intel® AMT Depending on the target Intel® AMT firmware’s status, some of the
setup/provision warnings/errors may be transient errors. The Intel EMA Manageability
server will automatically re-try the failed setup periodically. However,
some of the warnings/errors are valid and need to be addressed.
Warning:Error (2):
Intel.Manageability.WSManagement.WSManException:
The underlying connection was closed: The
connection was closed unexpectedly. --->
System.Net.WebException: The underlying connection
was closed: The connection was closed unexpectedly.
If this does not resolve after the Intel® Manageability
Server retries the setup, then shut down the Intel® AMT
machine, unplug the power cable and unplug the
Ethernet cable to reset the Intel® ME firmware. Then
reconnect the cables back and restart the machine.
Intel® AMT operation does not work, but This section applies to the scenario where Intel EMA server is installed
all other features function correctly under Use hostname only mode and the target endpoint is
provisioned with Intel AMT CIRA.
If Intel AMT operation does not work, but all other features work, it is
very likely that the Intel AMT CIRA firmware cannot resolve the
hostname/FQDN entered during Intel EMA server installation.
To fix:
1. Unprovision the target endpoint.
2. With a clean setup and a clean/unprovisioned endpoint, per-
form a CIRA provision and monitor the provision events.
a. To monitor, go to the EMAManageabilityServer’s
Events tab in Platform Manager. Make sure there are
no errors (a few warnings are OK).
b. On the target endpoint, open the Intel® Management
Uninstalling Intel® EMA server fails to When uninstalling the Intel EMA server, you may see the
drop the database warning/error: “Unable to drop database.”
To fix:
802.1x setup fails during Intel AMT Intel EMA version 1.5.0 and later uses LDAPS secure ports by default
provisioning (LDAPS secure port 636 and Global Catalog port 3269). Previous
versions of Intel EMA used the standard non-secure LDAP ports
-OR-
(LDAP port 389 and Global Catalog port 3268). If you are installing
Active Directory user validation fails Intel EMA v 1.5.0 or later, and are using Active Directory or 802.1x
after updating to v1.5.0 or later
Intel EMA agents fail to connect to This may be due to disabled TLS cipher suites. As of v1.4.0, Intel EMA
server after updating to v1.4.0 or later restricted the usable TLS ciphers suites for the agent while leaving the
older cipher used by Intel AMT enabled for CIRA. Check to ensure
proper TLS cipher suites are enabled. See sections 1.4.6 and 1.4.7 for
more information.
Error processing MeshSet- During an update installation, the installer will fail with an error
tingsCertificate during update install- message "Missing, invalid, or multiple MeshSettingsCertificates
ation found" under the following circumstances:
l No MeshSettingsCertificate was found in the Intel
EMA database
l The MeshSettingsCertificate was found, but it is corrupted or
in an invalid format
l Multiple MeshSettingsCertificates were found in the Intel
EMA database
To fix:
To fix this problem, restore the last known good copy of the
MeshSettingsCertificate to the Intel EMA database from backup. Be
sure to remove any invalid or additional copies of the certificate
before restoring from backup. See section 4.7 for information on
restoring from backup.
Note: If you change the serverIps or messagePort setting for any of the component servers, you must restart
all the component servers, not just the one whose settings you changed (in a distributed server architecture,
you must do this on all server machines). Also, you will need to recycle the Intel EMA web site's IIS application
pool to restart the Intel EMA web server when you change these two settings. For other settings, restarting
only the modified component server will suffice. If you change messagePort, make sure the new port is not
blocked by a firewall.
UI: Admin Port Local Determines if the Admin TCP listener will only bind to the local loopback or not.
Values are 0 and 1.
API: adminportlocal
0 = Distributed-server environment
1 = Single server environment
UI: Agent Auto Update Boolean. Enables or disables automatic agent update. Default: Enabled.
API: enableAgentAuto
Update
UI: Agent Update Interval Interval in seconds between Intel EMA Agent updates. I.e., if set to 5, the Intel
(Seconds) EMA server will wait 5 seconds before attempting to update the next agent
requesting update. Default: 10. Minimum: 10. Maximum: 120.
API: agentUpdateIntervalSeconds
UI: Enable Intel CIRA Power State Enable periodic CIRA power state polling. Values are True/False. The default is
Polling True.
API: enableCIRAPowerPolling
UI: Maximum Number of The maximum number of concurrent DB connections for this server.
UI: Swarm Servers List of active Swarm Servers. Includes Server ID and Server IP & Port (format
IP Address: port).
API: swarmserver
UI: Server IPs List of machine IP addresses where this component server type is running. For
example, if the Swarm server is running on machine ip1, ip2, and ip3, then
API: serverIps
serverIps will include all IP addresses.
UI: Message Port The TCP port this component server type is listening on to accept internal traffic
from other Intel EMA components. Default 8093.
API: messagePort
UI: TCP Connection Retry Wait time between retries when establishing communication connections
between Intel EMA server components.
API: tcpConnRetrySeconds
UI: TCP Connection Idle Interval between heartbeat messages sent between components once com-
munications are established.
API: tcpConnIdleSeconds
UI: Database Connection Wait Amount of time in minutes that Intel EMA will wait for getting a database
Time (Minutes) connection.
API: dbConnectionWaitTime Range: 1 - 10
Minutes
Default: 2
UI: Database Lock Timeout Period Amount of time in seconds that a SQL query will keep a lock.
(Seconds)
Range: 1 - 60
API: dbSetLockTimeoutSeconds
Default: 2
UI: Database Retry Hold Time for Amount of time in milliseconds that a SQL query will wait to complete. This
a Query (Milliseconds) value is multiplied by the value of Database Retry Attempts for a Query to
increase the hold time in each retry.
API: dbRetryHoldtimeMilli
Seconds Range: 100 - 60000
Default: 100
UI: Database Retry Attempts for a Number of retries to execute a failed SQL query. After reaching this value, the
Query Swarm server will restart due to critical failure in the database.
API: dbRetryMaxAttempts Range: 3 - 100
Default: 5
UI: Ajax Cookie Idle Timeout Amount of time, in minutes, from when the cookie is added until it expires.
UI: Http Header Access Control Additional headers to set in response to the Ajax request.
Allow Headers
API: httpheader_Access-Control-
Allow-Headers
UI: User Access Failed Max Count Number of failed password attempts before user account is locked by the Web
API.
API: userAccessFailedMaxCount
UI: Expire Sessions Sets whether the Ajax server should expire the session or not (default is
enabled).
API: expiresessions
UI: Maximum Number of The maximum number of concurrent DB connections for this server.
Concurrent Database Connections
API: maxdbconnections
UI: Server IPs List of machine IP addresses where this component server type is running. For
example, if the Ajax server is running on machine ip1, ip2, and ip3, then server-
API: serverIps
Ips will include all IP addresses.
UI: Swarm Servers List of active Swarm Servers. Includes Server ID and Server IP & Port (format
IP Address: port).
API: swarmserver
UI: Message Port The TCP port this component server type is listening on to accept internal
traffic from other Intel EMA components. Default 8092.
API: messagePort
UI: CIRA Server Port The port of the CIRA access server, which is the Swarm Server (or
the Swarm Server load balancer in a distributed architecture). Used
API: ciraserver_port
by the load balancer to direct incoming traffic (from CIRA) to the
Swarm Server's 8080 port.
UI: Maximum Number of Concurrent Database The maximum number of concurrent database connections for
Connections this server.
API: maxdbconnections
UI: USBR Images Root Directory The root directory on the Intel EMA server where uploaded
bootable image files (.iso and .img) are stored. Default value is
API: usbrImagesRootDirectory
C:\ProgramData\Intel\EMA\USBR.
UI: Maximum USBR Image Storage Capacity per Disk space in GB each tenant is allowed for USBR image storage.
Tenant
Default: 20 GB
API: maxUsbrImageStorageCapacityPerTenant
Maximum: 50 GB
InGigabytes
UI: Maximum USBR Image storage Capacity Per Total disk space in GB (for all tenants) allowed in this Intel
EMA Instance EMA instance for USBR image storage.
API: maxUsbrImageStorageCapacityPer Default: 50 GB
EmaInstanceInGigabytes
Maximum: 500 GB
UI: Maximum USBR Slot Count per Tenant Number of active USBR sessions allowed for each tenant.
API: maxUsbrSlotCountPerTenant
UI: Maximum USBR Idle time Length of time in minutes a USBR session can be idle before being
automatically terminated.
API: maxUsbrIdleTimeInMinutes
UI: USBR Redirection Manager Loop Interval Status polling interval in seconds for active USBR sessions.
API: usbrRedirectionManagerLoopIntervalIn
Seconds
UI: USBR Redirection Throttling Rate The delay in sending USBR file data to the target endpoint's Intel
AMT firmware. This is needed in order to throttle the data rate, as
API: usbrRedirectionThrottlingRateIn
certain internal data flows within Intel EMA do not work properly if
Milliseconds
the data rate is too high.
UI: File Upload Retention Period Number of days an incomplete resumable file upload would be
kept, after which it would be automatically deleted.
API: fileUploadRetentionPeriodInDays
UI: File Upload Cleanup Interval Interval in hours that file cleanup process would run to process
incomplete resumable files.
API: fileUploadCleanupIntervalInHours
UI: Swarm Servers List of active Swarm Servers. Includes Server ID and Server IP
& Port (format IP Address: port).
API: swarmserver
UI: Server IPs List of machine IP addresses where this component server type is
running. For example, if the Manageability server is running on
API: serverIps
machine ip1, ip2, and ip3, then serverIps will include all
IP addresses
UI: Message Port The TCP port this component server type is listening on to accept
internal traffic from other Intel EMA components. Default 8094.
API: messagePort
UI: Audit Log Cleanup Interval (Hours) Interval in hours before cleanup of audit log records in the Intel
EMA database.
API: AuditLogCleanupIntervalInHours
UI: Audit Log Retention Period (Days) Interval in days before cleanup of audit log records in the Intel
EMA database.
API: AuditLogRetentionPeriodInDays
UI: Enable 8021X Certificate Auto Renewal Boolean, default "True." Used to determine whether automatic
802.1x certificate renewal flows are enabled. If enabled, Intel EMA
API: Is8021XCertificateRenewalEnabled
automatically renews certificates that will be expiring soon.
UI: 802.1X Certificate Renewal Window (Days) Integer. Sets the number of days prior to an 802.1x certificate's
expiration at which Intel EMA flags that certificate for renewal.
API: Ieee8021xCertificateRenewalWindowDays
Default: 30
Maximum: 90
Minimum: 1
Setting Description
UI: Access Token Time to Live Expiration duration of the API bearer token, in seconds.
API: AccessTokenTimeToLive
UI: Ajax Server Host Hostname or IP address of the Ajax server, or the load balancer of the Ajax
servers.
API: AjaxServerHost
UI: Enable Allowed Domains, Used by the Ajax server. If enabled, the web server checks incoming
Allowed Domains Ajax/websocket requests to accept or reject.
API: EnableAllowedDomains, AllowedDomains is a comma delimited list with example
AllowedDomains test1.intel.com,test2.intel.com.
EnableAllowedDomains is 0 (false) or 1 (true).
UI: Maximum Number of The maximum number of concurrent database connections for this server.
Concurrent Database Connections
API: maxdbconnections
UI: Swarm Server Host Hostname or IP address of the Swarm server, or the load balancer of the
Swarm servers.
API: SwarmServerHost
UI: Swarm Server Port 8080 in single server installation or the Swarm server port exposed by the
swarm server load balancer in distributed server architecture.
API: SwarmServerPort
UI: Global Catalog Port The port used for connecting to the Active Directory Global Catalog. This is
used to perform AD login when AD username and password are provided.
API: GlobalCatalogPort
Default is 3269, which is the SSL port. See note for LDAP Connection Port
below.
UI: LDAP Connection Port The port used for LDAP connection in 802.1x configuration. Default port is
secure 636.
API: LdapConnectionPort
Note: Intel EMA version 1.5.0 and later uses LDAPS secure ports by
default (LDAPS secure port 636 and Global Catalog port 3269). Previous
versions of Intel EMA used the standard non-secure LDAP ports (LDAP
port 389 and Global Catalog port 3268). If you are installing Intel EMA v
1.5.0 or later, and are using Active Directory or 802.1x integration,
ensure the LDAPS ports are enabled. If you prefer to use the standard
non-secure ports, then after installing Intel EMA, open the installer pro-
gram again (EMAServerInstaller.exe, run as administrator) and select
UI: Max Access Token TTL Maximum time for API bearer tokens to be refreshed.
API: MaxAccesstokenTTL
UI: Frontend Storage Type Allows you to specify whether Intel EMA Website runtime information should
be stored in browser local storage or browser session storage. If Local Storage
API: frontendstoragetype
is used, the session will remain (no need to login again) after the front end web-
site is closed. If Session Storage is used, the session is lost when the front end
website is closed.
Note: If you change security settings for any of the component servers, you must restart all the component
servers, not just the one whose settings you changed (in a distributed server architecture, you must do this on
all server machines). Also, you will need to recycle the Intel EMA web site's IIS application pool to restart the
Intel EMA web server when you change these settings.
Setting Description
UI: Unauthorized TCP connection timeout Boolean. When enabled Intel EMA will terminate new TCP
connections that go idle and do not complete the SSL
API: enableUnauthTcpConnectionIdle
handshake to help prevent Denial of Service attacks.
Timeout
Default: true.
UI: Rate Limiter Boolean. When enabled Intel EMA will perform per-IP
address HTTPS/TCP TLS request rate limiting to help
API: enableRateLimiter
prevent Denial of Service attacks.
Default: true.
UI: Rate Limiter Window Size The window size in milliseconds to use for tracking requests
with per-IP address rate limiting.
UI: Ajax HTTP Requests Max Count The maximum number of allowed requests per-IP address
in a window before requests would be rejected to the Ajax
API: ajaxHttpRateLimiterMaxCount
Server Web redirection port (8084).
Default: 20
Maximum: 1,000,000
UI: Recovery HTTP Requests Max Count The maximum number of allowed requests per-IP address
in a window before requests would be rejected to the
API: recoveryHttpRateLimiterMaxCount
Recovery Server Web redirection port (8085).
Default: 20
Maximum: 1,000,000
UI: Message Ports Requests Max Count (Before The maximum number of allowed pre-authentication
Authorization) requests per-IP address in a window before requests would
be rejected to the internal component-to-component ports
API: blastMessageBeforeAuthRateLimiterMaxCount
(8092, 8093, 8094).
Default: 100
Maximum: 1,000,000
UI: Message Ports Requests Max Count (After The maximum number of allowed post-authentication
Authorization) requests per-IP address in a window before requests would
be rejected to the internal component-to-component ports
API: blastMessageAfterAuthRateLimiterMaxCount
(8092, 8093, 8094).
Default: 80,000
Maximum: 1,000,000
UI: Swarm Admin Ports Request Max Count (Before The maximum number of allowed pre-authentication
Authorization) requests per-IP address in a window before requests would
be rejected to the Swarm Server Admin port (8089).
API: adminPortBeforeAuthRateLimiterMaxCount
Default: 20,000
Maximum: 1,000,000
UI: Swarm Admin Ports Request Max Count (After The maximum number of allowed authenticated requests
Authorization) per-IP address in a window before requests would be
throttled to the Swarm Server Admin port (8089).
API: adminPortAfterAuthRateLimiterMaxCount
Default: 20,000
Maximum: 1,000,000
UI: Agent Port Request Max Count (Before The maximum number of allowed pre-authentication
Authorization) requests per-IP address in a window before requests would
be rejected to the Swarm Server Agent port (8080).
API: agentPortBeforeAuthRateLimiterMaxCount
Default: 20
Maximum: 1,000,000
UI: Connection Count Check Boolean. When enabled Intel EMA will limit the TCP TLS
connection count per-IP address to help prevent Denial of
API: enableConnectionCountChecker
Service attacks.
Default: true.
UI: Message Port (connections per port) The maximum number of connections per-IP address
allowed to the internal component-to-component ports
API: blastMessageConnCountChecker
(8092, 8093, 8094).
Default: 20
Maximum: 1,000,000
UI: Admin Port (connections per port) The maximum number of connections per-IP address
allowed to the Swarm Server Admin port (8089).
API: swarmAdminPortConnCountChecker
Default: 20,000
Maximum: 1,000,000
UI: Swarm Agent Port (connections per port) The maximum number of connections per-IP address
allowed to the Swarm Server Agent port (8080).
API: swarmAgentPortConnCountChecker
Default: 20,000
Maximum: 1,000,000
Setting Description
UI: Log File Path Path to the Intel EMA logfile.
API: logfilepath Maximum: 248 characters
Minimum: 2 characters
UI: Maximum Number of The maximum number of concurrent database connections for this server.
Concurrent Database Connections
API: maxdbconnections
UI: Message Port The TCP port this component server type is listening on to accept internal
traffic from other Intel EMA components. Default 8095.
API: messagePort
UI: Recovery Port Enabled Boolean, default "True." Specifies whether or not the recovery port is enabled.
API: RecoveryPortEnabled
UI: Server IPs List of machine IP addresses where this component server type is running. For
example, if the Ajax server is running on machine ip1, ip2, and ip3, then server-
API: serverIps
Ips will include all IP addresses.
If you decide to use another value (e.g., in a load balancing scenario), follow IT practice to set up the Service Principle
Name (SPN) after Intel® EMA is installed.
Note: This section focuses on configuration for the Intel EMA server system to enable 802.1x authentication
at the overall server level as a prerequisite for configuring 802.1x profiles for a specific Tenant in Intel EMA.
For information on configuring an 802.1x profile for a specific Tenant usage space, see the Intel® EMA Admin-
istration and Usage Guide.
2. Create a Certificate Template: AMTComputer. This is a duplicate template based on the Workstation
Authentication template.
Figure 5: Certificate Templates list