Quick Specs
QuickSpecs
HP ProDesk 400 G4 DM / AIO - G5 MT / SFF
Standard Features and Configurable Components (availability may vary by country)
Not all configuration components are available in all regions/countries.
c06045417 – DA16288 – Worldwide — Version 20 — November 14, 2018
Page 40
PROCESSORS
Intel® 8th Generation Core™ Processors
All HP ProDesk & ProOne 400 Business PC models featuring this technology include processors that are part of the Intel®
Stable Image Platform Program (SIPP) designed to ensure the stability promise inherent in the value proposition of the HP
ProDesk and ProOne 400 Business PC,
Intel® Advanced Management Technology (AMT) v12
1
– An advanced set of remote management features and functionality
which provides network administrators the latest and most effective tools to remotely discover, heal, and protect networked
client systems regardless of the system's health or power state. AMT 12 includes the following advanced management
functions:
• Support for configuration of Intel® AMT 12.0 new capabilities
• No reset after provisioning
• Support changes to BIOS table 130
• Support for Microsoft Windows Server 2012 R2
• Support for New Microsoft SQL Server Versions including Standard and Enterprise editions
• Support for Intel® SSD Prop 2500 Series
• Support for Intel® Enterprise Digital Fence
• The Platform Discovery Utility can now discover these additional Intel® products:
• Intel® SSD Pro 2500 Series; Enterprise Digital Fence
• Intel® Identity Protection Technology with One Time Password; Public Key Infrastructure; Multi Factor Authentication
• Intel® Identity Protection Technology with Intel® WiGig
• New Profile Editor and Profile Editor Plugin Interface
• New Required Permissions for Solutions Framework
1. Intel® Active Management Technology requires an Intel® AMT-enabled chipset, network hardware and software, as well as connection
with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the
management console or further integration into existing security frameworks to enable certain functionality. It may also require
modifications of implementation of new business processes.










