Quick Specs

QuickSpecs
HP ProDesk 400 G4 DM / AIO - G5 MT / SFF
Standard Features and Configurable Components (availability may vary by country)
Not all configuration components are available in all regions/countries.
c06045417 DA16288 Worldwide Version 20 November 14, 2018
Page 40
PROCESSORS
Intel® 8th Generation Core™ Processors
All HP ProDesk & ProOne 400 Business PC models featuring this technology include processors that are part of the Intel®
Stable Image Platform Program (SIPP) designed to ensure the stability promise inherent in the value proposition of the HP
ProDesk and ProOne 400 Business PC,
Intel® Advanced Management Technology (AMT) v12
1
An advanced set of remote management features and functionality
which provides network administrators the latest and most effective tools to remotely discover, heal, and protect networked
client systems regardless of the system's health or power state. AMT 12 includes the following advanced management
functions:
Support for configuration of Intel® AMT 12.0 new capabilities
No reset after provisioning
Support changes to BIOS table 130
Support for Microsoft Windows Server 2012 R2
Support for New Microsoft SQL Server Versions including Standard and Enterprise editions
Support for Intel® SSD Prop 2500 Series
Support for Intel® Enterprise Digital Fence
The Platform Discovery Utility can now discover these additional Intel® products:
Intel® SSD Pro 2500 Series; Enterprise Digital Fence
Intel® Identity Protection Technology with One Time Password; Public Key Infrastructure; Multi Factor Authentication
Intel® Identity Protection Technology with Intel® WiGig
New Profile Editor and Profile Editor Plugin Interface
New Required Permissions for Solutions Framework
1. Intel® Active Management Technology requires an Intel® AMT-enabled chipset, network hardware and software, as well as connection
with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the
management console or further integration into existing security frameworks to enable certain functionality. It may also require
modifications of implementation of new business processes.