One Click Recovery
Intel® One-Click Recovery (OCR) allows IT administrators to remotely trigger a secure and reliable boot to a recovery application, ensuring recovery from system failures, bare-metal scenarios, or connectivity issues using Intel AMT's out-of-band (OOB) connection.
Supported Recovery Options¶
OCR supports three recovery modes:
-
UEFI HTTPS Network Boot: Perform a network-based recovery using encrypted HTTPS.
-
Windows Recovery Environment (WinRE): Boot into Windows Recovery for troubleshooting and repair.
-
Local Pre-Boot Application (PBA): Launch a locally installed recovery or diagnostic tool.
Where to Start¶
Depending on your recovery scenario, follow the appropriate section below:
- To recover using a network-hosted ISO, start with HTTPS Boot.
- To boot into Windows Recovery Environment, go to Boot to Windows Recovery Environment.
- To launch a locally installed Pre-Boot Application, continue with Boot to Local PBA.
HTTPS Boot¶
Prerequisites for HTTPS Boot¶
Before using HTTPS Network Boot, ensure the following prerequisites are met:
-
Enable HTTP(S) Boot in BIOS settings. This may be disabled by default on some devices.
-
When recovering a device using an ISO that isn’t signed by a trusted certificate authority, you’ll need to disable Secure Boot in the BIOS settings.
-
Set up an HTTPS server to host the ISO.
HTTPS Server
- For this guide, the HTTPS server is assumed to be running on the same host as the Console and is serving a full Ubuntu LTS image from:
https://192.168.88.250:5443/ubuntu.iso. - Instructions for setting up an HTTPS server are not included here, so please ensure you have one ready. If you haven’t set it up yet, there are many helpful resources available online to guide you.
- For this guide, the HTTPS server is assumed to be running on the same host as the Console and is serving a full Ubuntu LTS image from:
Triggering HTTPS Boot¶
-
Connect to the Intel AMT device using Console over TLS.
TLS Connection Required
Console must be connected to the AMT device over TLS for this feature to work.
-
Enable
One Click Recovery (OCR)feature inGeneral AMT InfoSection.Is HTTPS Network Boot supported?
See the snapshot below — if the HTTPS Network Boot field shows Supported, the feature is available on the device.
-
Upload the Root Certificate of the HTTPS server hosting the ISO via the
Add Newcertificates option.
-
Click on the three-dot menu and select Reset to HTTPS Boot (OCR).
-
Enter the ISO URL (e.g., https://192.168.88.250:5443/ubuntu.iso).
Check ISO URL
Ensure the HTTPS Server ISO URL is accessible to the device.
-
Optionally, enable
Enforce Secure Bootto boot only a secure.isofile.ACM vs CCM behavior
-
For UEFI HTTPS Boot, AMT allows the Console to control the Enforce Secure Boot setting only when the device is provisioned in Admin Control Mode (ACM).
-
When operating in Client Control Mode (CCM), Secure Boot is always enforced by AMT.
Secure Boot
If Secure Boot is enabled, the UEFI BIOS must have the Root Certificate used to sign the ISO's bootloader in its trusted database (DB) to allow execution.
-
-
Click
OKto start the recovery process. The device will restart and boot from the ISO. -
Optionally, Connect to KVM and verify that the device loads the ISO.
KVM Keyboard Issue
If KVM is connected before initiating OCR via HTTPS Boot, the keyboard may not work when entering the URL.
Boot to Windows Recovery Environment¶
Prerequisites for Boot to WinRE¶
Before triggering a Boot to Windows Recovery Environment (WinRE), ensure that the AMT device meets the following prerequisites:
-
The device must have a Windows operating system installed with Windows Recovery Environment (WinRE) available and properly configured.
-
WinRE is typically included by default in most modern Windows installations (Windows 11, and Windows Server 2016 or later).
WinRE Configuration and Support
Please refer to the official Windows documentation to confirm which operating systems include WinRE support and for additional details on configuring or enabling WinRE.
Triggering Boot to WinRE¶
-
Connect to the Intel AMT device using Console over TLS.
TLS Connection Required
Console must be connected to the AMT device over TLS for this feature to work.
-
Enable
One Click Recovery (OCR)feature inGeneral AMT InfoSection.Is Boot to Windows Recovery Environment supported?
See the snapshot below — if the Windows Recovery Boot field shows Supported, the feature is available on this device.
-
Optionally, start a KVM session if you want to observe the full recovery process.
-
Click the ⋯ (three-dot) menu and select Reset to WinRE (OCR).
-
The device will immediately restart and boot into Windows Recovery Environment.
Boot to Local PBA¶
Prerequisites for Local PBA Boot¶
Before triggering a Local PBA boot, ensure that the EFI environment is properly prepared.
-
A signed
.efibinary (for example,OemPba.efi) must be present on the EFI System Partition (ESP) of the AMT device. -
The EFI file path and name must exactly match the entry registered in BIOS so that it appears in the OCR dropdown list.
Connect to the device over TLS using Console, select Reset to OCR, and view the available PBA options to confirm the exact EFI path registered with AMT.
-
The signing certificate of the PBA must be enrolled in the BIOS Authorized Signatures (db).
Need help setting up the EFI?
This is just a reference example — there are multiple ways to achieve the same result.
Follow the detailed OCR PBA EFI Setup and Signing Guide for one example of how to sign the EFI, enroll its certificate, and place it on the EFI System Partition (ESP).
Triggering Local PBA Boot¶
-
Connect to the Intel AMT device using Console over TLS.
TLS Connection Required
Console must be connected to the AMT device over TLS for this feature to work.
-
Enable
One Click Recovery (OCR)feature inGeneral AMT InfoSection.Is Boot to PBA supported?
See the snapshot below — if the PBA Boot field shows Supported, the feature is available on this device.
-
Optionally, start a KVM session if you want to observe the full recovery process.
-
Click the ⋯ (three-dot) menu and select Reset to PBA (OCR).
-
From the dropdown, select the local recovery option corresponding to your EFI entry (for example,
\OemPba.efi).Secure Boot Mandatory
Ensure the Enforce Secure Boot checkbox is enabled before initiating the PBA boot.
For Boot to Local PBA, Secure Boot is always enforced by Intel® AMT, as AMT does not control the origin or integrity of locally installed PBAs.
-
Click OK to confirm.
-
The device will immediately restart and boot into the selected PBA EFI application.
If you see any issues, please log them on our GitHub Issues page or reach out to us on our Discord channel.