HI,
After replacing my wifi card from intel 8265 to ax200 in lenovo t480s Intel AMI AMT settings disappear from BIOS.
When I repleaced to original wifi card intel 8265 still doesen’t have this setting in BIOS.
Is it possible to restore this settings in BIOS?
in MEInfo -verbose see:
full:
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
Intel(R) MEInfo Version: 11.8.80.3762
Copyright(C) 2005 - 2020, Intel Corporation. All rights reserved.
Driverless mode
FW Status Register1: 0x94000245
FW Status Register2: 0x090B8506
FW Status Register3: 0x00000030
FW Status Register4: 0x00A84004
FW Status Register5: 0x00001F01
FW Status Register6: 0x44400AC9
CurrentState: Normal
ManufacturingMode: Disabled
FlashPartition: Valid
OperationalState: CM0 with UMA
InitComplete: Complete
BUPLoadState: Success
ErrorCode: No Error
ModeOfOperation: Normal
SPI Flash Log: Present
FPF HW Source value: Original FPF HW Fuse Bank
ME FPF Fusing Patch Status: ME FPF Fusing patch NOT required
Phase: ROM/Preboot
ICC: Valid OEM data, ICC programmed
ME File System Corrupted: No
PhaseStatus: CALL_NEXT_MODULE
FPF and ME Config Status: Match
FW Capabilities value is 0x5930124C
Feature enablement is 0x59301248
Platform type is 0x42135421
Found an Intel vPro Wireless device
Intel(R) Manageability and Security Application code versions:
SMBIOS Table Data
SM BIOS Spec Version : 3.0
Starting address: 0x7A634000
Table Size in Bytes: 3060 ( 0xBF4 )
Number of Table Entries: the 63 ( 0x3F )
Table Type 0 ( 0x 00 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 106 (0x 6A ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
BIOS Version N22ET66P (1.43 )
SMBIOS Table Data
SM BIOS Spec Version : 3.0
Starting address: 0x7A634000
Table Size in Bytes: 3060 ( 0xBF4 )
Number of Table Entries: the 63 ( 0x3F )
Table Type 0 ( 0x 00 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 106 (0x 6A ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
Table Type 0 ( 0x 00 ) found, size of 60 (0x 3C ) bytes
Table Type 1 ( 0x 01 ) found, size of 127 (0x 7F ) bytes
Table Type 2 ( 0x 02 ) found, size of 89 (0x 59 ) bytes
Table Type 3 ( 0x 03 ) found, size of 107 (0x 6B ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 30 (0x 1E ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 30 (0x 1E ) bytes
Table Type 8 ( 0x 08 ) found, size of 37 (0x 25 ) bytes
Table Type 126 ( 0x 7E ) found, size of 37 (0x 25 ) bytes
Table Type 8 ( 0x 08 ) found, size of 57 (0x 39 ) bytes
Table Type 9 ( 0x 09 ) found, size of 31 (0x 1F ) bytes
Table Type 12 ( 0x 0C ) found, size of 7 (0x 07 ) bytes
Table Type 13 ( 0x 0D ) found, size of 29 (0x 1D ) bytes
Table Type 22 ( 0x 16 ) found, size of 55 (0x 37 ) bytes
Table Type 126 ( 0x 7E ) found, size of 28 (0x 1C ) bytes
Table Type 133 ( 0x 85 ) found, size of 21 (0x 15 ) bytes
Table Type 135 ( 0x 87 ) found, size of 21 (0x 15 ) bytes
Table Type 130 ( 0x 82 ) found, size of 22 (0x 16 ) bytes
MEBx Version 11.0.0.0010
GbE Version 0.1
Vendor ID 8086
PCH Version 21
FW Version 11.8.83.3874 LP
Security Version (SVN) 3
MEI Driver Version Not Available
FW Capabilities 0x5930124C
Intel(R) Small Business Technology - PRESENT/DISABLED
Intel(R) Capability Licensing Service - PRESENT/ENABLED
Protect Audio Video Path - PRESENT/ENABLED
Intel(R) Dynamic Application Loader - PRESENT/ENABLED
Service Advertisement & Discovery - PRESENT/ENABLED
Intel(R) NFC Capabilities - NOT PRESENT
Intel(R) Platform Trust Technology - NOT PRESENT
Re-key needed True
Platform is re-key capable True
Intel(R) AMT State Disabled
AMT Global State Disabled
TLS Enabled
Last ME reset reason Power up
Local FWUpdate Enabled
BIOS Config Lock Enabled
GbE Config Lock Enabled
Get flash master region access status...done
Host Read Access to ME Enabled
Host Write Access to ME Disabled
Get EC region access status...done
Host Read Access to EC Disabled
Host Write Access to EC Disabled
Protected Range Register Base #0 0x89D
Protected Range Register Limit #0 0x89F
Protected Range Register Base #1 0x8A0
Protected Range Register Limit #1 0xE8F
Protected Range Register Base #2 0xE90
Protected Range Register Limit #2 0xE9F
Protected Range Register Base #3 0xEA0
Protected Range Register Limit #3 0xFFF
Protected Range Register Base #4 0x0
Protected Range Register Limit #4 0x0
SPI Flash ID 1 C22018
SPI Flash ID 2 Unknown
BIOS boot State Post Boot
OEM ID =[CUT]=
Capability Licensing Service Enabled
OEM Tag 0x00000000
Slot 1 Board Manufacturer 0x000017AA
Slot 2 System Assembler 0x00000000
Slot 3 Reserved 0x00000000
M3 Autotest Enabled
C-link Status Enabled
Localized Language English
Independent Firmware Recovery Disabled
EPID Group ID 0x1041
FPF ME
--- --
Force Boot Guard ACM Enabled
Retrieving Variable "Force Boot Guard ACM Enabled"
Enabled
Protect BIOS Environment Enabled
Retrieving Variable "Protect BIOS Environment Enabled"
Enabled
CPU Debugging Enabled
Retrieving Variable "CPU Debugging"
Enabled
BSP Initialization Enabled
Retrieving Variable "BSP Initialization"
Enabled
Measured Boot Disabled
Retrieving Variable "Measured Boot Enabled"
Disabled
Verified Boot Enabled
Retrieving Variable "Verified Boot Enabled"
Enabled
Key Manifest ID 0x1
Retrieving Variable "Key Manifest ID"
0x1
Enforcement Policy 0x3
Retrieving Variable "Error Enforcement Policy"
0x3
Unable to clean up MEInfo before exiting.