WLAN Microcode?

I currently have a Lenovo ThinkPad T480 running ME FW 11.8.60.3561 (corporate LP) with an Intel 8265 (vPro) WLAN card installed. In researching upgrading the WLAN module to an Intel 9260 (vPro), it seems that replacing the WLAN module might disable the ME settings menu even with using a vPro part. Checking through 11.8.60.3561 with FIT shows an option for “WLAN Microcode”, but the only options available are “0x24FD WINDSTORM” (Intel 8265) and “0x24F3 SNOWFIELD” (Intel 8260). Might that be the cause of disabling the ME settings, and if so, would there be any way to get the microcode for the 9260 (0x2526) loaded? It isn’t a deal-breaker since the ME settings can be restored by reinstalling the original 8265, but if they can be rescued with the new card it would be nice to have.

FWIW, meinfo -verbose:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
 
PS C:\tools\Intel CSME System Tools v11 r17\MEInfo\WIN64> .\MEInfoWin64.exe -verbose
 
Intel(R) MEInfo Version: 11.8.60.3561
Copyright(C) 2005 - 2018, Intel Corporation. All rights reserved.
 

 

Windows OS Version : 10.0
 
FW Status Register1: 0x90000245
FW Status Register2: 0x00F60506
FW Status Register3: 0x00000030
FW Status Register4: 0x00A84400
FW Status Register5: 0x00000000
FW Status Register6: 0x40400AD9
 
CurrentState: Normal
ManufacturingMode: Disabled
FlashPartition: Valid
OperationalState: CM0 with UMA
InitComplete: Complete
BUPLoadState: Success
ErrorCode: No Error
ModeOfOperation: Normal
SPI Flash Log: Not Present
FPF HW Source value: Original FPF HW Fuse Bank
ME FPF Fusing Patch Status: ME FPF Fusing patch NOT required
Phase: ROM/Preboot
ICC: Valid OEM data, ICC programmed
ME File System Corrupted: No
PhaseStatus: AFTER_SRAM_INIT
FPF and ME Config Status: Match
FW Capabilities value is 0x5DF65245
Feature enablement is 0x5DF65245
Platform type is 0x42131421
Found an Intel vPro Wireless device
Intel(R) Manageability and Security Application code versions:
 
Table Type 5 ( 0x 05 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 74 (0x 4A ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
BIOS Version N24ET44W (1.19 )
Table Type 5 ( 0x 05 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 74 (0x 4A ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
Table Type 0 ( 0x 00 ) found, size of 60 (0x 3C ) bytes
Table Type 1 ( 0x 01 ) found, size of 124 (0x 7C ) bytes
Table Type 2 ( 0x 02 ) found, size of 89 (0x 59 ) bytes
Table Type 3 ( 0x 03 ) found, size of 106 (0x 6A ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 30 (0x 1E ) bytes
Table Type 8 ( 0x 08 ) found, size of 33 (0x 21 ) bytes
Table Type 126 ( 0x 7E ) found, size of 41 (0x 29 ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 37 (0x 25 ) bytes
Table Type 8 ( 0x 08 ) found, size of 57 (0x 39 ) bytes
Table Type 126 ( 0x 7E ) found, size of 57 (0x 39 ) bytes
Table Type 9 ( 0x 09 ) found, size of 31 (0x 1F ) bytes
Table Type 12 ( 0x 0C ) found, size of 7 (0x 07 ) bytes
Table Type 13 ( 0x 0D ) found, size of 29 (0x 1D ) bytes
Table Type 22 ( 0x 16 ) found, size of 55 (0x 37 ) bytes
Table Type 133 ( 0x 85 ) found, size of 21 (0x 15 ) bytes
Table Type 135 ( 0x 87 ) found, size of 21 (0x 15 ) bytes
Table Type 130 ( 0x 82 ) found, size of 22 (0x 16 ) bytes
MEBx Version 11.0.0.0010
GbE Version 0.1
Vendor ID 8086
PCH Version 21
FW Version 11.8.60.3561 LP
Security Version (SVN) 3
LMS Version 1846.12.0.1173
MEI Driver Version 1828.12.0.1152
Wireless Hardware Version 2.1.77
Wireless Driver Version 20.90.0.100
 
FW Capabilities 0x5DF65245
 
Intel(R) Active Management Technology - PRESENT/ENABLED
Intel(R) Capability Licensing Service - PRESENT/ENABLED
Protect Audio Video Path - PRESENT/ENABLED
Intel(R) Dynamic Application Loader - PRESENT/ENABLED
Service Advertisement & Discovery - PRESENT/ENABLED
Intel(R) NFC Capabilities - NOT PRESENT
Intel(R) Platform Trust Technology - NOT PRESENT
 
Re-key needed False
Platform is re-key capable True
Intel(R) AMT State Enabled
AMT Global State Enabled
TLS Enabled
Last ME reset reason Global system reset
Local FWUpdate Enabled
BIOS Config Lock Enabled
GbE Config Lock Enabled
Get flash master region access status...done
Host Read Access to ME Enabled
Host Write Access to ME Disabled
Get EC region access status...done
Host Read Access to EC Disabled
Host Write Access to EC Disabled
Protected Range Register Base #0 0x89D
Protected Range Register Limit #0 0x89F
Protected Range Register Base #1 0x8A0
Protected Range Register Limit #1 0xE8F
Protected Range Register Base #2 0xE90
Protected Range Register Limit #2 0xE9F
Protected Range Register Base #3 0xEA0
Protected Range Register Limit #3 0xFFF
Protected Range Register Base #4 0x0
Protected Range Register Limit #4 0x0
SPI Flash ID 1 C22018
SPI Flash ID 2 Unknown
BIOS boot State Post Boot
OEM ID 4c656e6f-766f-0000-0000-000000000000
Link Status Link Down
System UUID 4c5e8ecc-30c5-11b2-a85c-e63e64779885
MAC Address 8c-16-45-53-0b-60
IPv4 Address 0.0.0.0
Wireless MAC Address 00-00-00-00-00-00
Wireless IPv4 Address 0.0.0.0
IPv6 Enablement Disabled
Wireless IPv6 Enablement Disabled
Privacy/Security Level Default
Configuration State Not Started
Provisioning Mode PKI
Capability Licensing Service Enabled
OEM Tag 0x00000000
Slot 1 Board Manufacturer 0x000017AA
Slot 2 System Assembler 0x00000000
Slot 3 Reserved 0x00000000
M3 Autotest Enabled
C-link Status Enabled
Wireless Micro-code Mismatch No
Wireless Micro-code ID in Firmware 0x24FD
Wireless LAN in Firmware Intel(R) Dual Band Wireless-AC 8265
Wireless Hardware ID 0x24FD
Wireless LAN Hardware Intel(R) Dual Band Wireless-AC 8265
Localized Language English
Independent Firmware Recovery Disabled
EPID Group ID 0x2021
 
Retrieving Variable "LSPCON Port Configuration"
LSPCON Ports None
 
Retrieving Variable "eDP Port Configuration"
5K Ports None
OEM Public Key Hash FPF B81780CA1F680177E08349A29C256B6677BA4335078122BA149B9DCEB63687CD
 
Retrieving Variable "OEM Public Key Hash"
OEM Public Key Hash ME B81780CA1F680177E08349A29C256B6677BA4335078122BA149B9DCEB63687CD
ACM SVN FPF 0x2
KM SVN FPF 0x0
BSMM SVN FPF 0x0
GuC Encryption Key FPF 0000000000000000000000000000000000000000000000000000000000000000
 
Retrieving Variable "GuC Encryption Key"
GuC Encryption Key ME 0000000000000000000000000000000000000000000000000000000000000000
 
FPF ME
--- --
Force Boot Guard ACM Enabled
Retrieving Variable "Force Boot Guard ACM Enabled"
Enabled
Protect BIOS Environment Enabled
Retrieving Variable "Protect BIOS Environment Enabled"
Enabled
CPU Debugging Enabled
Retrieving Variable "CPU Debugging"
Enabled
BSP Initialization Enabled
Retrieving Variable "BSP Initialization"
Enabled
Measured Boot Disabled
Retrieving Variable "Measured Boot Enabled"
Disabled
Verified Boot Enabled
Retrieving Variable "Verified Boot Enabled"
Enabled
Key Manifest ID 0x1
Retrieving Variable "Key Manifest ID"
0x1
Enforcement Policy 0x3
Retrieving Variable "Error Enforcement Policy"
0x3
 

Interesting. Is the provided MEInfo log before or after installing the new card? It does not report a mismatch so I assume before.

Generally, I think these are configured via the Intel Local Management Service (LMS) which is part of the Corporate Drivers & Software suite. It is worth taking a look after installing it from Intel Management Engine: Drivers, Firmware & System Tools.

For CSME 11 I can see 0x24F3 and 0x24FD. For CSME 12 I can see 0x9DF0, 0x2526 and 0x2720. The one you’re looking for is bundled with CSME 12. If the Intel LMS software does not help, try asking Intel what vPro Wireless cards are supported with CSME 11 firmware. I suspect that they might validate only some and thus apply versioning segmentation for older or newer cards.

I decided having the better card was worth losing ME settings, since it is exceedingly unlikely that this laptop will ever be in an enterprise setting. Testing with the 8265 in after first boot with the 9260 didn’t restore AMT settings to BIOS, so I might as well stick with the 9260 now.

MEInfo -verbose after installing the 9260, FWIW:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
 
PS C:\tools\Intel CSME System Tools v11 r17\MEInfo\WIN64> .\MEInfoWin64.exe -verbose
 
Intel(R) MEInfo Version: 11.8.60.3561
Copyright(C) 2005 - 2018, Intel Corporation. All rights reserved.
 

 

Windows OS Version : 10.0
 
FW Status Register1: 0x94000245
FW Status Register2: 0x0AF60506
FW Status Register3: 0x00000030
FW Status Register4: 0x00A84000
FW Status Register5: 0x00001F01
FW Status Register6: 0x44400AC9
 
CurrentState: Normal
ManufacturingMode: Disabled
FlashPartition: Valid
OperationalState: CM0 with UMA
InitComplete: Complete
BUPLoadState: Success
ErrorCode: No Error
ModeOfOperation: Normal
SPI Flash Log: Not Present
FPF HW Source value: Original FPF HW Fuse Bank
ME FPF Fusing Patch Status: ME FPF Fusing patch NOT required
Phase: ROM/Preboot
ICC: Valid OEM data, ICC programmed
ME File System Corrupted: No
PhaseStatus: AFTER_SRAM_INIT
FPF and ME Config Status: Match
FW Capabilities value is 0x5930124C
Feature enablement is 0x59301248
Platform type is 0x42135421
No Intel Wireless device was found
Intel(R) Manageability and Security Application code versions:
 
Table Type 5 ( 0x 05 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 103 (0x 67 ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
BIOS Version N24ET44W (1.19 )
Table Type 5 ( 0x 05 ) found, size of 0 (0x 00 ) bytes
Table Type 222 ( 0x DE ) found, size of 72 (0x 48 ) bytes
Table Type 14 ( 0x 0E ) found, size of 42 (0x 2A ) bytes
Table Type 134 ( 0x 86 ) found, size of 15 (0x 0F ) bytes
Table Type 16 ( 0x 10 ) found, size of 25 (0x 19 ) bytes
Table Type 17 ( 0x 11 ) found, size of 103 (0x 67 ) bytes
Table Type 19 ( 0x 13 ) found, size of 33 (0x 21 ) bytes
Table Type 7 ( 0x 07 ) found, size of 29 (0x 1D ) bytes
Table Type 4 ( 0x 04 ) found, size of 131 (0x 83 ) bytes
Table Type 0 ( 0x 00 ) found, size of 60 (0x 3C ) bytes
Table Type 1 ( 0x 01 ) found, size of 124 (0x 7C ) bytes
Table Type 2 ( 0x 02 ) found, size of 89 (0x 59 ) bytes
Table Type 3 ( 0x 03 ) found, size of 106 (0x 6A ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 30 (0x 1E ) bytes
Table Type 8 ( 0x 08 ) found, size of 33 (0x 21 ) bytes
Table Type 126 ( 0x 7E ) found, size of 41 (0x 29 ) bytes
Table Type 8 ( 0x 08 ) found, size of 30 (0x 1E ) bytes
Table Type 126 ( 0x 7E ) found, size of 37 (0x 25 ) bytes
Table Type 8 ( 0x 08 ) found, size of 57 (0x 39 ) bytes
Table Type 126 ( 0x 7E ) found, size of 57 (0x 39 ) bytes
Table Type 9 ( 0x 09 ) found, size of 31 (0x 1F ) bytes
Table Type 12 ( 0x 0C ) found, size of 7 (0x 07 ) bytes
Table Type 13 ( 0x 0D ) found, size of 29 (0x 1D ) bytes
Table Type 22 ( 0x 16 ) found, size of 55 (0x 37 ) bytes
Table Type 126 ( 0x 7E ) found, size of 28 (0x 1C ) bytes
Table Type 133 ( 0x 85 ) found, size of 21 (0x 15 ) bytes
Table Type 135 ( 0x 87 ) found, size of 21 (0x 15 ) bytes
Table Type 130 ( 0x 82 ) found, size of 22 (0x 16 ) bytes
MEBx Version 11.0.0.0010
GbE Version 0.1
Vendor ID 8086
PCH Version 21
FW Version 11.8.60.3561 LP
Security Version (SVN) 3
LMS Version 1846.12.0.1173
MEI Driver Version 1828.12.0.1152
 
FW Capabilities 0x5930124C
 
Intel(R) Small Business Technology - PRESENT/DISABLED
Intel(R) Capability Licensing Service - PRESENT/ENABLED
Protect Audio Video Path - PRESENT/ENABLED
Intel(R) Dynamic Application Loader - PRESENT/ENABLED
Service Advertisement & Discovery - PRESENT/ENABLED
Intel(R) NFC Capabilities - NOT PRESENT
Intel(R) Platform Trust Technology - NOT PRESENT
 
Re-key needed False
Platform is re-key capable True
Intel(R) AMT State Disabled
AMT Global State Enabled
TLS Enabled
Last ME reset reason Global system reset
Local FWUpdate Enabled
BIOS Config Lock Enabled
GbE Config Lock Enabled
Get flash master region access status...done
Host Read Access to ME Enabled
Host Write Access to ME Disabled
Get EC region access status...done
Host Read Access to EC Disabled
Host Write Access to EC Disabled
Protected Range Register Base #0 0x89D
Protected Range Register Limit #0 0x89F
Protected Range Register Base #1 0x8A0
Protected Range Register Limit #1 0xE8F
Protected Range Register Base #2 0xE90
Protected Range Register Limit #2 0xE9F
Protected Range Register Base #3 0xEA0
Protected Range Register Limit #3 0xFFF
Protected Range Register Base #4 0x0
Protected Range Register Limit #4 0x0
SPI Flash ID 1 C22018
SPI Flash ID 2 Unknown
BIOS boot State Post Boot
OEM ID 4c656e6f-766f-0000-0000-000000000000
Capability Licensing Service Enabled
OEM Tag 0x00000000
Slot 1 Board Manufacturer 0x000017AA
Slot 2 System Assembler 0x00000000
Slot 3 Reserved 0x00000000
M3 Autotest Enabled
C-link Status Enabled
Localized Language English
Independent Firmware Recovery Disabled
EPID Group ID 0x2021
 
Retrieving Variable "LSPCON Port Configuration"
LSPCON Ports None
 
Retrieving Variable "eDP Port Configuration"
5K Ports None
OEM Public Key Hash FPF B81780CA1F680177E08349A29C256B6677BA4335078122BA149B9DCEB63687CD
 
Retrieving Variable "OEM Public Key Hash"
OEM Public Key Hash ME B81780CA1F680177E08349A29C256B6677BA4335078122BA149B9DCEB63687CD
ACM SVN FPF 0x2
KM SVN FPF 0x0
BSMM SVN FPF 0x0
GuC Encryption Key FPF 0000000000000000000000000000000000000000000000000000000000000000
 
Retrieving Variable "GuC Encryption Key"
GuC Encryption Key ME 0000000000000000000000000000000000000000000000000000000000000000
 
FPF ME
--- --
Force Boot Guard ACM Enabled
Retrieving Variable "Force Boot Guard ACM Enabled"
Enabled
Protect BIOS Environment Enabled
Retrieving Variable "Protect BIOS Environment Enabled"
Enabled
CPU Debugging Enabled
Retrieving Variable "CPU Debugging"
Enabled
BSP Initialization Enabled
Retrieving Variable "BSP Initialization"
Enabled
Measured Boot Disabled
Retrieving Variable "Measured Boot Enabled"
Disabled
Verified Boot Enabled
Retrieving Variable "Verified Boot Enabled"
Enabled
Key Manifest ID 0x1
Retrieving Variable "Key Manifest ID"
0x1
Enforcement Policy 0x3
Retrieving Variable "Error Enforcement Policy"
0x3
 

Yes at the 2nd log it says that it cannot detect a (compatible) Intel vPro Wireless device. You probably need to perform a “fptw64 -greset” via Flash Programming Tool for the change to be quickly applied after switching them. No matter what, I think you should be able to use AMT via Ethernet despite the lack of a compatible wireless card.