Advertisement
Guest User

Untitled

a guest
Oct 20th, 2019
282
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.32 KB | None | 0 0
  1.  
  2. Intel(R) MEInfo Version: 10.0.30.1054
  3. Copyright(C) 2005 - 2014, Intel Corporation. All rights reserved.
  4.  
  5.  
  6. FW Status Register1: 0x1E000245
  7. FW Status Register2: 0x6300A306
  8. FW Status Register3: 0x00000300
  9. FW Status Register4: 0x00004004
  10. FW Status Register5: 0x00001F01
  11. FW Status Register6: 0x44400EC9
  12.  
  13. CurrentState: Normal
  14. ManufacturingMode: Disabled
  15. FlashPartition: Valid
  16. OperationalState: M0 with UMA
  17. InitComplete: Complete
  18. BUPLoadState: Success
  19. ErrorCode: No Error
  20. ModeOfOperation: Normal
  21. Phase: HOSTCOMM Module
  22. ICC: Valid OEM data, ICC programmed
  23. SPI Flash Log: Not Present
  24. ME File System Corrupted: No
  25. FPF and ME Config Status: Match
  26.  
  27. Get ME FWU version command...done
  28.  
  29. SMBIOS Table Data
  30. SM BIOS Spec Version : 2.7
  31. Starting address: 0xACBFD000
  32. Table Size in Bytes: 3013 ( 0xBC5 )
  33. Number of Table Entries: the 64 ( 0x40 )
  34.  
  35. Table Type 222 ( 0x DE ) found, size of 14 (0x 0E ) bytes
  36. Table Type 14 ( 0x 0E ) found, size of 8 (0x 08 ) bytes
  37. Table Type 134 ( 0x 86 ) found, size of 13 (0x 0D ) bytes
  38. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  39. Table Type 4 ( 0x 04 ) found, size of 42 (0x 2A ) bytes
  40. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  41. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  42. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  43. Table Type 16 ( 0x 10 ) found, size of 23 (0x 17 ) bytes
  44. Table Type 17 ( 0x 11 ) found, size of 34 (0x 22 ) bytes
  45. Table Type 19 ( 0x 13 ) found, size of 31 (0x 1F ) bytes
  46. Table Type 129 ( 0x 81 ) found, size of 8 (0x 08 ) bytes
  47. Table Type 130 ( 0x 82 ) found, size of 20 (0x 14 ) bytes
  48. Table Type 131 ( 0x 83 ) found, size of 64 (0x 40 ) bytes
  49. Table Type 1 ( 0x 01 ) found, size of 27 (0x 1B ) bytes
  50. Table Type 2 ( 0x 02 ) found, size of 15 (0x 0F ) bytes
  51. Table Type 3 ( 0x 03 ) found, size of 22 (0x 16 ) bytes
  52. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  53. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  54. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  55. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  56. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  57. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  58. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  59. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  60. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  61. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  62. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  63. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  64. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  65. Table Type 8 ( 0x 08 ) found, size of 9 (0x 09 ) bytes
  66. Table Type 126 ( 0x 7E ) found, size of 9 (0x 09 ) bytes
  67. Table Type 9 ( 0x 09 ) found, size of 17 (0x 11 ) bytes
  68. Table Type 126 ( 0x 7E ) found, size of 17 (0x 11 ) bytes
  69. Table Type 9 ( 0x 09 ) found, size of 17 (0x 11 ) bytes
  70. Table Type 12 ( 0x 0C ) found, size of 5 (0x 05 ) bytes
  71. Table Type 13 ( 0x 0D ) found, size of 22 (0x 16 ) bytes
  72. Table Type 126 ( 0x 7E ) found, size of 26 (0x 1A ) bytes
  73. Table Type 126 ( 0x 7E ) found, size of 26 (0x 1A ) bytes
  74. Table Type 18 ( 0x 12 ) found, size of 23 (0x 17 ) bytes
  75. Table Type 21 ( 0x 15 ) found, size of 7 (0x 07 ) bytes
  76. Table Type 21 ( 0x 15 ) found, size of 7 (0x 07 ) bytes
  77. Table Type 131 ( 0x 83 ) found, size of 22 (0x 16 ) bytes
  78. Table Type 136 ( 0x 88 ) found, size of 6 (0x 06 ) bytes
  79. Table Type 134 ( 0x 86 ) found, size of 16 (0x 10 ) bytes
  80. Table Type 133 ( 0x 85 ) found, size of 5 (0x 05 ) bytes
  81. Table Type 135 ( 0x 87 ) found, size of 83 (0x 53 ) bytes
  82. Table Type 0 ( 0x 00 ) found, size of 24 (0x 18 ) bytes
  83.  
  84. SMBIOS Table Data
  85. SM BIOS Spec Version : 2.7
  86. Starting address: 0xACBFD000
  87. Table Size in Bytes: 3013 ( 0xBC5 )
  88. Number of Table Entries: the 64 ( 0x40 )
  89.  
  90. Table Type 222 ( 0x DE ) found, size of 14 (0x 0E ) bytes
  91. Table Type 14 ( 0x 0E ) found, size of 8 (0x 08 ) bytes
  92. Table Type 134 ( 0x 86 ) found, size of 13 (0x 0D ) bytes
  93. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  94. Table Type 4 ( 0x 04 ) found, size of 42 (0x 2A ) bytes
  95. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  96. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  97. Table Type 7 ( 0x 07 ) found, size of 19 (0x 13 ) bytes
  98. Table Type 16 ( 0x 10 ) found, size of 23 (0x 17 ) bytes
  99. Table Type 17 ( 0x 11 ) found, size of 34 (0x 22 ) bytes
  100. Table Type 19 ( 0x 13 ) found, size of 31 (0x 1F ) bytes
  101. Table Type 129 ( 0x 81 ) found, size of 8 (0x 08 ) bytes
  102. Table Type 130 ( 0x 82 ) found, size of 20 (0x 14 ) bytes
  103. Table Type 131 ( 0x 83 ) found, size of 64 (0x 40 ) bytes
  104. MEBx Version found is 10.0.0.0007
  105.  
  106. Get ME FWU info command...done
  107.  
  108. Get ME FWU version command...done
  109.  
  110. Get ME FWU feature state command...done
  111.  
  112. Get ME FWU platform type command...done
  113.  
  114. Get ME FWU feature capability command...done
  115.  
  116. Get ME FWU OEM Id command...done
  117. FW Capabilities value is 0x7DF67A45
  118. Feature enablement is 0x5DF65A45
  119. Platform type is 0x42351401
  120. Intel(R) Manageability and Security Application code versions:
  121.  
  122. BIOS Version: N10ET59W (1.38 )
  123. MEBx Version: 10.0.0.0007
  124. Gbe Version: 0.2
  125. VendorID: 8086
  126. PCH Version: 3
  127. FW Version: 10.0.30.1072 LP
  128.  
  129. FW Capabilities: 0x7DF67A45
  130.  
  131. Intel(R) Active Management Technology - PRESENT/ENABLED
  132. Intel(R) Standard Manageability - NOT PRESENT
  133. Intel(R) Capability Licensing Service - PRESENT/ENABLED
  134. Protect Audio Video Path - PRESENT/ENABLED
  135. Intel(R) Dynamic Application Loader - PRESENT/ENABLED
  136. Intel(R) NFC Capabilities - NOT PRESENT
  137. Intel(R) Platform Trust Technology - PRESENT/DISABLED
  138.  
  139. Intel(R) AMT State: Enabled
  140. TLS: Enabled
  141. Last ME reset reason: Global system reset
  142. Local FWUpdate: Enabled
  143.  
  144. Get BIOS flash lockdown status...done
  145. BIOS Config Lock: Enabled
  146.  
  147. Get GbE flash lockdown status...done
  148. GbE Config Lock: Enabled
  149.  
  150. Get flash master region access status...done
  151. Host Read Access to ME: Disabled
  152. Host Write Access to ME: Disabled
  153. SPI Flash ID #1: EF4018
  154. SPI Flash ID VSCC #1: 20252025
  155. SPI Flash BIOS VSCC: 20252025
  156. Protected Range Register Base #0 0x0
  157. Protected Range Register Limit #0 0x0
  158. Protected Range Register Base #1 0xED0
  159. Protected Range Register Limit #1 0xFFF
  160. Protected Range Register Base #2 0xDF1
  161. Protected Range Register Limit #2 0xE2F
  162. Protected Range Register Base #3 0xDF0
  163. Protected Range Register Limit #3 0xDF0
  164. Protected Range Register Base #4 0xA00
  165. Protected Range Register Limit #4 0xDEF
  166. BIOS boot State: Post Boot
  167. OEM Id: 4c656e6f-766f-0000-0000-000000000000
  168.  
  169. Get Intel(R) AMT state command...done
  170. Link Status: Link down
  171.  
  172. Get system UUID command...done
  173. System UUID: f4bad381-53bd-11cb-ae42-954dbb59b30a
  174.  
  175. Get LanInterfaceSettings command for wired interface...done
  176. MAC Address:
  177. Get Provisioning Tls Mode command...done
  178.  
  179. Get provisioning state command...done
  180. 68-f7-28-90-97-17
  181. IPv4 Address: 0.0.0.0
  182.  
  183. Get LanInterfaceSettings command for wireless interface...done
  184. Wireless MAC Address:
  185. Get Provisioning Tls Mode command...done
  186.  
  187. Get provisioning state command...done
  188. Not Available
  189. Wireless IPv4 Address: 0.0.0.0
  190.  
  191. Get IPv6InterfaceStatus command for wired interface...done
  192. Command response reports interface was disabled
  193. IPv6 Enablement: Disabled
  194.  
  195. Get privacy/security level info command...done
  196. Privacy/Security Level: Default
  197.  
  198. Get provisioning state command...done
  199. Configuration state: Not started
  200.  
  201. Get Provisioning Tls Mode command...done
  202. Provisioning Mode: PKI
  203. Capability Licensing Service: Enabled
  204.  
  205. Get ME FWU OEM Tag command...done
  206. OEM Tag: 0x00000000
  207.  
  208. Get System Integrator ID command...done
  209. Slot 1 Board Manufacturer: 0x000017AA
  210.  
  211. Get System Integrator ID command...This slot is unused.
  212. Slot 2 System Assembler: Unused
  213.  
  214. Get System Integrator ID command...This slot is unused.
  215. Slot 3 Reserved: Unused
  216.  
  217. Get M3 Autotest command...done
  218. M3 Autotest: Enabled
  219.  
  220. Get CLink Status command...done
  221. C-link Status: Enabled
  222.  
  223. Get ME FWU Platform Attribute (WLAN ucode) command...done
  224. Wireless Micro-code Mismatch: No
  225. Wireless Micro-code ID in Firmware: 0x095A
  226. Wireless LAN in Firmware: Intel(R) Dual Band Wireless-AC 7265
  227. Wireless Hardware ID: 0x095B
  228. Wireless LAN Hardware: Intel(R) Dual Band Wireless-AC 7265
  229.  
  230. Get ME FWU Platform Attribute (WLAN ucode) command...done
  231. Localized Language: English
  232.  
  233. Get ME FWU Info command...done
  234. Independent Firmware Recovery: Disabled
  235. Keybox: Not Provisioned
  236.  
  237. Get Oem Public Key Hash command...done
  238. OEM Public Key Hash (FPF): 9F048DB1578521E5BBD505526F7DAAD8C7B8FF6B94232EEB4D084183B43D43CC
  239. OEM Public Key Hash (ME):
  240.  
  241. Get ACM SVN command...done
  242. ACM SVN FPF: 0x3
  243.  
  244. Get KM SVN command...done
  245. KM SVN FPF: 0x0
  246.  
  247. Get BSMM SVN command...done
  248. BSMM SVN FPF: 0x0
  249.  
  250. Get Oem Boot Guard Policy command...done
  251.  
  252. FPF ME
  253. --- --
  254. Force Boot Guard ACM: Enabled
  255. Protect BIOS Environment: Enabled
  256. CPU Debug Disabled: Disabled
  257. BSP Initialization Disabled: Disabled
  258. Measured Boot: Disabled
  259. Verified Boot: Enabled
  260. Key Manifest ID: 0x1
  261. Enforcement Policy: 0x3
  262.  
  263. Get PTT command...done
  264. PTT: Enabled
  265. PTT Lockout Override Counter:
  266. Get Anti-Hammering command...done
  267. 0x0
  268. EK Revoke State:
  269. Get EK Revoke State command...done
  270. Not Revoked
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement