- Joined
- Feb 2, 2019
- Messages
- 283 (0.15/day)
Processor | Intel Core i5-12400 |
---|---|
Motherboard | ASUS ROG STRIX B660-A GAMING WIFI D4 |
Cooling | Corsair H115i RGB PRO XT (with Noctua Redux 1500RPM fans) |
Memory | Corsair Vengeance ARGB 4x8GB 3200MHz |
Video Card(s) | ASUS Dual Mini 3060 12GB GDDR6 |
Storage | Kingston Fury Renegade 500GB, WD SN550 1TB, Samsung EVO 860 1TB |
Display(s) | LG 27GL650F |
Case | Thermaltake H550 ARGB TG |
Power Supply | Seasonic Focus GX-850 80+ Gold |
Mouse | ASUS Cerberus |
Keyboard | ASUS Cerberus |
Software | Windows 11 Pro |
Benchmark Scores | CB R20: 4710cb CB R23: 12431cb |
Hi, i have an i5-9600k. I updated my ASUS Hero XI WiFI BIOS to the last revision (1005), i installed the last cumulative update from Microsoft, and i think i installed the latest firmware and drivers for the Manage Engine. Can you tell me if i'm good to go (except for the microcode that it's not released yet)?
Here's my ME info:
BIOS Version 1005
MEBx Version 0.0.0.0000
GbE Version 0.5
Descriptor Version 1.0
Vendor ID 8086
FW Version 12.0.35.1427 H Consumer
LMS Version 1846.12.0.1173
MEI Driver Version 1912.12.0.1247
And here's my Poweshell script of the patch status:
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: False
Speculation control settings for CVE-2018-3639 [speculative store bypass]
Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: True
Speculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: False
Speculation control settings for MDS [microarchitectural data sampling]
Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: True
Windows OS support for MDS mitigation is enabled: False
BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : False
KVAShadowRequired : False
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : True
L1TFHardwareVulnerable : False
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : False
L1TFInvalidPteBit : 0
L1DFlushSupported : True
MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : False
I hope someone read this and tell me if i do everything right (except the microcode update that it is not released yet by Intel). Thanks!
Here's my ME info:
BIOS Version 1005
MEBx Version 0.0.0.0000
GbE Version 0.5
Descriptor Version 1.0
Vendor ID 8086
FW Version 12.0.35.1427 H Consumer
LMS Version 1846.12.0.1173
MEI Driver Version 1912.12.0.1247
And here's my Poweshell script of the patch status:
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: False
Speculation control settings for CVE-2018-3639 [speculative store bypass]
Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: True
Speculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: False
Speculation control settings for MDS [microarchitectural data sampling]
Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: True
Windows OS support for MDS mitigation is enabled: False
BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : False
KVAShadowRequired : False
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : True
L1TFHardwareVulnerable : False
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : False
L1TFInvalidPteBit : 0
L1DFlushSupported : True
MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : False
I hope someone read this and tell me if i do everything right (except the microcode update that it is not released yet by Intel). Thanks!
Last edited: