Intel decided to ban UEFI compatibility mode in 2020
UEFI (Unified Extensible Firmware Interface) to replace the traditional BIOS has been a long time, the more intuitive way to distinguish between the two is to see if there is a mouse button in the interface, of course, there are still many differences between the bottom.
From the operating system level, Windows 8 began to support the full UEFI, including the previous system, including Windows 7 64bit are not all.
Therefore, in many preinstalled Win8 and above computers, if you want to reinstall Win7 or even XP, you need to modify the UEFI CSM (Compatibility Support Module) and Secure Boot (secure boot) two settings to enable Legacy Compatible mode.
However, Brian Richardson, an Intel researcher, disclosed an Intel decision at the UEFI Plugfest in Taiwan that he will stop supporting the UEFI BIOS compatibility at 0, 1 and 2 levels from 2020, that is, fail to power on the CSM operating system.
The three levels allow Win7 and the previous many do not support or not fully support UEFI operating system to start working properly, because 16bit Ethernet port, VGA, hard drive, etc. can not self-test passed, and Class 3/3 + to Mandatory, that is, removed Legacy.
Richardson himself agrees very strongly about this change, and as a technician, he thinks the system is safer, the hardware is more stable, and the firmware package is much smaller.
Of course, for ordinary users, the new platform or the old platform is updated to the appropriate BIOS, the installation of systems including Win7 64biti before completely become a luxury.
Glossary:
1. CSM (Compatibility Support Module): compatible support module.
Many computers built prior to Win 8 leverage the UEFI architecture to reduce costs and standardize the firmware stack, but are still used in BIOS mode to be compatible with existing machining processes, tools, legacy operating systems, drivers, and certain applications.
Secure Boot (Secure Boot):
All Win8 hardware devices will default to Secure Boot using UEFI (Unified Extensible Firmware Interface) to prevent unauthorized bootloaders from booting in the BIOS and UEFI only launching certified bootloaders Programs, malware can no longer use this method to attack users.