Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.comp.os.windows-11    |    Steaming pile of horseshit Windows 11    |    4,969 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 4,968 of 4,969    |
|    Paul to J. P. Gilliver    |
|    Re: Windows Secure Boot Certificate    |
|    06 Mar 26 15:29:39    |
      XPost: alt.comp.os.windows-10       From: nospam@needed.invalid              On Fri, 3/6/2026 11:26 AM, J. P. Gilliver wrote:       > On 2026/3/6 4:27:10, Paul wrote:       >> On Thu, 3/5/2026 10:15 PM, Alan K. wrote:       >>> On 3/5/26 7:01 PM, Paul wrote:       >>>> On Thu, 3/5/2026 6:24 PM, Alan K. wrote:       >>>>> On 3/5/26 6:30 PM, Jack wrote:       >>>>>> Windows Secure Boot is EXPIRING: Do This Before June 2026!       > []       >>>>>> This only applies to UEFI boot. On Windows 10 this was not necessary but       >>>>>> for Windows 11 this is now mandatory. Whether Microsoft updates this       >       > Is there a way to tell from a running W10 setup (i. e. without having to       > do a reboot and watch for things flashing by) whether you have UEFI or       > legacy boot? (And, if UEFI, whether you have "Secure Boot enabled"       > [thanks VLH]?)       > []              If you go to Settings and enter TPM, the       Device Security on mine says:               "Security Processor"        ...        standard hardware security not supported              Which means, roughly, that it is not enabled at BIOS level       and used for the current boot. (The Security Processor is       operating, but the BIOS is not switched to a state where       it wants to measure anything, like measure a boot process.)              The other entry in a Settings Search is "Security Processor"       and it says               Attestation Ready        Storage Ready              and above that it indicates the TPM type and version. And that       is indicating, that if I did enable Secure Boot at BIOS level, it       should work.              The fact a TPM is detected and it is listed as an Infineon device       (one of the manufacturers of such), that indicates there is a       secure enclave for any TPM based measuring and recording to be done.              But if the BIOS does not contain code for operating the TPM       for the Secure Boot feature, that is a "lack of Attestation".       For example, on the Optiplex 780, there is a TPM present, but       there is no BIOS code to use it. On the Test Machine, there is       no TPM present and there *is* BIOS code to use it. And these       non-comformances prevent Secure Boot from happening.              If I do Start : Run : msinfo32, then look at System Summary       (there is at least one other MSFT utility to display this), it says:               BIOS Mode UEFI        Secure Boot State Off              and that's a decent summary suitable for determining whether       you're in CSM or UEFI, and if in UEFI whether Secure Boot       was used or not.               Paul              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca