A Microsoft app for iOS and Android devices that enables authentication with two-factor verification, phone sign-in, and code generation
The described behavior is consistent with Secure Boot rejecting part of the boot chain when a policy or boot component is not trusted by the platform’s current Secure Boot databases and keys.
From the available guidance, the supported and safe remediation paths focus on:
- Ensuring Secure Boot databases and keys are valid and up to date.
- Recovering or rebuilding the EFI boot files if Secure Boot–related changes break the boot chain.
- Re‑enabling Secure Boot only after the platform is back in a known‑good state.
Given the scenario (OEM‑injected policy affecting Insider builds), the following supported steps are relevant:
- Confirm Secure Boot keys and databases are in a valid state
OEM platforms rely on the Secure Boot signature database (db), revoked signatures database (dbx), and Key Enrollment Key database (KEK) stored in firmware NVRAM. If these are out of sync with current Windows boot components, trust failures can occur.- The db/dbx contain allowed and revoked signers or image hashes for UEFI applications and OS loaders (such as Windows Boot Manager). If an image hash appears in both, dbx takes precedence and the image is blocked.
- KEK is used to update db and dbx; Microsoft’s key in KEK allows Windows updates to add new trusted boot software or revoke compromised images.
If the firmware’s Secure Boot variables are corrupted or misconfigured, OEM‑specific recovery or resetting Secure Boot keys to factory defaults is required.
- Use the documented Secure Boot recovery procedure if the system becomes unbootable
If Secure Boot changes or policy interactions cause boot failures (including WinRE or external media), the supported recovery sequence is:- Turn off Secure Boot in UEFI firmware.
- If available, reset Secure Boot keys to factory defaults (use “Reset” rather than “Clear” where both exist). This restores manufacturer default Secure Boot variables.
- Attempt to boot Windows from the system disk and, once logged on, rebuild the EFI boot files using an elevated Command Prompt:
After “Boot files successfully created.”, restart and verify normal boot.mountvol S: /s del S:\*.*/f /s /q bcdboot %systemroot% /s S: - If this does not recover the device, reinstall Windows from recovery media, then verify it boots.
- Re‑enable Secure Boot in firmware and reboot.
- Re‑enable Secure Boot in a supported way
When Secure Boot has been disabled for troubleshooting or recovery, the supported re‑enable sequence is:- Uninstall or remove any hardware, OS, or boot components that are not compatible with Secure Boot.
- Open the BIOS/UEFI menu (via boot‑time key such as F1/F2/F12/Esc, or via Windows → Shift+Restart → Troubleshoot → Advanced Options → UEFI Firmware Settings).
- Locate the Secure Boot setting and set it to Enabled. On some systems, select Custom and then load the built‑in Secure Boot keys. If enabling is blocked, reset BIOS/UEFI to factory defaults and retry.
- Save changes and reboot. If the PC fails to boot, disable Secure Boot again and use the recovery procedure above.
- If issues persist, OEM support is required.
- Security considerations
- Disabling Secure Boot or altering its policy/keys reduces protection against bootkit malware. Microsoft recommends Secure Boot as part of a trusted boot path from UEFI through Windows Trusted Boot.
- Any workaround that removes or bypasses OEM Secure Boot policy should be evaluated carefully, as it may weaken the intended security posture of the device.
- For long‑term compatibility, ensure Secure Boot certificates and revocation lists are updated per Microsoft guidance, especially as older certificates begin expiring.
For Insider‑specific regressions or OEM‑policy interactions (such as SkuSiPolicy.p7b), the supported escalation path is to file feedback via the Windows Insider Feedback Hub and/or work with the OEM, while using the documented Secure Boot recovery and re‑enable procedures to keep the device in a supported state.
References:
- How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932
- Secure boot
- Disabling Secure Boot
- Windows 11 and Secure Boot
- Can't enable secure boot - Microsoft Q&A
- Secure boot state is still off tried alot of things - Microsoft Q&A
- why don't i have the 2023 secure boot keys - Microsoft Q&A