• MS-DEFCON 3: Secure Boot triggers recovery keys

    Home » Forums » Newsletter and Homepage topics » MS-DEFCON 3: Secure Boot triggers recovery keys

    • This topic has 115 replies, 37 voices, and was last updated 9 months ago.
    Author
    Topic
    #2691974

    ISSUE 21.31.1 • 2024-07-31 By Susan Bradley It’s time to check whether your boot drive is encrypted. As I predicted, Microsoft’s July 2024 security up
    [See the full post at: MS-DEFCON 3: Secure Boot triggers recovery keys]

    Susan Bradley Patch Lady/Prudent patcher

    Viewing 34 reply threads
    Author
    Replies
    • #2691991

      OK, even though I am confident Bit Locker is NOT turned on, I think I shall pass on this update – UNLESS you think there is something in this update for Win 10 22h2 that is critical not to miss now rather than waiting on an improved August update.

    • #2691992

      For those who like myself, do not know what a Firmware Binary is, let alone how to upload it, Ars Technica provides ways to find out whether your firmware is affected.

      The first is for Windows Powershell:

      [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI
      PK).bytes) -match “DO NOT TRUST|DO NOT SHIP”

      If the output is “True”, you have a problem.

      For Linux users, the Command Line code is:

      $ efi-readvar -v PK

      You will see output something like:

      Variable PK, length 862
      PK: List 0, type X509
      Signature 0, size 834, owner 26dc4851-195f-4ae1-9a19-
      fbf883bbb35e
      Subject:
      CN=DO NOT TRUST – AMI Test PK
      Issuer:
      CN=DO NOT TRUST – AMI Test PK

      Or a legitimate Certificate output. (I won’t post my own results, as the Certificate may contain security information.)

      I think this method is easier to use than trying to figure out how to upload your current firmware binary to a website. Safer, too.

      -- rc primak

      3 users thanked author for this post.
      • #2692056

        [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI PK).bytes) -match “DO NOT TRUST|DO NOT SHIP”

        Note: to get this Powershell command to work you must replace the “smart quotes” WordPress placed around “DO NOT TRUST|DO NOT SHIP” with regular quotes like this.

        [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI PK).bytes) -match "DO NOT TRUST|DO NOT SHIP"
        4 users thanked author for this post.
        • #2697255

          One of the dangers of just copy/pasting from an article. It’s best to get comfortable with retyping the commands.

          -- rc primak

    • #2691995

      Thanks for your posts.

       

      In my house, we have three Win11 and one Win10 machines.  Two of the Win11 machines had Bitlocker activated and the one Win10 machine also had Bitlocker activated.  I was able to turn off Bitlocker on all three machines.  We were never asked to activate Bitlocker.  I hope Microsoft gets their head out of their rear on this one.

      4 users thanked author for this post.
    • #2691996

      Just to underline Susan’s point, I checked both of our computers for Bitlocker. On my Dell XPS it was turned off – fine. On my wife’s Dell Vostro, it was turned on, presumable by default from installation because it is a business laptop. I didn’t know and have no idea where the recovery key is. The drive is now decrypting. Thanks Microsoft.

      Chris
      Win 10 Pro x64 Group A

      1 user thanked author for this post.
    • #2692007

      “Ensure you have a backup of your drive and you know the recovery process.”
      Assuming one has a recent backup image (from Macrium Reflect in my case), what is the normal recovery process for any system?
      In order to restore an image, one has to be in Windows GUI, which one may have lost in the update process. So how can one use an image on external SSD to restore the system from a backup program on USB?

      Update: Macrium Reflect already replied in detail. It’s not easy but can be done.

      • #2692163

        In same position, I have exact same question. Could you pls post the steps?  (Am using Macrium Free, so no access to talk to Macrium) Ty

        • #2692317

          From Madcrium tech support:
          7/31/24 Macrium Reflect recovery in Win 10 or 11
          The steps to restore an image to a new machine follows:
          1. Create an image backup of the disk you wish to restore. This must include all system partitions, these can be identified by a Windows logo on the partition in reflect. This should be stored on external media.
          2. You will then need to create the rescue media onto a USB device. This can be the same device as the image is stored.
          Please Note: Steps One and Two may already have been completed, if this is the case please ignore steps One and Two.
          3. Once steps one and two are completed you can then take the new machine, and plug in the external device with the rescue media and image on the machine. Boot the machine into the BIOS and choose to boot from the external media. This will then boot you into the rescue media.
          4. You can then restore the image from within the Rescue Media and once this has been completed you can reboot your machine.
          https://knowledgebase.macrium.com/display/KNOW80/Restoring+an+image+from+within+the+Rescue+Media
          5. If the system is failing to boot and is showing a blue screen then please run Fix Windows boot problems
          https://knowledgebase.macrium.com/display/KNOW80/Fixing+Windows+boot+problems
          and if the system is showing an issue with the new hardware or missing drivers then please run Redeploy
          https://knowledgebase.macrium.com/display/KNOW80/Re-deploying+Windows+to+new+hardware+using+Macrium+ReDeploy
          6. You can then close out of the rescue media and boot into Windows.

          Step 3 isn’t necessarily easy, getting into BIOS and changing boot order, so I’m still waiting to hear back from Gigabyte on that question. If anyone has Gigabyte mobo and knows easy way to get into BIOS and change boot order, let me know please.

      • #2692174

        When you use Macrium as backup, the first thing you should do is make a bootable USB Rescue Drive. You will need a 8-32GB USB Drive. The procedure is a choice in the Macrium Menu. When you finish making the bootable Rescue USB, you need to verify that the computer will boot from the drive, that the Macrium software that starts when you do, and it can see the external HDD and the backup file stored on it.

        Then you restore the full image backup to the computer’s drive using the Restore option in the Macrium software running from the bootable USB.

        2 users thanked author for this post.
        • #2692318

          PK, as usual, this is very useful. Even though I did a Win 11 Pro 23H2 update (with plenty of problems), I really have to go through the steps you just outlined to make sure I can do them all if necessary.

    • #2692036

      The WIN10 update was installed with no issues.  Bit Locker on my systems cannot be enabled.  I guess that’s a good thing.

      2 users thanked author for this post.
    • #2692062

      Seven Windows 10 Pro 64-bit Version: 19045.4651 “Consumers” computers updated so far without incident.

      Bitlocker was not activated on any of the machines.

      Updating each machine took about one-half hour.

      3 users thanked author for this post.
    • #2692079

      Hey Y’all,

      I’ve just updated my CMsLocalPCInfo powershell program (v 6.40.10) to include information on compromised keys. Thanks to R C Primak for the command!
      General-Hardware

      I’ve test all of my machines 2 Dells & 1 Minis Forum and all return “false” meaning the bad keys were not found.

      If you try this out and get a True please let me know so I know the code is working properly. I’d also appreciate anyone who doen’t have Secure Boot enabled to check it out. You should NOT see that line in the output.

      May the Forces of good computing be with you!

      RG

      PowerShell & VBA Rule!
      Computer Specs

      4 users thanked author for this post.
      • #2692139

        I’d also appreciate anyone who doen’t have Secure Boot enabled to check it out. You should NOT see that line in the output.

        Windows 10 22H2 without Secure Boot. Verified that line doesn’t appear!

        However, there’s a problem where the actual values shown in the Value column on both the General Hardware and Processor (CPU) screens get truncated to only 5 characters (i.e. the width of the column header.)

        GeneralHardwareTab

        ProcessorTab

        I checked all the other tabs and those 2 are the only place where it happens.

        Note: running the default Powershell v5.1 that comes with Windows 10.

        1 user thanked author for this post.
        • #2692148

          n0ads,

          Thanks for testing!

          I’ve never seen that happen before and not quite sure what would cause it to happen.
          Would you mind using the “Write File” button and see if it happens in rhe file?

          Thanks again for testing.

          May the Forces of good computing be with you!

          RG

          PowerShell & VBA Rule!
          Computer Specs

          • #2692153

            The Write File button does the same thing.

            What causes it is, unless you deliberately override it, the output width of any tables the script creates is controlled by the width of the powershell “prompt” window that ran the script; which in my case is set for 30 characters.

            The fix is to always specify a table width value that’s large enough to display all possible column values by including the following after the Format-Table command.

            | Out-File -width ###

            Looking thru your code, I see you did do that for some, but not all, Format-Table commands.

            FYI, for me, a ### value of 136 normally allows all the columns to show full width values.

            1 user thanked author for this post.
            • #2692173

              n0ads,

              My bad! I just assumed the standard of 80 chars and only messed with it if the output was wider. I’ll correct that pronto!

              Thanks again for testing!

              RG

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692287

              n0ads,

              I’ve fixed it and re-posted the new version at the link above. Now version: 6.40.20.

              In the process I also removed the Windows Update GPO settings. It seems that they changed the Get-WUSettings cmdlet and it no longer returns the information I was displaying. I’ll probably revisit this in the future to see if they change it again.

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692379

              Looks good now 👍

              GeneralHardwareTab2

              1 user thanked author for this post.
            • #2692451

              @RetiredGeek,

              Found another problem with your script.

              The Logical Disks tab incorrectly shows my mapped external drive as C: when it should be A:

              LogicalDisks

              What’s stranger is, if I run the actual powershell command you use in your script to detect the drive letters directly from a powershell prompt, drive A: doesn’t show at all.

              LogicalDisks-PS

              So why is your script showing it and with the wrong drive letter?!?!

            • #2692468

              n0ads,

              Try running the script from a non-elevated PowerShell and see what you get.

              Windows doesn’t recognize Mapped drives that are not created at the same level, e.g. User vs Admin.
              Mapped-Warning

              After mapping a drive:
              MappedDrive
              standard-drives

              Not quite sure why the line jump. The A: drive shouldn’t show up on that screen it should be on the Mapped drives screen as shown above.

              You’re a good tester as you are obviously running stock settings where I am.
              Thanks Again!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692490

              Drive A: does show up on the Maps and Shares tab like it should.

              MappedDrive-1

              Try running the script from a non-elevated PowerShell and see what you get.

              Don’t have a non-admin user on my system so there’s no way for me to do that, but I figured out why Drive A is showing up on the Logical Disk tab.

              The Function LogicalDiskTab section of your script includes Where-Object { $_.DriveType -ne 5 } so it ignores “compact disks” when gathering the logical disk info.

              The problem is, Drive A: is a DriveType 4 network disk, which isn’t being ignored, so it gets added to the list of detected local disks.

              But the next command in that function only gets drive letters for actual local disks so it doesn’t detect drive letter A.

              The display of logical drive letters are then off by one row because there’s an extra row for my network drive that got detected as if it were a local disk!

              The fix is to modify line 2718 to Where-Object { $_.DriveType -ne 4 -And $_.DriveType -ne 5 } | so it also ignores network drives.

              I did that with my copy of your script and here’s what the Logical Drives tab now shows.

              LogicalDisks2

              BTW, you might want to also modify that section so it ignores disks with a 0 size like my Y & Z which are SD Card and Micro SD Card readers in a USB hub attached to my PC that are assigned driver letters regardless of whether there’s actually a card in them or not.

              1 user thanked author for this post.
            • #2692551

              Thanks again!!!!!

              I’m curious as to why when I mapped a drive on my NAS as A: it didn’t show up on the Logical Disks tab with the misalignment like yours did.

              PS>Get-CimInstance -Class Win32_LogicalDisk
              
              DeviceID DriveType ProviderName                    VolumeName Size          FreeSpace
              -------- --------- ------------                    ---------- ----          ---------
              A:       4         \\ComputerMentor2\CMShared\Cats CMShared   3836000382976 3277560676352
              C:       3                                         Windows    336917983232  264890679296
              G:       3                                         Data       434847846400  416346116096
              
              
              PS>
              

              It shows up as type 4 just like yours?

              Once again thanks so much for testing. You’re making my program better and better!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692558

              n0ads,

              Ok, I’ve updated to version 6.50.00 available at the link above.

              Changes:

              • Your suggest change on disk type!
              • It will now run in User mode w/o error messages
              • If run in User mode some items will not appear and others will indicate the need for Admin mode.

              FYI: You can run in User mode on a machine with only Admin accounts, I’m set up that way, just click on the search and type PowerShell or PWSH depending on desired version and as long as you don’t select “Run as Administrator” you should get the User mode permissions.

              Thanks again!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692649

              I’m curious as to why when I mapped a drive on my NAS as A: it didn’t show up on the Logical Disks tab with the misalignment like yours did.

              Actually, the Logical Disk screenshot you posted above does show the same mismatch.

              Mismatch

              It shows your mapped A: drive as C, your Windows C: drive as G, and your Data G: drive with no letter.

            • #2692651

              The new version did eliminate my mapped network drive A: but it still shows my empty SD card reader slots as drive Y & Z.

              I found the following modification to the code on line 2730 will ignore them unless there’s actually an SD Card in them.

                Where-Object { $_.DriveType -ne 4 -and 
                               $_.DriveType -ne 5 -and 
                               $_.Size -ne $Null } |

              Without SD Card in reader

              WithoutSD-Card

              With SD Card in reader.

              WithSD-Card

              BTW, I’ve noticed that it sometimes takes an extra long time for your script to get past the Getting Windows Update Info step (50 – 70 secs.)

              Why?

            • #2692722

              n0ads,

              Once again I owe you my thanks!

              Sorry, my old eyes didn’t catch the misalignment, I’m having more and more trouble with the peepers glossing over things.

              As to the long delay on the Windows Update info gathering I’ve noticed it also but can’t find a reason, still looking.

              That’s a cute trick to eliminate the empty SD card drives. I’m tinkering with whether or not to add it. My intention for this program is to show what the computer has as capabilities so in a way that would mask a capability. What I may do is to add a parameter like -DontShowEmptyDrives or something similar.

              Again thanks for all your help on making this a better utility for all!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692749

              n0ads,

              Ok I added the parameter -ActiveDrivesOnly.

              I’ve tried testing it but unfortunately my Dell 8920 doesn’t assign a drive letter to the SD Card reader until you place a card in the drive. It may be due to my use of USBDLM software.

              No Card in Drive:
              Dell8920NoSDCard

              Card in Drive:
              Dell8920withSDCard

              Before I post this one would you mind testing this by replacing the block of code in your current copy with this:

              Function LogicalDiskTab {
              
              #Excluding Network Drives (4) and DVD/CDs (5)
              
              [PSObject]$Logical = Get-CimInstance -Class Win32_LogicalDisk |
                         Where-Object { $_.DriveTYpe -ne 4 -and     
                                        $_.DriveType -ne 5 }
              If ($ActiveDrivesOnly.IsPresent) {                        
                 $Logical = $Logical | Where-Object {$_.Size -ne $Null } 
              }      
               
              $Logical = $Logical |
                         Select-Object @{N="DriveLetter";E={$_.DeviceID[0]}},
                               VolumeName, Filesystem, DriveType, Compressed,
                               Size, FreeSpace |
                         Sort-Object -property DriveLetter
              
              #------ Replace to but not including the code below:
              
              [PSObject]$Volume = Get-Volume  |
                      Where-Object DriveType -ne "CD-ROM" |
                      Where-Object DriveLetter -ne $Null     |
                            sort-object -property DriveLetter
              

              Thanks

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692907

              Not sure if this is what you expected, but there’s no difference between the unmodified and “modified” code.

              They both show my empty SD card reader slots as drive Y & Z.

              BTW, because they disappear from the screen so quickly I didn’t really noticed them before, but there’s two places in the text displayed in progress bar where the word Info is duplicated.

                Getting Disk Encryption Info Info

                Getting Security Info Info

              I noticed this time because I was paying more attention to exactly what was happening as the script ran.

            • #2692946

              n0ads,

              Did you run it with the -ActiveDrivesOnly argument?

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2692980

              Like most users, I run .ps1 files directly from Explorer by double clicking them so no argument was applied.

              So I ran it from a cmd prompt with the -ActiveDrivesOnly argument and it still shows my empty SD card reader slots as drive Y & Z.

              BTW, since I had a full size cmd prompt open this time, I saw the following 2 errors when the script ran.

              ScriptErrors

              I didn’t notice them before because the powershell “prompt” I use to run .ps1 scripts is set to only display 30 x 3 characters.

              I also noticed two new issues with how the script works.

              1- When the progress bar closes and the main window opens it’s not in focus until you click on it; notice how the title in the below screenshot is grayed out. Don’t know if that’s unique to my particular system or not??

              2- The Boot Keys Compromised line that’s only suppose to display if secure boot is enabled (which it’s not on my system) now gets displayed. I assume that’s due to some sort of code change you made?

              GH-tab

              The strange part is, the script was run with Admin privileges and I can run the actual code to check for compromised keys and it returns a false results. So why does the script indicate I need Admin Privilege to show that result?!?!

            • #2693177

              @RetiredGeek, I know why that -ActiveDrivesOnly argument isn’t working. The code you had me modify doesn’t include a Param () for it!

              However, before you make further modifications to make it work, consider this.

              My PC has a total of 20 USB ports, 4 front, 9 rear, 4 in my Dell monitor, 3 in the USB hub + 2 SD card readers.

              While 13 of those are “available” for use, your script doesn’t make any attempt to detect/show them until a USB drive has been plugged in. That’s because your script uses the drive letters as a means of detecting logical disks.

              The issue with my 2 SD card readers is, for whatever unfathomable reason, Microsoft decided to make Windows automatically” assign drive letters to SD card readers regardless of whether they actually have an SD card in them or not.

              And it’s not just SD card readers!

              I have a 7-in-1 card reader (Compact Flash cards, M2 cards, MS/MS Pro cards, SD cards, MicroSD cards, xD cards and SIM cards) and, when I plug it in, Windows assigns 5 of the 7 slots drive letters even though all the slots are empty.

              So my question is, why make a “special” acceptance for removable drives that aren’t USB? Especially since, in your case because you’re using that USBDLM software, your card reader isn’t detected/displayed until you insert a card into it.

              BTW, that USBDLM software looks like a very nice product and, if I’d know about it when I bought my USB hub with the card readers, I’d be using it. But I already figured out I could prevent Explorer from displaying my empty SD readers until I actual insert a card by simply going to Folder optionsView > Advanced and checking “Hide Empty Drives“.

            • #2693188

              BTW, since I had a full size cmd prompt open this time, I saw the following 2 errors when the script ran.

              Ok, I now know why those 2 errors happened.

              Error #1 happens because my PC doesn’t have a WiFi adapter so the WLAN AutoConfig service (WlanSvc) is not running.

              FYI, the default start type for that service is “Manual” so, if there’s no WiFi adapter, it’s normal for it to not be running.

              That means the netsh wlan show profiles command your script uses to detect WiFi returns The Wireless AutoConfig Service (wlansvc) is not running. when there’s no WiFi adapter instead of the ”*no wireless interface*” your script checks for.

              FYI, the ”*no wireless interface*” result indicates there is a WiFi adapter but it’s currently disabled.

              So when the next section of code attempts to generate a count the $WiFi.Count variable is NULL which causes the error.

              Error #2 happens because your script is looking for Event ID 27 to determine the boot type and there is no such event ID in my system logs, thus the query results are NULL which causes the error.

            • #2693193

              n0ads,

              For the first error msg I can’t find a cause with my machines.
              Can you try entering this code: netsh wlan show profiles
              and post a copy of the results.

              For the second error, I’m guessing you’re in the don’t turn your computer off camp?

              If so try increasing the MaxEvents value in the code below to 1000 vs 100.

                $GWEArgs =
                     @{ProviderName = 'Microsoft-Windows-Kernel-Boot'
                       MaxEvents    = 100
                       ErrorAction  = 'Stop'}
                $FilterID = "27"
              

              Still working on the Active window problem. It seems there is no direct way to fix this in PS??? At least according to my googling.

              Here’s what messing with code gets you. At one time this program would work on remote computers but I had so many problems with that that I made it local only. I just found a section of code at the end of the program that is a holdover from that. I tried to delete it but it generated all kinds of errors when I did…Go Figure.

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2693197

              For the first error msg I can’t find a cause with my machines.

              See my post immediately above yours.

              ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

              For the second error, I’m guessing you’re in the don’t turn your computer off camp?

              I always turn my PC OFF ever night before I go to bed and ON when I first get up.

              I also occasionally reboot it during the day for various reasons, like applying a program update or registry change that requires a reboot.

              ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

              try increasing the MaxEvents value in the code below to 1000 vs 100.

              Ran the code from Powershell ISE and when from 1000 to 10000 to 100000 and and still get the following error which would result in a NULL value for the $Events variable.

              Get-WinEvent : No events were found that match the specified selection criteria.
              At line:7 char:15
              + $Events = Get-WinEvent @GWEArgs
              + ~~~~~~~~~~~~~~~~~~~~~
              + CategoryInfo : ObjectNotFound: (:) [Get-WinEvent], Exception
              + FullyQualifiedErrorId : NoMatchingEventsFound,Microsoft.PowerShell.Commands.GetWinEventCommand

              After a Google search, I think the problem is Event ID 27 isn’t really the correct ID for determining the boot type (at least on my system.)

              ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

              Still working on the Active window problem. It seems there is no direct way to fix this in PS??? At least according to my googling.

              I hear ya.

              I tried various different powershell solutions that are “suppose” to allow you to set the focus to an open window, including detecting/using it’s handle ID, but none of them worked!

              I can tell you it’s somehow related to the code used to display the Progress Bar window because, if you disable the code that displays it, the main window IS in focus when it displays.

              I even tried leaving the Progress Bar window open and displaying the main window on top of it but that didn’t work either.

            • #2693250

              n0ads,

              Been doing a lot of refactoring to get rid of the problems…I Hope. I’ll post a new version soon.

              After a Google search, I think the problem is Event ID 27 isn’t really the correct ID for determining the boot type (at least on my system.)

              I ran the code interactively and it returned this on my machine.

                 ProviderName: Microsoft-Windows-Kernel-Boot
              
              TimeCreated                      Id LevelDisplayName Message                   
              -----------                      -- ---------------- -------                   
              8/4/2024 2:44:32 PM              27 Information      The boot type was 0x0.    
              

              Pretty much what I was after. It also co-insides with my last reboot.

              Here’s a couple of the latest screen captures:
              Secure Boot Enabled:
              zzzSecureBootEnabled
              Secure Boot Disabled:
              xxxSecureBootDisabled
              Wi-Fi Enabled:
              WI-FIEnabled

              I’m still checking your previous posts to make sure I don’t miss anything, that I can fix…LOL

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2693379

              I ran the code interactively and it returned this on my machine.

                 ProviderName: Microsoft-Windows-Kernel-Boot
              
              TimeCreated                      Id LevelDisplayName Message                   
              -----------                      -- ---------------- -------                   
              8/4/2024 2:44:32 PM              27 Information      The boot type was 0x0.

              Pretty much what I was after. It also co-insides with my last reboot.

              I dug into this error a bit more and discovered that Event 27 does exist on my system by using the following Get-WinEvent command.

              (Get-WinEvent -ListProvider Microsoft-Windows-Kernel-Boot).Events | Where-Object {$_.id -like "27"} | Select-Object -First 1

              Which returned the following result:

              Id          : 27
              Version     : 0
              LogLink     : System.Diagnostics.Eventing.Reader.EventLogLink
              Level       : System.Diagnostics.Eventing.Reader.EventLevel
              Opcode      : System.Diagnostics.Eventing.Reader.EventOpcode
              Task        : System.Diagnostics.Eventing.Reader.EventTask
              Keywords    : {}
              Template    : <template xmlns="http://schemas.microsoft.com/win/2004/08/events">
                              <data name="BootType" inType="win:UInt32" outType="win:HexInt32"/>
                            </template>
              
              Description : The boot type was %1.

              Since the code in your script can’t find this event on my system, there must be some sort of issue with how it’s configured that PS 5.1 just doesn’t like.

            • #2694827

              n0ads,

              Sorry for the long delay w/o a response. I’ve been tied up with some health issues, fixing a recalcitrant HP laptop for a friend, and seriously refactoring the code.

              The new code is now posted at the original line it’s version 06.60.00.

              Give it a shot when you get the time.

              Thanks!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2695299

              The Boot Keys Compromised label is working as it should again (i.e. it does not display with Secure Boot disabled.)

              The -ActiveDrivesOnly option works (although I’ve modified my “personal” copy of your script so it’s always true!)

              I’m still getting the same $Events[0].ID -eq 27 NullArray error because the Get-WinEvent function returns a No events were found that match the specified selection criteria error (even when run manually from Powershell ISE!)

              Not sure why that’s happening as the Microsoft-Windows-Kernel-Boot event log the Get-WinEvent function looks at is enabled and configured for ”EnableLevel”=dword:00000000 (i.e. log everything) in the registry!?!?

              Kernel-Boot_Event

            • #2695400

              n0ads,

              I’ve posted version 6.60.02. I think this one may take care of the -27 problem or at least not generate an error. It’s at the same link above.

              I can’t thank you enough for sticking with me through this.
              It would be really nice to have a testing lab with various different configurations, but alas my name isn’t Gates or Jobs!

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

            • #2695499

              Ran with no errors!

              2 users thanked author for this post.
            • #2695837

              Ok, I found another issue that’s related to the change you made to eliminate the $Events[0].ID -eq 27 NullArray error I was getting.

              The General tab in the Windows OS section shows the following for Last Boot and Up Time.

              General-Unmodified

              That’s highly misleading as the actual problem isn’t that I didn’t run the script as Administrator, I did, it’s the fact my Microsoft-Windows-Kernel-Boot event log is empty!

              I dug into your code and the result you posted above from your Microsoft-Windows-Kernel-Boot event log and “assume” the result would have been something like this if my log weren’t empty.

              Time Zone  GMT -4 Daylight savings time.
              Last Boot  08/11/24 09:22 The boot type was Cold boot from full shutdown.
              Up Time    12:17
              Compacted  False

              Since it wasn’t and my Googling of the empty Microsoft-Windows-Kernel-Boot event log problem indicated I’m not the only Windows 10/11 user who’s encountered that issue (and the only fix seems to be a CLEAN install of Windows), I propose you make the following code change to your script.

              Use (Get-CimInstance win32_Operatingsystem).lastbootuptime to calculate the Last Boot and Up Time values and set the Boot Type as a completely separate value.

              Here’s the modification needed to your existing code to do this.

              Change

                $LocalDateTime  = $CurOS.LocalDateTime
              
                $GWEArgs =
                     @{ProviderName = 'Microsoft-Windows-Kernel-Boot'
                       MaxEvents    = 100
                       ErrorAction  = 'Stop'}
                $FilterID = "27"
              
                Try {
              
                  $Events = Get-WinEvent @GWEArgs
                  $Events = $Events |
                     Where-Object {$_.id -like "$FilterID"} |
                     Select-Object -First 1
              
              #If next stmt errors increase MaxEvents above!
                  $LastBootupTime = $Events.TimeCreated
              
                  $PreUpTime =  $LocalDateTime - $LastBootupTime
                  If ($PreUptime.Days -gt 0) {
                    $UpTime = "{00:dd} Day(s) {00:hh}:{00:mm}" -f $PreUptime
                  }
                  Else {
                    $UpTime = "{00:hh}:{00:mm}" -f $PreUptime
                  }
              
                  $LastBootStr =
                   (Get-Date ($Events.TimeCreated) -format $LocalDTFmt) + " " +
                   (Get-Date ($Events.TimeCreated) -format $LocalTMFmt)
              
                  If ($Events.ID -eq 27) {
                    $BootType = @("Cold boot from full shutdown",
                                  "hybrid boot (fast startup)",
                                  "Resume from hibernation")
                    $BTIndex = $Events.Message.Substring(20,1)
                    $LastBootStr +=  " " + $BootType[$($BTIndex)]
                  }
              
                } #End Try
              
                Catch {
                       $UpTime      = "Requires Administrative Access"
                       $LastBootStr = "Requires Administrative Access"
                }

              To

                $LocalDateTime  = $CurOS.LocalDateTime
              
                $LastBootupTime = (Get-CimInstance win32_Operatingsystem).lastbootuptime
              
                $PreUpTime = $LocalDateTime - $LastBootupTime
                If ($PreUptime.Days -gt 0) {
                  $UpTime = "{00:dd} Day(s) {00:hh}:{00:mm}" -f $PreUptime
                }
                Else {
                  $UpTime = "{00:hh}:{00:mm}" -f $PreUptime
                }
              
                  $LastBootStr =
                   (Get-Date ($Events.TimeCreated) -format $LocalDTFmt) + " " +
                   (Get-Date ($Events.TimeCreated) -format $LocalTMFmt)
              
                Try {
              
                  $Events = Get-WinEvent @GWEArgs
                  $Events = $Events |
                     Where-Object {$_.id -like "$FilterID"} |
                     Select-Object -First 1
              
                  #If next stmt errors increase MaxEvents above!
              
                  If ($Events.ID -eq 27) {
                    $BootType = @("Cold boot from full shutdown",
                                  "hybrid boot (fast startup)",
                                  "Resume from hibernation")
                    $BTIndex = $Events.Message.Substring(20,1)
                    $BootType = $BootType[$($BTIndex)]
                  }
              
                } #End Try
              
                Catch {
                       $BootType = "Unknown"
                }

              Change

                $WINDict.Add('   Last Boot',"$LastBootStr")
                $WINDict.Add('   Up Time',$UpTime)

              To

                $WINDict.Add('   Last Boot',"$LastBootStr")
                $WINDict.Add('   Boot Type',$BootType)
                $WINDict.Add('   Up Time',$UpTime)

              I did this to my copy of your script and here’s what the Windows OS section now shows.

              General-Modified

              BTW, I’ve been looking for another way to determine the Boot Type when the Microsoft-Windows-Kernel-Boot event log is empty but, so far, haven’t found one that can do more than simply indicate whether it was a Cold Boot or a Warm Boot.

            • #2695868

              I think that all this discussion of the PowerShell script is interesting, but if you haven’t noticed – you have hijacked most of this topic.

              Please create a new post and take the discussion there and terminate this discussion in this thread.

              1 user thanked author for this post.
              b
            • #2696026

              JC,

              You are correct! It started as relevant to the thread but took a fork. I’ll start a new thread and post the link here.

              May the Forces of good computing be with you!

              RG

              PowerShell & VBA Rule!
              Computer Specs

    • #2692066

      Susan,

      On our monitoring software, some of the devices we tested were coming back showing BitLocker is enabled but with no key. When I run the command manage-bde -status c: I get the following output:

      Volume C: [OS]
      [OS Volume]

      Size: 475.36 GB
      BitLocker Version: 2.0
      Conversion Status: Used Space Only Encrypted
      Percentage Encrypted: 100.0%
      Encryption Method: XTS-AES 128
      Protection Status: Protection Off
      Lock Status: Unlocked
      Identification Field: Unknown
      Key Protectors: None Found

      When I check the BitLocker management utility on these units, it says that BitLocker is not enabled  (Turn on BitLocker is displayed)

      Are these devices at risk for the issues with this round of patching?

       

      • #2692922

        No; you can’t be asked for a Recovery Key if it’s never had one.

        • #2692951

          The output that @PatchingAgain received from manage-bde -status c: seems confusing:

          Percentage Encrypted: 100.0%
          Encryption Method: XTS-AES 128
          Protection Status: Protection Off
          Lock Status: Unlocked

          How does one interpret this? It seems to be saying that the whole drive is encrypted with XTS-AES-128, but at the same time that BitLocker protection is off and the drive is unlocked?

           

          • #2692955

            That’s what it looks like when automatic Device Encryption is on, but an administrator has not yet signed into Windows with a Microsoft account. It’s ready but not yet protected with a hidden key, and Recovery Key stored in a Microsoft account. (Unlocked really just means you’re currently using it.)

            1 user thanked author for this post.
        • #2693396

          No; you can’t be asked for a Recovery Key if it’s never had one.

          That is an interesting assertion.  It implies that Windows has a way of knowing whether a recovery key has ever been generated.  Is there away that a user, like myself, can find out whether a recovery key has ever been generated for a system?

          I have explained my situation in #2692135. I’ve reviewed all the notes that I made during the installation and configuration of my Windows 10 Pro system and at no point was I told that a recovery key had been generated and was I asked where I wanted it to be stored.

          Currently, I have not installed KB5040427 (2024-07 CU for Windows 10 Pro 22H2).

    • #2692058

      OK, even though I am confident Bit Locker is NOT turned on, I think I shall pass on this update – UNLESS you think there is something in this update for Win 10 22h2 that is critical not to miss now rather than waiting on an improved August update.

      BitLocker is turned off on my Win10 Pro 22/H2, but I set the machine up with a local account so have no idea if I even have a relevant MS account, nor where to find it if needed. I’m also minded to skip this month’s update.

      Win10 22H2 Pro, MBAM Premium, Firefox, OpenOffice, Sumatra PDF.
      • #2692923

        Updated ok

        Win10 22H2 Pro, MBAM Premium, Firefox, OpenOffice, Sumatra PDF.
        1 user thanked author for this post.
        • #2695259

          TonyS – Was Encryption On or Off and BitLocker On or Off before you did the Windows Update, which was ok.  By ok, do you mean that you were not asked to enter the BitLocker Recovery Key?  Thank you.

    • #2692018

      There is no doubt forcing BitLocker on is a GIANT misstep by Microsoft. No warnings, notices, explanations.

      There is also this: if you have multiple computers with BitLocker turned on AND you changed your device’s name {aka Computer name} so as you can readily identify it in the list of BitLocker devices via your Microsoft account, GOOD LUCK.

      The list contains the generic name assigned when the computer was “born” by the manufacturer and NOT the name you changed it to! In other words, Microsoft is not updating the name change for the BitLocker device.

      I ran into this for a customer’s account. I needed the Bitlocker key turned off to access the drive via USB, signed into their Microsoft Account and saw 6 different GENERIC computer names! None matched the name of the computer I was working on. I had to paste the key of each computer listed to get the right one {fifth one of six was the one}.

      This can certainly confuse a non technical person. It is a minefield just getting to the BitLocker area in a Microsoft account then trying to find your computer in the list that may appear.

      I feel that when doing an initial setupof a windows computer, BitLocker should be explained as to what it is, ask to turn it on or not and divulge it uses a 48 numeric character set to access it and HOW to find it to save it somewhere.

      I would have no problem believing a turned on BitLocker key would be a thorn in the side in many a repair shop’s business. Think of a call to a customer asking for their BitLocker key would entail.

      Microsoft needs to do a {much} better job with BitLocker integration.

      5 users thanked author for this post.
      • #2692537

        There is also this: if you have multiple computers with BitLocker turned on AND you changed your device’s name {aka Computer name} so as you can readily identify it in the list of BitLocker devices via your Microsoft account, GOOD LUCK.

        The list contains the generic name assigned when the computer was “born” by the manufacturer and NOT the name you changed it to! In other words, Microsoft is not updating the name change for the BitLocker device.

        It may depend on WHEN the computer name was changed, as I have three Bitlocker keys for different computers stored at https://account.microsoft.com/devices/recoverykey and each one has recorded against it my choice of computer name.

        I ran into this for a customer’s account. I needed the Bitlocker key turned off to access the drive via USB, signed into their Microsoft Account and saw 6 different GENERIC computer names! None matched the name of the computer I was working on. I had to paste the key of each computer listed to get the right one {fifth one of six was the one}.

        This can certainly confuse a non technical person. It is a minefield just getting to the BitLocker area in a Microsoft account then trying to find your computer in the list that may appear.

        When a Bitlocker recovery key is requested, a recovery key ID is supplied:

        Bitlocker-Recovery-Key-ID

        The recovery key ID (just first eight characters) is listed for each recovery key stored in a Microsoft account:

        Bitlocker-recovery-keys-in-MS-account-with-Key-IDs

        (These aren’t my devices, which have more meaningful names)

        It should always be possible to find the correct recovery key without trial and error.

    • #2692029

      This is a bit hard to understand with all the various terms but if Bitlocker is disabled (off) everything will update as normal on Win 10 pro and this will not be something to worry about?

       

      1 user thanked author for this post.
      • #2692454

        Jim, I have Bitlocker installed on my HP Home computer (came with it).  I have Bitlocker Disabled (turned off).  I am on Win 10, 22H2. The updates installed without  issue with Bitlocker disabled.  Updates did not turn Bitlocker on nor was I prompted to disable it.  No issues with monthly updates.  If Bitlocker is turned on for others…it might pose a problem but I keep mine turned off.  I do have my Bitlocker keys in a safe place in case it ever accidently gets turned on.   Hope this helps answer your question about installing July’s updates with Bitlocker “disabled”, “turned off”.

        2 users thanked author for this post.
        • #2692467

          When you say “HP Home” and “Win 10, 22H2,” which edition of Win10 do you have: Home or Pro? From what you further describe it sounds like Win 10 Pro 22H2.

          • #2692494

            Anonymous:  I have HP “Home Edition”, running Win 10 22H2 version.

            • #2692698

              I have HP “Home Edition”

              Oh Okay. Never heard of it.

            • #2692964

              My laptop is a Dell Windows 10 Home, currently 22H2. a very common version of Windows. My desktop is Windows 10 Pro; I have Group Policy on that. BitLocker is not installed on Windows 10 Home.

        • #2692691

          It does help a great deal, thank you very much for answering. Since I have never turned it on I assume I am safe then. 😊

    • #2692135

      I have set up my Win10 22H2 Pro system using a local account. That is, I do not access my system by logging on to a Microsoft account. Does anyone know whether a system set up with a local account is immune from the potential BitLocker problem?

      BTW, on my system, Control Panel > All Control Panel Items > BitLocker Drive Encryption tells me that BitLocker is off on both my drives.

      Second BTW. I logged into my Microsoft account using the link https://account.microsoft.com/devices/recoverykey and was told: “You don’t have any BitLocker recovery keys uploaded to your Microsoft account.”.  I don’t recall ever being informed that I have BitLocker recovery keys when I installed and configured my system.  So, if they do exist, I wouldn’t have the faintest idea where they are.  So, I ask the question again.  Is my system immune from the potential BitLocker problem?

      2 users thanked author for this post.
    • #2692152

      I updated 1 computer so far. BitLocker shows off in manage. All went fine as far as I can see so far. W10 22H2. MSRT, KB 5041019 .NET, KB 5040427 Cum. 22H2. 19045.4651

      Don't take yourself so seriously, no one else does 🙂
      All W10 Pro at 22H2,(2 Desktops, 1 Laptop).

      2 users thanked author for this post.
      • #2692186

        2nd computer same as 1st, no problems so far ( fingers crossed )

        Don't take yourself so seriously, no one else does 🙂
        All W10 Pro at 22H2,(2 Desktops, 1 Laptop).

    • #2692156

      BitLocker has absolutely no business being automatically enabled on consumer PC’s, or even business PC’s in my opinion. We don’t use it at my office because it’s more trouble than it’s worth. Super easy to bypass for someone with a moderate amount of skill, a pain for ordinary users when they encounter a problem.

      2 users thanked author for this post.
      • #2693469

        Super easy to bypass for someone with a moderate amount of skill,

        Please explain how Bitlocker is super easy to bypass.

    • #2692202

      I went to settings, searched for bitlocker, clicked on manage bitlocker: 3 Win10 Pro’s didn’t have bitlocker enabled but the Win11 Pro did so I disabled it.

      Someone asked if it was safe to patch if bitlocker is disabled. I’ll wait to see if there’s an answer and if not will skip this month.

      Patching shouldn’t be this difficult.

      • #2692205

        Windows Updates are cumulative. What’s in this month’s update will also be in next month’s update.
        Are you using an MS ID in the computer that was encrypted? If so, visit your MS account and locate the encryption key. Record it and put it in a safe place locally (in case you can’t access the online ID).

        1 user thanked author for this post.
        • #2692376

          Windows Updates are cumulative. What’s in this month’s update will also be in next month’s update.

          Surely, this cannot be correct when there is a major problem in an update?

          As I stated in #2692135, I don’t have any recovery keys for my Windows 10 22H2 Pro system. So, if I install KB5040427 (the 2024-07 CU) and encounter the BitLocker problem, yes, I can restore my system from a system image. However, if what you say is true, I’m never going to be able to install another Windows update again because I will always encounter the same problem!

          In the KB article for KB5040427, Microsoft do state, “We are investigating the issue and will provide an update when more information is available.”.  I am assuming therefore that, at some point, the issue will be corrected in KB5040427, and hence in subsequent updates. I’m minded to wait until that happens unless someone can reassure me that my system is immune from the BitLocker problem.

          1 user thanked author for this post.
      • #2692207

        Window 11 Pro MS Account. Last evening located and turned off Bitlocker, down loaded and installed 3 available updates via WuMgr then sat back fingers crossed. Relatively quick with no problems or surprises. Breathed easy as I do every month after my tip toe through MUM (Microsoft Update Minefield).

        PS  I have the Bitlocker Key off the computer in a couple of places just in case. I trust Ask Woody and Susan:  MS et al?  Not so much.

        2 users thanked author for this post.
      • #2692457

        Mr Toad28

        I have HP Home, running Win 10 22H2.  My laptop came with Bitlocker installed. I keep it turned off…disabled. July updates installed without incident with Bitlocker disabled.  The updates did not affect Bitlocker status on my laptop.

        2 users thanked author for this post.
    • #2692209

      July Updates went well.

      2024-07 Cumulative Update for Windows 11 Version 23H2 for x64-based Systems (KB5040442)

      2024-07 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 for x64 (KB5039895)

      Windows Malicious Software Removal Tool x64 – v5.126 (KB890830)

      Had 2 preview updates KB5040527, KB5041169 that I hid.

      Windows 11 Pro
      Version 23H2
      OS build 22631.5189

      2 users thanked author for this post.
      • #2692322

        Fernlady: What tool are you now using on Win 11 to hide updates. I ask because for years I’ve been using StopUpdatesNow + WUSHOWHide with great success on Win10 systems.

        But today for first time I did Win 11 Pro 23H2 update on new system, using same tools, and had s disaster, getting only

        2024-07 Cumulative update Preview for Windows 11 23H2 (KB5040527) despite hiding it; and not getting
        2024-07 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 for x64 (KB5039895)

        • #2692370

          I clicked on the x to close it and then paused updates and the previews disappeared.  I guess stating I “hid” it was wrong?

          Windows 11 Pro
          Version 23H2
          OS build 22631.5189

          1 user thanked author for this post.
          • #2692371

            Fernlady:
            I meant what tools are you using to do Windows updates since your update seemed to go so well, e.g., Wushowhide, WuMgr, Stopupdatesnow, or some combination?

            • #2692374

              When Susan gives the go ahead I type check for updates using the start menu then click on resume updates because updates are still paused.

              Windows 11 Pro
              Version 23H2
              OS build 22631.5189

      • #2695273

        fernlady – Was Encryption On or Off and BitLocker On or Off before you did the Windows Update?  When everything went ok, do you mean that you were not asked to enter the BitLocker Recovery Key?  Thank you.

        • #2695282

          Bitlocker was/is turned off.

          Windows 11 Pro
          Version 23H2
          OS build 22631.5189

    • #2692210

      Susan, thank you so much for this alert! Checking my new Win 11 Home 23H2 machine, just placed in service two weeks ago, I find that disk encryption was enabled by default, which is irritating.

      But I also find that the July updates were installed automatically during the initial boot-up process, with no apparent issues. So now I’m feeling relieved, and lucky!

      • #2692213

        Some OEMs are enabling Device Encryption automatically on new PCs. I ran into this with Dell and HP as much somewhere around 3-4 years ago.

        1 user thanked author for this post.
        • #2692219

          On my recently bought Asus ExpertBook Windows 11 Pro  Bitlocker was up and running. However I suspect MS. Now off thanks to advice on this site.

        • #2692225

          Mine is a Dell XPS.  Default disk encryption is the second unwelcome surprise from Dell.  The first was that the Dell file transfer app took all the locally-stored files from my old machine and – without asking me – transferred them to OneDrive cloud storage.  Live and learn.

    • #2692223

      I am going down a lot of rabbit holes here today for my 4 year old HP 12GB RAM 256 SSD Windows 10 Home.

      1. It says my PC meets system requirements.

      2. BUT when I go to Device Encryption Support it says- Reason for failed automatic device encryption: Hardware Security Test Interface failed and device is not Modern Standby, Un-allowed DMA capable bus/device(s) detected

      3. Then tried Binary Risk Intelligence per the article.

      Results: sha 256   PK Fail  Untrusted Certificate

      4. Then Swagger Editor Documentation was the TKO.

      What is the chance MS will offer me Windows 11 and/or encryption on this simple of a system and do I get to CHOOSE whether to install them.

      Please advise on the severity of any of these problems with my machine so that I can have it corrected by a professional if necessary. Thank you for all the solutions you provide.

      Another oddity was what MS sent me 2 weeks ago. I posted  “Upon starting my HP Desktop (4 year old machine) this morning I was offered an upgrade to Windows 10 N. I cannot find much info in the newsletters or forums. Susan Bradley replied that I should never have been offered that. Recently I purchased a iMac. Hoping that will be less stressful.

      Windows 10 Home. HP 12GB RAM 256GB SSD 4year old desktop.

    • #2692237

      I have windows 10 home 22h2. and when checking control panel there is no BitLocker.

      I don’t have a MS account and just a local account.

      When I look at my drives, none have a lock by them and nowhere does it state BitLocker is activated.

      There is something called BitLocker to go when I search the PC, however, I do not have it on my PC as active in anywhere I look for it.

      I presume that it is NOT activated in any way shape or form, correct?

      Win 10 Home 22H2

      • #2692321

        @Win7and10

        Here’s a quote from one of Susan’s posts regarding BitLocker/Device Encryption and Windows 10 Home. Please read it carefully and follow all instructions in it. This will help you determine if Device Encryption is available and whether or not it’s functioning and it will also tell you how to turn it off if you find it on:

        For Windows 10 Home check if Drive encryption is supported:

        To see if you can use Windows device encryption
        In the search box on the taskbar, type System Information, right-click System Information in the list of results, then select Run as administrator. Or you can select the Start button, and then under Windows Administrative Tools, select System Information.

        At the bottom of the System Information window, find Device Encryption Support. If the value says Meets prerequisites, then device encryption is available on your device.

        To turn off Windows device encryption
        Sign in to Windows with an administrator account.

        Select the Start button, then select Settings > Update & Security > Device encryption. If Device encryption doesn’t appear, it isn’t available.

        If device encryption is turned on, select Turn off.

        That quote is at the bottom of the first post (which is from Susan) of the following topic here on AskWoody:

        https://www.askwoody.com/forums/topic/6000012a-gui-instructions-to-disable-bitlocker/

        I hope this helps a bit.

      • #2692966

        My understanding is that Windows 10 Home Edition does not support BitLocker. I just checked online and according to MS, that is still the case.

    • #2692296

      Thank God I’m retired and no longer in the “Corporate World”. We had laptops that were so locked down corporate it was a nightmare every time we had an issue or tried to change a simple setting. The process was to enter an IT ticket. Usually a day or four later they will call you back. They would try to login to your laptop and fix the issue. Now, what happens when you can’t login and do work? And you can’t login, so IT can’t login to your system to fix it.

       

      I’m so glad I’m not in that world any more.

    • #2692297

      I have BitLocker on Windows 11 Pro disabled, but I have the recovery key on a USB stick.  I use a local account, but I still have the Microsoft account for XBox.

      Mark

       

    • #2692328

      In addition to updating Windows 10 on our computers we also downloaded and installed:

      • Updated Intel drivers using the Intel Driver Support Assistant app as well as
      • New NVIDIA graphic card drivers.
    • #2692337

      I was offered an upgrade to Windows 10 N.

      Windows 11N is a special EU version of Windows. This edition lacks Windows Media Player and other multimedia playback features

    • #2692646

      Susan –

      I’ve lost track of which Windows 10 update we should be on now.  Is it 22H2 or 23H2?

      Same question for Windows 11.

      If it is 23H2 – are there REG files available?

      Custom Build - Intel i5 9400 5 Core CPU & ASUS TUF Z390 Plus Motherboard
      Edition Windows 10 Home
      Version 22H2

      Dell Laptop - Inspiron 15 11th Generation Intel(R) Core(TM) i5-1135G7 Processor
      Edition Windows 11 Home
      Version 23H2

      • #2692900

        I’ve lost track of which Windows 10 update we should be on now. Is it 22H2 or 23H2?

        There is no Windows 10 23H2, the last version Microsoft will ever issue is 22H2.

        • #2692901

          Thanks

          Custom Build - Intel i5 9400 5 Core CPU & ASUS TUF Z390 Plus Motherboard
          Edition Windows 10 Home
          Version 22H2

          Dell Laptop - Inspiron 15 11th Generation Intel(R) Core(TM) i5-1135G7 Processor
          Edition Windows 11 Home
          Version 23H2

    • #2692759

      On my Windows 10 Home 22H2 PC device encryption is not available, but Secure Boot is turned on (by default; I didn’t turn it on!). Should I turn it off before updating? Many thanks, TSP

    • #2692793

      Should I turn it off before updating?

      No.
      Create a full image backup and update July updates.

      • #2692899

        Many thanks. I realised soon after posting that I should have to turn off Secure Boot in the bios, and I don’t want to start playing around with the bios at my age!

    • #2692850

      I updated and all was normal. No Bitlocker triggered.

      1 user thanked author for this post.
      • #2695275

        Jim – Was Encryption On or Off and BitLocker On or Off before you did the Windows Update?  When everything went ok, do you mean that you were not asked to enter the BitLocker Recovery Key?  Thank you.

    • #2692970

      Windows 10 Home Edition does not support BitLocker

      Some Windows 10 Home PCs come with Bitlocker enabled directly from OEM (Dell, HP..)
      Windows 10 Home support device encryption.

    • #2693033

      I got hit by this on a new build HP, I can’t remember the exact model but it was a brand new 15″ EliteBook. I was setting it up to deploy to a user and upon installing updates, I got a POST error, claiming that the Secure Boot keys had been tampered with and were reverted. Upon reboot, I was prompted for the BitLocker key.

    • #2693163

      Susan, are we supposed to install the latest Office 2019 updates (retail version) now?  Recently, you mentioned issues with the install of those updates and recommended that we wait until a fix.

    • #2693463

      Paused all PC’s till 9/9/24 after creating restore points. Too confusing. Will wait for clean update.

    • #2693474

      Is there away that a user, like myself, can find out whether a recovery key has ever been generated for a system?

      Yes: manage-bde -status at an admin command prompt.

      Look for Key Protectors (as well as encryption and protection).

      If you enabled it yourself, you would know where you saved the recovery key.

      If it was enabled automatically, the recovery would be in your Microsoft account.

      Check BitLocker Drive Encryption Status of Drive in Windows 11 (or 10)

      1 user thanked author for this post.
      • #2693614

        Many thanks for that. I’ve attached the screen output from both manage-bde -status and Get-BitLockerVolume | Format-List. From what I can make out, no recovery keys have ever been generated for either my C: drive or my D: drive. Are you able to confirm?

        When I installed my Windows 10 Pro system, my PC was not connected to the Internet. I connected it to the Internet only when it became necessary during configuration. And, even then, I have no record of logging on to my Microsoft account. So, if by some means BitLocker was enabled automatically on my drives, it is difficult to see how the recovery keys could have been stored in my Microsoft account.  In any case, I’ve already reported earlier in this thread that my Microsoft account does not contain any recovery keys.

        Am I as safe as I could ever could be in order to try to install KB5040427 (2024-07 CU for Windows 10 22H2)?

        manage-bde-status
        Get-BitLockerVolume

        • #2693621

          I do not see any attachment associated with your post.

          The way you attach a file:
          At the bottom below the the Entry Box, choose “Select File.”
          That will open Explorer on your PC. Highlight the file to attach and choose “Open”
          That uploads and attaches the file to your post.
          You will have an option in the attachment to insert the attachment in content. If you choose that, the attachment will be placed where your cursor is locaated in the content.

          1 user thanked author for this post.
    • #2695274

      In the first Susan Bradley article on this subject #2689954 (dated July 23, 2024):

      #2691368 Mike W (me) wrote:

      Windows 10 22H2 – Local Microsoft Account – Windows Updates paused until 8/13/24

      I am a general user without any PC technical knowledge or expertise.  I follow your instructions if they are easy and don’t require expert technical knowledge.

      Drive Encryption is ON.  I have the option to turn it OFF.

      BitLocker is ON.  I have the option to turn it OFF.

      I have my BitLocker Recovery Key

      Should I turn BitLocker OFF and/or turn Drive Encryption OFF (after Susan Bradley changes the DEFCON to ok to allow July Windows updates)?

      Is this a simple matter of just turning BitLocker OFF and/or Drive Encryption OFF to install the July Windows Updates?

      If I turn BitLocker OFF and/or Drive Encrypton OFF, will it be easy to turn them back ON after the July Windows updates are installed, without having to go through any challenging technical procedure to turn them back ON?

      I’m looking forward to the next Susan Bradley advice about this issue.

      Thank you for your help.

      #2691528 – Susan Bradley replied:

      If you know where your recovery key is, and you want bitlocker, I wouldn’t turn it off merely to install updates.  In my personal testing it has not triggered asking for the recovery key.

      #2692781 –  Mike W replied:

      I have my BitLocker Recovery Key from my Microsoft Account.  What method is used if I need to provide my BitLocker Recovery Key?  Will I simply be asked to type my 48-digit Recovery Key or is some other technical method used to provide the Recovery Key?

      #2692788 – Susan Bradley replied:

      Just manually type it in.

       

      CURRENT STATUS: As always, I will back up my data and create a System Image before installing Windows Updates.  I am going to be brave and follow Susan Bradley’s advice.  I am not going to turn Encryption Off and not turn BitLocker Off.  I am going to install the July Windows Update and hope that the BitLocker Recovery Screen does not appear.  If it appears, I will enter my BitLocker Recovery Key and hope that it works.

      In addition to following Susan Bardley’s advice, I am taking this approach because I do not want BitLocker to create a different BitLocker Recovery Key if I BitLocker is ever turned  back on again.

       

      QUESTION: Is there ANYONE who installed the July Windows Update with Encryption ON and BitLocker ON who did NOT get the BitLocker Recovery Screen?

      PKCano – You have helped me a lot on other issues.  What do you think about the approach that I will take based on Susan Bradley’s advice?

      1 user thanked author for this post.
      • #2695526

        There is not Local Microsoft account. You either use a Microsoft ID or a Local ID. They are not the same.

        I do not have a Microsoft ID. My Win10/11 installations have only a Local ID. So I cannot “finish setting up Bitlocker.” But none of my installations have Drive Encryption turned on either. I do not feel it is necessary considering my use case. So I won’t advise you on the case of encryption, or not.

        What I will recommend is, to follow Susan’s advice. She knows what she’s talking about.

        1 user thanked author for this post.
      • #2695565

        QUESTION: Is there ANYONE who installed the July Windows Update with Encryption ON and BitLocker ON who did NOT get the BitLocker Recovery Screen?

        Yes.

        1 user thanked author for this post.
      • #2695566

        I have several computers at the office and several here at home – all went through the July updates and did not ask for a bitlocker recovery key.

        Susan Bradley Patch Lady/Prudent patcher

        2 users thanked author for this post.
        • #2695847

          STATUS UPDATE

          Windows 10 Pro 22H2 / Drive Encryption is ON / BitLocker is ON

          I have my BitLocker Recovery Key

          I just installed the July Windows Updates and was not asked to provide the BitLocker Recovery Key.  That is a relief.

          Susan Bradley – Thank you for all your help to prepare for this event.

    • #2695840

      Worried about the Windows BitLocker recovery bug? [ZDNET]

      What are the chances you’ll encounter that bug, and what should you do to prepare?

      How widespread is this bug?

      Obviously, it doesn’t affect every machine that received the July 2024 security update. (If that were the case, the update would have been pulled immediately and it would have been front-page news.) It hasn’t occurred on any machine I’ve tested, and I haven’t heard from any readers affected by it. When I searched on Microsoft’s community forums, I didn’t find any reports related to this bug.

      On Reddit, I did find several network administrators reporting that this issue affected multiple machines in their organization. … It appears all the devices were HP or Lenovo laptops that were managed on corporate networks and received firmware updates as part of the July 2024 Patch Tuesday update release.

      But you can also trigger BitLocker recovery by upgrading critical early startup components, such as a BIOS or UEFI firmware upgrade, which is what I suspect happened here. Firmware upgrades are supposed to suspend BitLocker encryption while they’re installed, but it appears that this isn’t happening on the laptops in question.

      Should you turn encryption off?

      If you’re worried about the possibility that you’ll be locked out of your PC by a BitLocker failure, you can turn device encryption off by going to its page in Settings and sliding the Device Encryption page to the Off position.

      However, that’s an extreme solution to a problem that’s unlikely to affect you. If you’ve got a backup copy of your recovery key, you’re in no risk of losing data, and you’re fully protected from having your digital life turned upside down by a thief who steals your laptop and accesses your data files.

    Viewing 34 reply threads
    Reply To: MS-DEFCON 3: Secure Boot triggers recovery keys

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: