ISSUE 20.21.1 • 2023-05-23 By Susan Bradley Deploy May updates — and nothing but the updates. I’m lowering the MS-DEFCON level to 4 to encourage you t
[See the full post at: MS-DEFCON 4: Skip those Secure Boot scripts]
Susan Bradley Patch Lady
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
Home » Forums » Newsletter and Homepage topics » MS-DEFCON 4: Skip those Secure Boot scripts
ISSUE 20.21.1 • 2023-05-23 By Susan Bradley Deploy May updates — and nothing but the updates. I’m lowering the MS-DEFCON level to 4 to encourage you t
[See the full post at: MS-DEFCON 4: Skip those Secure Boot scripts]
Susan Bradley Patch Lady
On a new Win11 Pro machine, 22H2 , KB5012170 was apparently installed on Jan. 30, before the machine was delivered to me.
msinfo32 says:
BIOS Mode : UEFI
Secure Boot State: On
The following are present:
C:\Windows\WinSxS\amd64_microsoft-windows-s..boot-firmwareupdate_31bf3856ad364e35_10.0.22621.1702_none_948b3ff48131c4d8\SKUSiPolicy.P7b (159 kB)
C:\Windows\WinSxS\amd64_microsoft-windows-s..boot-firmwareupdate_31bf3856ad364e35_10.0.22621.1702_none_948b3ff48131c4d8\n\SKUSiPolicy.P7b (81 kB)
Does this mean the revocations have been applied? Am I better or worse off for that?
Do I assume updates here are acceptable, given that you said “We have repeatedly seen updates for Secure Boot to fix vulnerable boot-loader files.”
If rootkits are the problem, what is the best way of detecting them?
It is all very confusing.
Thanks.
I have similar issues as @cynicalsnail
After the update my msinfo32 says:
BIOS Mode : UEFI
Secure Boot State: Off
I have a Custom Build – Intel i5 9400 5 Core CPU & ASUS TUF Z390 Plus Motherboard and don’t know the myinfo32 was before the current update.
Do I need to do anything to change the above? If so, how do I correct this?
Custom Build - Intel i5 9400 5 Core CPU & ASUS TUF Z390 Plus Motherboard
Edition Windows 10 Home
Version 22H2
OS build 19045.2965
ain’t broke: sure, but I do not actually know the full status of my machine.
I have read several articles – several times – and I do not understand very well any of it. There are simply too many options, all with inadequate explanations for those not immersed. What is needed is a plain English glossary for each of the terms and their options – with their implications. At the moment it is all blind trust. Having followed your advice for years, finding that it has all been pre-empted now is somewhat unsettling.
I did read the article and my msinfo32 doesn’t match what you say is safe. Does this my computer doesn’t support a secure boot? If not, is there anyway to make my PC safe without buying a new one?
Custom Build - Intel i5 9400 5 Core CPU & ASUS TUF Z390 Plus Motherboard
Edition Windows 10 Home
Version 22H2
OS build 19045.2965
… my msinfo32 doesn’t match what you say is safe. Does this my computer doesn’t support a secure boot? If not, is there anyway to make my PC safe without buying a new one?
Hi blueboy714:
According to your post # 2561265 when you open a Run dialog box (Windows key + R) and enter msinfo32 you see that “BIOS Mode” is UEFI and “Secure Boot State” is OFF.
When “BIOS Mode” is UEFI and “Secure Boot State” is OFF that means Secure Boot is either disabled or not available. My Dell Inspiron 5584 uses the UEFI platform and Secure Boot was disabled by default when it shipped from the factory (see image below), but secure boot can be enabled / disabled on my Dell laptop from the Secure Boot section of my BIOS settings (i.e., if I re-boot and tap the F2 key as soon as my Dell logo appears to enter my BIOS settings). You have an ASUS TUF Z390 motherboard so I believe that restarting your computer and tapping the F2 key during the POST test (i.e., before Windows is loaded) should also open the BIOS settings on your computer, but if you have problems see the ASUS support article [Notebook/Desktop/AIO] How to Enter the BIOS Configuration for an alternate method.
The KB5012170 Security Update for Secure Boot DBX mentioned by CynicalSnail in post # 2561260 was installed on my Win 10 Pro v22H2 OS by Windows Update during my August 2022 Patch Tuesday updates and did not cause any issues. However, note that BitLocker Disk Encryption (which is not available on your Win 10 Home v22H2 OS) is disabled on my Win 10 Pro machine, which means that I didn’t have to worry that installation of KB5012170 would disrupt my boot process and ask me to enter a BitLocker recovery key to proceed with the boot-up like it did for many Win 10 and Win 11 Pro users – see the 16-Aug-2022 BleepingComputer article Windows KB5012170 Update Causing BitLocker Recovery Screens, Boot Issues for more information. As far as I know, KB5012170 would not change whether Secure Boot was enabled / disabled on your computer – the release notes <here> only state that “This security update addresses the vulnerability by adding the signatures of the known vulnerable UEFI modules to the DBX” (where DXB is the Secure Boot Forbidden Signature Database). The three bootloader bypass vulnerabilities patched for Secure Boot by KB5012170 are listed at the bottom of those release notes.
————-
Dell Inspiron 5584 * 64-bit Win 10 Pro v22H2 build 19045.2965 * Firefox v113.0.1 * Microsoft Defender v4.18.2304.8-1.1.20300.3 * Malwarebytes Premium v4.5.29.268-1.0.2022-1.0.69620 * Macrium Reflect Free v8.0.7279 * Dell Inspiron 5583/5584 BIOS v1.22.1
In my opinion, the confusion is seen when people use msinfo32 and see that Secure Boot says ON, rather than Unsupported, and they think they need to do something to change to an Unsupported state.
I have bitlocker turned off, and in msinfo32 Secure Boot is ON, Windows 10 Pro 22H2.
If I understand the Microsoft article correctly, one has to type in commands in the command prompt to apply these revocations.
If I have read what Susan says correctly, install the May updates, don’t invoke a command prompt to apply revocations, and even if Secure Boot is ON, for the May Updates, things should be ok.
I updated this morning as per Susan. Along with whatever else I got, this popped up in the event viewer as a Warning. I don’t know which update contained it. There were two packages: Security Update for Microsoft Windows (KB 5026361) and Servicing Stack 10.0.19041.2905.
Forgot the question. Anyone know what this is and if it matters?
HP Pavilion Desktop TP01-0050 – 64 bit
Windows 10 Home Version 22H2
OS build 19045.2965
Windows Defender and Windows Firewall
Microsoft Office Home and Business 2019
-Version 2303(Build 16227.20258 C2R)
In my opinion, the confusion is seen when people use msinfo32 and see that Secure Boot says ON, rather than Unsupported, and they think they need to do something to change to an Unsupported state.
I have bitlocker turned off, and in msinfo32 Secure Boot is ON, Windows 10 Pro 22H2.
If I understand the Microsoft article correctly, one has to type in commands in the command prompt to apply these revocations.
If I have read what Susan says correctly, install the May updates, don’t invoke a command prompt to apply revocations, and even if Secure Boot is ON, for the May Updates, things should be ok.
BINGO!!!
I saw no instructions for what to do if Secure Boot is ON. That is what is/was unclear.
I think on your last proofread before posting Suan, you might want to drop down to your viewers knowledge level and point of view.
For that matter, I am not even sure when or how the scripts to be avoided are offered up???
For that matter, I am not even sure when or how the scripts to be avoided are offered up???
The scripts will install as part of patch Tuesday sometime in the future.
For now the scripts are to be run manually, if a user wants to run them.
Possible stupid question here.
I recently updated my wife’s laptop from Win8.1 to Win10 21H2. Now I want to do the feature update to 22H2. I use InControl and wumgr to control updates. So, I turned InControl off and in wumgr under “Upgrades” I see the feature update. Then I notice that it’s 106.59 GB in size.
Hmm. This laptop has a 128 GB SSD with the current Win10 install + software eating up about 32 GB. A 250-ish GB mSata SSD holds her stuff (currently about 70 GB used).
Is there an easy way to direct the 22H2 download to the larger SSD or an external HDD?
Thanks.
If your Win10 20H2 is up to date, the upgrade to 22H2 is simply the turning on of the Experience Pack, a very small download. The base for 21H2 and 22H2 are the same. The base is already there. The download will be quite small.
The size you are seeing in not correct (a complete clean install of Win10 wouldn’t be 106GB).
Microsoft has quietly posted “V2” Windows 11 22H2 ISO downloads with build 22621.1702 (KB5023672 update integrated) on the Windows 11 download page today May 23:
https://www.microsoft.com/software-download/windows11
instead of downloading something like “Win11_22H2_English_x64.iso” or “Win11_22H2_English_x64v1.iso”, it will recently download Win11_22H2_English_x64v2.iso.
gonna wait and see if patch lady Susan will recommend Win11 users whether to upgrade to the 22H2 version or not. MS will be releasing a 23H2 version (for Win11) sometime in the 2nd half of 2023
Compared to the posts and replies already in this thread, I have a very minor and not very important observation, and “gripe” I suppose.
With Patch Lady Defcon 4 blessing to go ahead and install May updates,
after installing the May 2023-05 KB5026361 Cumulative Update for Win10 64 bit version 22H2 – I found the Taskbar Search icon has grown to an unattractive size that I do not like. An internet search found a Microsoft answers topic with others complaining about the larger search icon, but no instructions or advice on how to restore the original smaller size icon. Do other AskWoody participants like the new larger size? And does anyone know how to restore the older smaller size without having to remove this current May 2023 update? I know about hiding the Windows Search completely by right clicking the Taskbar, and using other Search programs like voidtools Everything or NirSoft SearchMyFiles, but I like the smaller icon unobtrusively sitting down by the Start Menu, and I do not have a problem with Microsoft Windows Search, it works ok for me.
– Just wondering… constantly it seems… after Windows Updates… Sigh…
Windows 10 Search Icon suddenly increased in size on new install
I’ve already installed them to no ill effects. Note the red in my signature line.
YMMV
While we may simplify life for the time being by not running those manual scripts relating to Secure Boot, Microsoft will eventually force-feed them to us via Windows Updates. (Forced-fed, at any rate, to those who don’t use tools to control the monthly patches.)
Assuming I understand the situation correctly, this change will render unbootable any live CD or live USB drive that we may have been using for troubleshooting or experimental purposes. It will also render unbootable the rescue CDs from backup programs such as Macrium Reflect that we use when the boot drive fails and we need to restore an image from a backup to a replacement drive.
When the Secure Boot patch gets forced through, will we need to create new rescue media–and will that alone be sufficient, or will we need to get an up-to-date version of the backup software in order to create new rescue media?
Additions and clarifications are welcome!
Assuming I understand the situation correctly, this change will render unbootable any live CD or live USB drive that we may have been using for troubleshooting or experimental purposes. It will also render unbootable the rescue CDs from backup programs such as Macrium Reflect that we use when the boot drive fails and we need to restore an image from a backup to a replacement drive.
I’ve already installed them to no ill effects. Note the red in my signature line.
In my experience, you don’t understand the situation correctly.
As for booting other devices, I went into UEFI Settings and turned off Secure Boot (in my case, disabling the TPM) and booted TeraByte’s BootIt UEFI partitioning tool via USB without issue. I then rebooted, went back into UEFI Settings, re-enabled the TPM, and booted back into Windows.
When the Secure Boot patch gets forced through, will we need to create new rescue media–and will that alone be sufficient, or will we need to get an up-to-date version of the backup software in order to create new rescue media?
In my case, no, that is unnecessary. My boot USB’s work by disabling Secure Boot. Recreating boot media after running the scripts still requires disabling Secure Boot before they will boot. Susan advises that the scripts not be run. Microsoft advises that the scripts will be run by Windows Update in the coming months.
In either case, my red signature line still applys.
Assuming I understand the situation correctly, this change will render unbootable any live CD or live USB drive that we may have been using for troubleshooting or experimental purposes. It will also render unbootable the rescue CDs from backup programs such as Macrium Reflect that we use when the boot drive fails and we need to restore an image from a backup to a replacement drive.
To my knowledge your fears are not necessary. I myself have used from the beginning activated SecuredBoot and the Uefi startpartition(s). All the boot_dvd’s and usb_thumbdrives work just fine with Macrium Reflect and Acronis and O&O AOmei EaseUS diskimagingsoftware. Booting is done by using the keycombinastion to call for the PC’s BootMenu. So restoring Windows and Linux-Mint works just fine. Mind you to check it all before to rely on it.
To my knowledge, work and relations in computer security the SecuredBoot and UefiBoot are essential for security. That’s why this hardly traceable malware installed/implemented by using these stolen ∅Day’s is *such a big deal*
My boot USB’s work by disabling Secure Boot. Recreating boot media after running the scripts still requires disabling Secure Boot before they will boot.
So the bottom line is that the old boot media will still work, but if we use such media (whether old or new), we will have to add the steps of first turning off Secure Boot, then turning it back on. Is that right?
New question: After Microsoft force-feeds these scripts onto customers’ PCs, will it be possible for us to simply do without Secure Boot? That would be one way to simplify matters.
So the bottom line is that the old boot media will still work, but if we use such media (whether old or new), we will have to add the steps of first turning off Secure Boot, then turning it back on. Is that right?
In my experience, yes it is.
New question: After Microsoft force-feeds these scripts onto customers’ PCs, will it be possible for us to simply do without Secure Boot? That would be one way to simplify matters.
Susan advises that Secure Boot isn’t particularly necessary for consumers, however, I prefer to use it. I use TeraByte’s Image For Windows, and I am unfamiliar with any other drive imaging software. Image For Windows has a utility for incorporating it into the Windows Recovery Environment. Then just go to Settings > Windows Update > Advanced options > Recovery > Advanced startup > Restart now, and the Recovery Environment, including Image For Windows, boots without issue, no finagling with settings in UEFI. That’s my preferred method.
I have the USB recovery media (also created with IFW’s utility) in the event of Windows getting pooched and not allowing Advanced startup, or of drive failure, which could include one’s Windows Recovery Environment if it’s located in the standard Windows position, a small partition after the Windows partition. I have mine on a separate SSD in its own 1GB partition, but I’m also a belt and suspenders kind of guy.
I’m also a belt and suspenders kind of guy.
“but I’m also a belt and suspenders kind of guy” is a lovely parable. Meaning probably that you do not wash the trousers and dispensers too warm either, for the penalty will be you will lose their functionality to be useful in the greater sense. In computerterms this means equally than that losing functionality is noticeable for the common user?, And if so: what does this mean?
“belt and suspenders” is a common idiom:
https://duckduckgo.com/?t=ffab&q=belt+and+suspenders+meaning&ia=definition
“belt and suspenders” is a common idiom:
“: involving or employing multiple methods or procedures to achieve a desired result especially out of caution or fear of failure”
In computerterms this means equally than that losing functionality is noticeable for the common user?, And if so: what does this mean?
For me, “belt and suspenders” means having the capabilities to overcome any computer malfunction, whether software or hardware. In the mid ’00’s I had a hard hardware failure, to the extent that my desktop would not boot at all, not even the BIOS splash screen. The red “power on” light would light, but the screen remained black. There was no accompanying beep code, so I assumed that the motherboard might be OK, but there could be a severe internal peripheral hardware failure. The desktop had four HDD’s on PATA connections and dual booted Windows 2K Pro.
I powered down, opened the case and unplugged the PATA cable from the top HDD (not HDD0, just the top drive in the case), then powered on; same red light and black screen. I powered down, reconnected that HDD, and unplugged the second, then powered on; same red light and black screen. Same procedure with the third HDD, and I got the red light and the BIOS splash screen. The third HDD was HDD0, and that was where bootmgr was located.
That told me that HDD0 (the third HDD in top-down mounting order) was the likely culprit. I had a spare HDD of the same size on hand (all four drives were the same size and manufacturer), so I removed HDD0 and replaced it with my spare, with a mental note to order a new spare. Then I booted into my BootIT NG USB drive (my earliest connection to TeraByte’s imaging software) and got my HDD0 drive image DVD’s ready (I had previously formatted the spare drive). I restored HDD0 to the spare drive. After the restore, I rebooted, removing the USB drive, and booted into Windows 2K Pro, as if nothing had happened.
Another anecdote I’ve told here a number of times, two of my PC’s died in a house fire in January 2011, but their contents were safely tucked away in drive images on offline HDD’s, and I only lost the hardware. The Windows 11 Pro I’m currently dual booting is an upgrade over an upgrade over an upgrade … of Windows 7 Pro from early 2010.
I have spare drives; I have full-drive drive images going back a couple of months on offline HDD’s. As for “noticeable for the common user”, yes, noticeable. The usual trope is “Windows has to be clean-installed about once per year to get it back up to speed.” A dedicated routine maintenance regimen keeps Windows performance from degrading. Without that maintenance regimen, “losing functionality is noticeable for the common user.”
That’s my version of belt and suspenders.
I build all of our home computers. We currently have three and the motherboards are from three different manufacturers. When Microsoft announced that Secure Boot would be a requirement for Windows 11, all three of the manufacturers shipped motherboards with Secure Boot in the ON state. I was running Windows 10 at the time so this was irrelevant. I upgraded one PC to Windows 11 just to see how it worked and what the interface was like. It worked well so the other two were upgraded as well. If you are running Windows 10 (the recommendation of this website) there are no issues for you whether it is on or off. If you are running Windows 11 it will be on.
Of more interest to me is the ‘Local Security Protection’ bug that was introduced a couple of months ago with one of the Windows Defender updates. On bulletin from Microsoft said don’t do anything, that it will be patched at some future date. I guess that future date has been extended further as I’ve just done the May updates and it’s still there. All three of our PCs had this turned on and all three show the warning.
What danger am I in?
Very little; clicking on a bogus link, visiting a maliciously coded web page, etc. In other words, safe surfing and prudent examination of emailed links will likely keep you safe. There’s no need to turn off Secure Boot.
Windows 10 doesn’t get the same update treatment as Windows 11.
I have Windows 10 22H2 and secure boot is on with UEFI bios mode. I have so far blocked the update KB 4012170 and the May updates. My question is, when MS decides to trigger the forced script installs that messes with the bios. If I have the setting in my bios refering to UEFI capsule updates disabled will that stop the updated scripts from running? And would that impact my original install media created in 2017? If I created new install media will it not install if I do not have these forced updates in my bios?
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.