Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

PowerShell scripts to check the UEFI KEK, DB and DBX Secure Boot variables.

NotificationsYou must be signed in to change notification settings

cjee21/Check-UEFISecureBootVariables

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PowerShell scripts to check the UEFI KEK, DB and DBX Secure Boot variables.

Important

The DBX checking in this script is made for x64 and arm64 systems. If you are using an x86 or arm system, it is necessary to replace the*.bin files with ones for your system architecture and edit their filenames in the PowerShell script (Check UEFI KEK, DB and DBX.ps1) accordingly. The*.bin files for various architectures can be obtained fromgithub.com/microsoft/secureboot_objects.

Checking the KEK, DB and DBX variables

Right-clickCheck UEFI KEK, DB and DBX.cmd andRun as administrator.

Example output:

Screenshot

Note

This script only checks for known Microsoft certificates in the KEK and DB and will not show any other certificates even if they are present. To view all certificates that are present, seeViewing all the UEFI Secure Boot variables below.

Re-applying the Secure Boot DBX updates

If the Secure Boot variables were accidentally reset to default in the UEFI/BIOS settings for example, it is possible to make Windows re-apply the DBX updates that Windows had previously applied. Double-clickApply DBX update (restart required).reg and add the changes to the registry then restart Windows and wait for awhile. The DBX updates should be applied after that.

Deploying Windows UEFI CA 2023 certificate to Secure Boot Allowed Signature Database (DB)

Windows February 13, 2024 cumulative update includes the ability to apply the Windows UEFI CA 2023 certificate to UEFI Secure Boot Allowed Signature Database (DB). To do so, double-clickApply DB update (restart required).reg and add the changes to the registry then restart Windows and wait for awhile. The DB updates should be applied after that. For more information, refer toKB5036210 andEvolving the Secure Boot Ecosystem.

Viewing Secure Boot DB and DBX variable update events

Double-clickShow Secure Boot update events.cmd to display all the Secure Boot DB and DBX variable update events. Refer toKB5016061 for details on interpreting the events.

Viewing all the UEFI Secure Boot variables

To display all the UEFI Secure Boot variables in readable format, right-clickShow UEFI PK, KEK, DB and DBX.cmd andRun as administrator. All certificates in the PK, KEK and DB variables as well as all hashes in the DBX variable will be displayed.

References

Contributors2

  •  
  •  

[8]ページ先頭

©2009-2025 Movatter.jp