- #DISABLE SECURE BOOT WINDOWS 10 SURFACE UPDATE#
- #DISABLE SECURE BOOT WINDOWS 10 SURFACE PRO#
- #DISABLE SECURE BOOT WINDOWS 10 SURFACE CODE#
Part of the reason why I think it has something to do with Office 365 is because I saw one of our manager's home PCs in the list - he had installed Office onto and hence there was a listing.
#DISABLE SECURE BOOT WINDOWS 10 SURFACE UPDATE#
From there I found the laptop that was BitLocker locked and found the key I needed to enter (it's like 42 digits long so make sure to type it in correctly).Īt a guess Microsoft enabled encryption with either a Windows update or because we were using Office365 (either for Office itself or for Email "Office 365 Essentials license") and perhaps that is were it enables the encryption as part of some security requirement. From there I start clicking on links until I had the window that showed company devices (all of which I did not add).
I logged in to MS Azure using my company admin MS account. I have to say that you need to look for your Microsoft Azure account (use your Microsoft account if you are your company's admin), EVEN if you don't use Azure. The tech that came to replace the board was definitely not interested in helping and just wanted to get out of the job (pretty poor if you ask me), but I knew I did not activate BitLocker encryption. Just had this happen to me when I had a motherboard replaced on a Sales 7285 laptop.
#DISABLE SECURE BOOT WINDOWS 10 SURFACE PRO#
THE DIFFERENCE BETWEEN YOUR SITUATION AND MINE IS THAT MY COMPUTER WAS HOME VERSION OF WINDOWS, MOST IF NOT ALL SURFACE ARE PRO VERSION AND HAVE BITLOCKER BUILT IN, SO YOU SHOULD NOT HAVE MUCH TROUBLE GETTING INTO YOURS, MINE ACTUALLY HAD BECOME UNBOOTABLE DURING A WINDOWS UPDATE, WHICH THE STEPS AFTER THAT THAT I TOOK TO GET IT GOING AGAIN, IS MOST LIKELY WHAT CAUSED THE MAJORITY OF MY ISSUES, SINCE I DID NOT KNOW BITLOCKER WAS ON MY SYSTEM, FOUND IT LATER THAT HOME VERSION DOES NOT EVEN SUPPORT IT TO BEGIN WITH.įOR ME THAT SO CALLED SECUITY TURNED OUT TO BE A SELF DESTRUCTION DEVICE, WHICH IS WRONG FROM EVERY ANGLE, THE ENTIRE BITLOCKER SYSTEM SEEMS FLAWED TO ME, SINCE ANYONE COULD HAVE GOT ANYTHING THEY WANTED FROM MY PC AT ANY TIME, SO WHAT GOOD WAS IT SUPPOSED TO HAVE BEEN, IT IS WORTHLESS UNLESS THE USER KNOWS IT IS ON THERE, SUCH A JOKE, IF I HAD A WAY TO RIGHT THIS WRONG, I KNOW IF I MADE SOMETHING LIKE THAT I MY BUSINESS AND IT DESTROYED YEARS AND YEARS OF DATA FOR SO MANY PEOPLE, MY BUSINESS WOULD NOT EXIST, IT WOULD SEEM THEY THINK ONLY PHOTOS AND VIDEO ARE KEPT ON HOME PC, BOY THEY WERE WRONG,, SINCE i LOST HUNDREDS OF THOUSANDS OF DOLLARS WORTH OF DATA AND FILES The WHCK reports for Intel Desktop Boards are available at Microsoft Windows Hardware Quality Labs (WHQL/WHCK) information.įor information on creating Secure Boot keys, refer to Deploying Secure Boot: Key Creation and Management.WHAT I WOULD DO IS FIRST LOOK IN YOUR MICROSOFT ACCOUNT, EVEN IF YOU DID NOT CREATE ONE, IT DID IT FOR YOU, WHICH IS WHAT PUTS THE WHEELS IN MOTION FOR BITLOCKER ENCRYPTION, THOSE DISCREET TRICKY STEPS IN INITIAL SETUP IS WHERE THEY DO THIS TO YOU. These boards, and required BIOS versions, have been tested and passed the Windows Hardware Certification Kit (WHCK) for Windows 8. Intel® Desktop Boards embed the default Secure Boot keys for Windows 8*.
#DISABLE SECURE BOOT WINDOWS 10 SURFACE CODE#
However, Secure Boot blocks at the gate and rejects a code that has bad credentials, or no credential. Code with valid credentials gets through the gate and executes. Detections are blocked from running before they can attack or infect the system. Secure Boot detects tampering with boot loaders, key operating system files, and unauthorized option ROMs by validating their digital signatures. When enabled and fully configured, Secure Boot helps a computer resist attacks and infection from malware. The feature defines an entirely new interface between operating system and firmware/BIOS.
Secure Boot is one feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 specification (Errata C).