How to Enable Secure Boot State on Your PC

Secure Boot is one of those settings that quietly protects your computer every time it powers on — but most people never think about it until Windows 11 setup refuses to proceed, or a system info tool flags it as "disabled." Here's what Secure Boot actually does, how to turn it on, and why the process isn't quite the same for every machine.

What Is Secure Boot and Why Does It Matter?

Secure Boot is a security standard built into the UEFI firmware (the modern replacement for BIOS) on most computers made after 2012. When enabled, it verifies that the software loading at startup — your bootloader and operating system — carries a trusted digital signature. If something unsigned or tampered tries to run, Secure Boot blocks it.

This matters because some of the most dangerous malware operates before your OS even loads. Bootkits and rootkits can embed themselves in the boot process, making them nearly invisible to antivirus software running inside Windows. Secure Boot cuts that attack surface significantly.

It's also a requirement for Windows 11. Microsoft made Secure Boot mandatory for the upgrade, which is why checking its status became so common when Windows 11 launched.

How to Check Your Current Secure Boot State

Before enabling anything, confirm whether Secure Boot is already on:

  1. Press Windows + R, type msinfo32, and hit Enter
  2. In System Information, look for Secure Boot State in the right panel
  3. It will show On, Off, or Unsupported

"Unsupported" means your hardware or firmware doesn't support Secure Boot at all — older machines, some custom builds, and certain server boards fall into this category. If you see "Off," you can likely enable it through your firmware settings.

How to Enable Secure Boot: The General Process

Secure Boot is enabled in your system's UEFI firmware settings — not inside Windows itself. The exact steps vary by manufacturer, but the general path looks like this:

Step 1: Access UEFI Firmware Settings

  • From Windows: Go to Settings → System → Recovery → Advanced Startup → Restart Now → Troubleshoot → Advanced Options → UEFI Firmware Settings
  • From boot: Restart your PC and press the firmware key during startup — commonly F2, F10, F12, Del, or Esc depending on your manufacturer

Step 2: Find the Secure Boot Option

Once inside the firmware interface, look under tabs like:

  • Boot or Boot Configuration
  • Security
  • Authentication

The option is usually labeled Secure Boot or Secure Boot Control.

Step 3: Set the Mode Correctly 🔒

This is where things get nuanced. Secure Boot has two modes:

ModeWhat It Means
Standard / Windows ModeUses Microsoft's certificate database — works for Windows and most signed Linux distributions
Custom ModeLets you manage your own keys — used by advanced users, some Linux setups, or enterprises
Setup ModeFirmware is ready to accept new keys — Secure Boot not yet enforced

For most Windows users, Standard Mode is the right setting. Enable Secure Boot, confirm it's set to Standard, save, and restart.

Step 4: Handle the BIOS Mode Requirement

Here's a variable that trips many people up: Secure Boot only works when your drive is configured with GPT partitioning and your system boots in UEFI mode — not legacy BIOS/CSM mode.

If your system is running in Legacy/CSM mode, Secure Boot will either be grayed out or won't function correctly even if toggled on. You may need to:

  • Disable CSM (Compatibility Support Module) in firmware settings
  • Ensure your Windows installation was done in UEFI mode with a GPT-partitioned drive

Switching from Legacy to UEFI mode on an existing Windows installation is possible but more involved — it typically requires using the MBR2GPT tool or reinstalling Windows.

Variables That Affect How This Works for You

The reason there's no single universal set of steps comes down to several factors:

Manufacturer firmware design — Dell, HP, Lenovo, ASUS, MSI, and others all place Secure Boot in different menu locations with different terminology. Some require a supervisor/admin password before the option becomes accessible.

Your current boot mode — UEFI vs. Legacy/CSM changes what's possible without additional steps.

Your OS and disk configuration — GPT vs. MBR partitioning directly affects whether Secure Boot can be enforced. You can verify this in Disk Management by right-clicking your drive and checking Properties → Volumes.

Dual-boot setups — If you run Linux alongside Windows, enabling Secure Boot may prevent unsigned Linux kernels from loading. Most major distributions (Ubuntu, Fedora) support Secure Boot with shim signing, but some custom or older kernels do not. ⚙️

Virtual machines — VMs behave differently. Hyper-V, VMware, and VirtualBox all have their own Secure Boot settings within the VM configuration, separate from the host machine's firmware.

When Enabling Secure Boot Causes Problems

Turning on Secure Boot occasionally breaks things — most commonly:

  • Dual-booting with an unsigned OS or older Linux kernel
  • Older graphics card drivers that aren't signed
  • Custom bootloaders used in modded or specialized setups
  • Some USB boot drives that rely on unsigned bootloaders

If your system fails to boot after enabling Secure Boot, re-enter your firmware settings and disable it temporarily. The fix usually involves either obtaining signed versions of the affected software or configuring Custom Mode with manually enrolled keys — a path better suited to users comfortable with firmware-level configuration.

What "Secure Boot State: Off" Actually Risks

A disabled Secure Boot state doesn't mean your computer is immediately compromised. Your antivirus, firewall, Windows Defender, and drive encryption still function. What you lose is that pre-boot verification layer — the check that happens before any security software has even started running.

For most home users, the practical risk increase is modest. For systems handling sensitive data, operating in shared environments, or subject to compliance requirements, the calculus is different. 🛡️

The right configuration — whether that's Standard Mode, Custom Mode, or accepting the tradeoff of leaving it off for compatibility reasons — depends entirely on what your machine runs, how it's partitioned, and what you need it to do.