How to Enable UEFI Secure Boot in Windows 11

Windows 11 made Secure Boot a hard requirement at launch, which caught a lot of users off guard. If your PC failed the compatibility check — or if you've since disabled Secure Boot for troubleshooting — you may need to enable it manually through your firmware settings. Here's exactly how that works, what can go wrong, and why your specific setup matters more than any general guide.

What Is UEFI Secure Boot and Why Does Windows 11 Need It?

Secure Boot is a security standard built into the UEFI firmware (the modern replacement for BIOS) on most PCs made after 2012. Its job is to verify that every piece of software loading at startup — the bootloader, operating system, drivers — is digitally signed and trusted before it's allowed to run.

Without Secure Boot, a compromised bootloader or rootkit can load before Windows even starts, making it nearly impossible for antivirus software to detect. Secure Boot closes that window.

Microsoft requires Secure Boot for Windows 11 because it's a foundational layer of the platform's security stack, working alongside TPM 2.0 and features like Virtualization-Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI).

Before You Start: Check Your Current Secure Boot Status

You don't need to reboot to check where you stand.

  1. Press Windows + R, type msinfo32, and hit Enter
  2. In the System Summary, look for Secure Boot State
  3. If it says On, you're already good. If it says Off or Unsupported, read on.

A status of Unsupported usually means your drive is using the older MBR partition scheme instead of GPT — more on that below.

How to Access UEFI Firmware Settings

You can't enable Secure Boot from inside Windows. You need to enter your UEFI firmware interface, which varies by manufacturer.

Method 1 — Through Windows Settings (recommended):

  1. Go to Settings → System → Recovery
  2. Under Advanced startup, click Restart now
  3. After the reboot, select Troubleshoot → Advanced options → UEFI Firmware Settings → Restart

Method 2 — Firmware key at boot:

Immediately after powering on, press the firmware key for your device. Common keys include:

ManufacturerCommon UEFI Key
DellF2 or F12
HPF10 or Esc
LenovoF1, F2, or Enter
ASUSF2 or Del
MSIDel
AcerF2 or Del
Microsoft SurfaceHold Volume Up + Power

The window to press this key is narrow — sometimes under two seconds on fast SSDs.

Enabling Secure Boot in UEFI 🔒

Once inside your firmware interface, the layout varies significantly. Look for a tab or section labeled Boot, Security, or Authentication.

  1. Find the Secure Boot option
  2. Change it from Disabled to Enabled
  3. If prompted, confirm the change
  4. Save and exit (usually F10 or a Save & Exit option)

Some firmware interfaces hide Secure Boot behind a mode called Custom or require you to set a Supervisor/Administrator password before unlocking security settings.

Watch Out for "Setup Mode"

If Secure Boot was previously in Setup Mode (no keys enrolled), simply enabling it may not be enough. You may need to restore factory default keys — usually an option labeled Restore Default Keys, Reset to Setup Mode, or Install Default Secure Boot Keys. This loads Microsoft's trusted certificate database and makes Secure Boot functional.

The GPT vs. MBR Problem

Here's where many users hit a wall. Secure Boot requires your system drive to use the GUID Partition Table (GPT) format, not the older Master Boot Record (MBR). Windows can only boot with Secure Boot enabled if the drive is GPT-formatted and Windows is installed in UEFI mode (not Legacy/CSM mode).

If your system is running in Legacy/CSM mode, you'll need to:

  • Convert the drive from MBR to GPT — Microsoft's mbr2gpt tool can do this non-destructively in most cases
  • Disable CSM (Compatibility Support Module) in UEFI
  • Then enable Secure Boot

This is the most technically involved part of the process, and it's where outcomes diverge sharply between users. A clean Windows 11 installation on modern hardware almost never hits this issue. An upgraded or older system running Windows 10 that was carried forward might.

Variables That Affect Your Specific Situation

No two setups are identical. A few factors determine how smooth — or complicated — this process will be:

  • Age and make of your motherboard — older UEFI implementations have less intuitive interfaces and sometimes limited Secure Boot support
  • How Windows was originally installed — clean install vs. upgrade path affects partition scheme and boot mode
  • Drive configuration — single drive vs. RAID or dual-boot setups introduce additional complexity
  • Third-party bootloaders — if you're using GRUB (for Linux dual-boot), enabling Secure Boot requires signed shim loaders or custom key enrollment
  • Custom Secure Boot keys — power users and enterprises sometimes enroll their own certificates, which changes the process entirely
  • Virtualization software — some hypervisors interact with Secure Boot in ways that require additional configuration

What Happens After You Enable It

On a standard Windows 11 setup, enabling Secure Boot is transparent — Windows boots normally and security features tied to it activate automatically. You won't see a confirmation screen.

If something goes wrong and Windows fails to boot, re-entering UEFI and disabling Secure Boot temporarily will get you back in. From there, diagnosing whether the issue is a partition scheme problem, a driver signing issue, or something else is the next step. 🛠️

The right path forward depends heavily on how your system was set up, which partition scheme you're on, and whether you have any non-standard boot configurations in the mix.