What is a secure boot?

This is a recommends products dialog
Top Suggestions
Starting at
View All >
Language
French
English
ไทย
German
繁體中文
Country
Hi
All
Sign In / Create Account
language Selector,${0} is Selected
Register & Shop at Lenovo Pro
Register at Education Store
Pro Tier Benefits
• Save up to an extra 20% on Think everyday pricing.
• Spend $15K, advance for FREE to Plus Tier with increased benefits.
Plus Tier Benefits
• Save up to an extra 25% on Think everyday pricing.
• Spend $50K, advance for FREE to Elite Tier with increased benefits.
Elite Tier Benefits
• Save up to an extra 30% on Think everyday pricing.
Reseller Benefits
• Access to Lenovo's full product portfolio
• Configure and Purchase at prices better than Lenovo.com
View All Details >
more to reach
PRO Plus
PRO Elite
Congratulations, you have reached Elite Status!
Pro for Business
Delete icon Remove icon Add icon Reload icon
TEMPORARILY UNAVAILABLE
DISCONTINUED
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
Remove
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
of
Contains Add-ons
Subtotal
Proceed to Checkout
Yes
No
Popular Searches
What are you looking for today ?
Trending
Recent Searches
Hamburger Menu
Learn More      


What is a secure boot?

Secure boot is a fundamental security feature in Windows that ensures the integrity of your system's boot process. It functions by verifying the digital signatures of the bootloader and operating system, allowing only trusted and signed code to be executed during startup. This prevents unauthorized or malicious software from compromising the system early in the boot sequence. Enabling secure boot enhances your Windows device's resilience against various cyber threats, providing a crucial layer of defense for the overall security of your computer. It's an essential component in safeguarding against malware and maintaining the integrity of your operating system.

How does secure boot work?

When you power on your device, secure boot checks the digital signatures of the bootloader and operating system. If the signatures are valid and match the trusted keys stored in the system, the boot process continues. If not, secure boot halts the process to protect against tampering.

Why are secure boots important?

Secure boots are crucial for protecting your system from malware and unauthorized software. By verifying the integrity of the boot process, it creates a secure foundation for the operating system, reducing the risk of attacks that could compromise your data and system stability.

Can I disable secure boot?

In most cases, you can disable secure boot in your system's unified extensible firmware interface/ basic input output system (UEFI/BIOS) settings. However, doing so is not recommended unless you have a specific reason, as it exposes your system to potential security risks. Disabling secure boot may allow unauthorized code to run during the boot process.

What happens if I try to boot with unsigned software?

If you attempt to boot with unsigned or improperly signed software, secure boot will interrupt the process and display an error message. This prevents the loading of potentially harmful code and prompts you to act, such as verifying the software's legitimacy or obtaining a signed version.

Does secure boot protect against all types of malwares?

Secure boot primarily focuses on safeguarding the boot process by verifying the digital signatures of the bootloader and operating system. While it offers a robust defense against malware attempting to compromise the startup sequence, it doesn't provide comprehensive protection against all types of malwares. Secure boot is effective against threats targeting the boot process, but additional security measures are recommended to ensure a holistic defense. Combining secure boot with reputable antivirus software and regular system updates enhances your overall protection against a broader range of malware threats on Windows.

Could secure boot impact dual-boot configurations?

Secure boot can impact dual-boot configurations on Windows systems. When running multiple operating systems, each must be signed with keys recognized by secure boot. Failure to meet this requirement may result in difficulties booting into non-trusted operating systems. It's crucial to ensure compatibility and proper configuration for a seamless dual-boot experience on a secure boot-enabled Windows system.

What are the key differences between secure boot and traditional boot processes?

Secure boot and traditional boot processes differ in their approach to system security. Secure boot, prevalent in modern Windows systems, employs cryptographic signatures to validate the authenticity of bootloader and operating systems (OS), preventing unauthorized code execution during startup. In contrast, traditional boot processes lack this cryptographic verification, leaving systems vulnerable to tampering. This key distinction enhances Secure boot's ability to thwart malware and rootkit attacks targeting the boot sequence, providing a robust defense mechanism. The implementation of secure boot represents a significant advancement in securing Windows systems, contributing to a safer computing environment by ensuring only trusted software runs during startup.

Can secure boot prevent rootkits?

Yes, secure boot can significantly mitigate the risk of rootkits on Windows systems. By verifying the digital signatures of the bootloader and operating system during startup, secure boot thwarts attempt to install unauthorized code at the foundational level. This proactive measure enhances system integrity and prevents the compromise of the boot process, making it a crucial defense against rootkit attacks on Windows platforms.

Would secure boot be beneficial for servers?

Yes, implementing secure boots on servers is highly beneficial for enhancing overall security. Secure boot acts as a robust defense mechanism, preventing unauthorized code execution during the boot process. This is crucial for servers, which often handle sensitive data and critical tasks. By verifying the integrity of the bootloader and operating system, secure boot significantly reduces the risk of malware compromising the server's startup sequence. It adds an extra layer of protection, making it more challenging for attackers to exploit vulnerabilities and ensuring the server operates in a secure and trustworthy environment.

How can I check if a secure boot is enabled on my system?

To check if secure boot is enabled, access your system's unified extensible firmware interface/ basic input output system (UEFI/BIOS) settings during the boot process. Look for the secure boot option and its status. If it's enabled, the system is configured to verify the digital signatures of the bootloader and operating system during startup.

Is secure boot only relevant for Windows systems?

No, while secure boot was initially associated with Windows systems, it has become a widespread security feature implemented across various platforms, including Linux ® distributions. Many modern operating systems and hardware models recognize the importance of secure boots in enhancing overall system security.

What role does the trusted platform module (TPM) play in secure boot?

The TPM works in conjunction with secure boot to enhance system security. TPM stores cryptographic keys used in the secure boot process, providing a hardware-based root of trust. This makes it more difficult for attackers to tamper with the boot process, as they would need to compromise both the software and the hardware component (TPM).

How does secure boot impact driver installations?

A secure boot can affect the installation of drivers, especially if they are unsigned. When installing drivers on a system with secure boot enabled, it's essential to use signed drivers that have been verified and approved by the operating system. This ensures compatibility and prevents potential issues with the boot process.

Can secure boots prevent "boot kits"?

Yes, secure boots are effective against "boot kits" – a type of malware that infects the boot process. By verifying the digital signatures of the bootloader and operating system, secure boot prevents the installation of unauthorized code during startup, making it challenging for boot kits to compromise the system.

{"pageComponentDataId":"e857fdeft7e51-4b61-84dc-bccec6e68e00","pageComponentId":"e857fdeft7e51-4b61-84dc-bccec6e68e00","isAssociatedRelease":"true","pageComponentDataLangCode":"en_au","configData":{"jumpType":"currentTab","headlineColor":"black","displayNumber":"","styleMode":"vertical","miniCardHoMode":"2","headline":"","products":[{"number":{"t_id":"21kccto1wwau5","language":{"en_nz":"21kccto1wwau5","en_au":"21kccto1wwau5","en":""},"id":"Pageb33ce4b8-4839-4ba3-b993-7296d68a91b8"}},{"number":{"t_id":"21mccto1wwau3","language":{"en_nz":"21mccto1wwau3","en_au":"21mccto1wwau3","en":""},"id":"Page1fa61927-074c-4fe0-a8df-5c94362fb75c"}},{"number":{"t_id":"21lkcto1wwau3","language":{"en_nz":"21lkcto1wwau3","en_au":"21lkcto1wwau3","en":""},"id":"Pageca014688-410e-439a-a4c6-bba2ef6d4715"}},{"number":{"t_id":"21g2cto1wwau3","language":{"en_nz":"21g2cto1wwau3","en_au":"21g2cto1wwau3","en":""},"id":"Page79cd32c8-d467-4d68-b955-d273bb24eda7"}}]},"urlPrefix":"AAAAAAAH","title":"glossary-right-blue-boxes-fragment","pageId":"65b55929-de05-417a-a92a-ccb888d329b0","urlEdit":0,"uri":"/FragmentDirectory/glossary/glossary-right-blue-boxes-fragment.frag","pageComponentUuid":"e857fdeft7e51-4b61-84dc-bccec6e68e00"}
coming coming
Starting at
List Price
Web Price
Web Price:
List Price
Web Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Web Price is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Learn More
See More
See Less
View {0} Model
View {0} Models
Part Number:
Features
See More
See Less
compare
Added!
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
Add To Cart
Add To Cart
We're sorry,
Products are temporarily unavailable.
Continue shopping
Learn More
Coming Soon
Featured Product
Top Deals of the Day
Oops! No results found. Visit the categories above to find your product.
Save
open in new tab
© 2024 Lenovo. All rights reserved.
© {year} Lenovo. All rights reserved.
Email address is required
Compare  ()
x