{
	"id": "194749ea-8acf-4c3e-96e2-fa91794c5980",
	"created_at": "2026-04-06T00:13:22.940882Z",
	"updated_at": "2026-04-10T13:12:33.663333Z",
	"deleted_at": null,
	"sha1_hash": "ee7b102b09f64a9a530081defe75c9f650727e4f",
	"title": "Loading Test Signed Code - Windows drivers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 166493,
	"plain_text": "Loading Test Signed Code - Windows drivers\r\nBy EliotSeattle\r\nArchived: 2026-04-05 16:18:33 UTC\r\nBy default, Windows doesn't load test-signed kernel-mode drivers. To enable loading of test-signed drivers, use\r\nBCDEdit.exe to enable or disable the TESTSIGNING boot configuration option. You must have administrator\r\nrights to enable this option.\r\nNote\r\nThe kernel-mode code signing policy requires that all kernel-mode code have a digital signature to load on 64-bit\r\nversions of Windows. However, in most cases, an unsigned driver can be installed and loaded on 32-bit versions\r\nof Windows. For more information, see Driver Signing Policy.\r\nAdministrator rights required\r\nTo use BCDEdit, you must be a member of the Administrators group on the system and run the command from an\r\nelevated command prompt. To open an elevated Command Prompt window, type cmd into the search box in the\r\nWindows taskbar, right-click Command Prompt in the search results, and select Run as administrator.\r\nWarning\r\nAdministrative rights are required to use BCDEdit to modify boot configuration data. Changing some boot entry\r\noptions by using BCDEdit /set could render your computer inoperable. As an alternative, use System\r\nConfiguration utility (MSConfig.exe) to change boot settings.\r\nEnable or disable use of test-signed code\r\nRun BCDEdit command lines to enable or disable the loading of test-signed code. For a change to take effect,\r\nwhether enabling or disabling the option, you must restart the computer after changing the configuration.\r\nTo enable test-signed code, use the following BCDEdit command line:\r\n:: If this command results in \"The value is protected by Secure Boot policy and cannot be modified or deleted\"\r\n:: Then reboot the PC, go into BIOS settings, and disable Secure Boot. BitLocker may also affect your ability to\r\nBcdedit.exe -set TESTSIGNING ON\r\nNote\r\nStarting in Windows 10, version 1507, if you have Memory Integrity / HVCI (Hypervisor Code Integrity) enabled,\r\nyou must test-sign the binary using any self-created test cert. An unsigned binary isn't supported.\r\nTo disable use of test-signed code, use the following BCDEdit command line:\r\nhttps://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option\r\nPage 1 of 2\n\nBcdedit.exe -set TESTSIGNING OFF\r\nThe following figure shows the result of using the BCDEdit command line to enable test-signing.\r\nBehavior of Windows when loading test-signed code is enabled\r\nWhen loading test-signed code is enabled, Windows displays a watermark with the text \"Test Mode\" in the lower\r\nright corner of the desktop to remind users that the system has test-signing enabled. Any certificate can sign\r\ndrivers that the operating system and kernel load. Certificate validation isn't required to come from a trusted root\r\ncertification authority. However, each driver image file must have a digital signature.\r\nSource: https://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option\r\nhttps://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option"
	],
	"report_names": [
		"the-testsigning-boot-configuration-option"
	],
	"threat_actors": [],
	"ts_created_at": 1775434402,
	"ts_updated_at": 1775826753,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ee7b102b09f64a9a530081defe75c9f650727e4f.pdf",
		"text": "https://archive.orkl.eu/ee7b102b09f64a9a530081defe75c9f650727e4f.txt",
		"img": "https://archive.orkl.eu/ee7b102b09f64a9a530081defe75c9f650727e4f.jpg"
	}
}