Release Notes Full Disk Encryption 26.1
Table of Contents
About Full Disk Encryption
Matrix42 Full Disk Encryption provides strong authentication and protection for standard hard disks via sector-based Full Disk Encryption (FDE) and Pre-Boot Authentication (PBA). This provides perfect ‘turn-off-protection’, which means that the implemented security mechanisms provide the highest security for the operating system, as well as for the data – provided the computer is turned off at the time of theft. The optional use of a security token or smart card at pre-boot is the high-end solution for secure key management in conjunction with two-factor authentication.
About this Release
This is the official release of Matrix42 Full Disk Encryption 26.1 and provides an overview of all relevant technical background and changes. With Full Disk Encryption 26.1, we are delivering the first public major release of a new Full Disk Encryption generation. This version concludes a long and deliberate development and validation journey that began with Full Disk Encryption 25.0 Update 1, which was introduced through a Controlled Rollout. Since then, we have implemented significant architectural changes, security‑critical updates, and a wide range of bug fixes and stability improvements—based on internal backlog items as well as extensive feedback from Controlled Rollout participants. Full Disk Encryption 26.1 consolidates all of this work into a stable, production‑ready public release.
Before you Start
Before proceeding, we strongly recommend that you familiarise yourself with the key changes, improvements, and update procedures by reviewing the Release Notes in full. This is especially important given that there are now two available UEFI certificate variants on the Marketplace, each signed with a different Microsoft certificate. It is therefore recommended that you review the listed KB article in the corresponding section and the Recommended Approaches for Updating. Following these steps will help to ensure a smooth update and a proper understanding of all the changes included in this version.
Key Changes and Improvements
With Full Disk Encryption 25.0 Update 1, we intentionally began a controlled introduction of a new technical foundation. The focus was on deep and necessary changes to the boot and security architecture, laying the groundwork for future versions.
Key Fundamentals Introduced
- Full Secure Boot support
- Replacement of the previous SHIM‑based approach:
- Introduction of a custom, Microsoft‑signed bootloader
- Independence from expired or third‑party shim certificates
- Linux kernel upgrade from 5.1.4 to 6.6.9
- Activation of Linux IMA (Integrity Measurement Architecture) for improved boot‑time integrity
- Support for Windows 11 version 24H2
32‑bit platform support
These changes were essential to ensure long‑term security, compatibility, and maintainability of Full Disk Encryption.
Bootloader and Secure Boot Changes
The previously used SHIM certificate expired in December 2022. In addition, Microsoft updated the root certificate authority used to sign third‑party shims in August 2024, which negatively affected Secure Boot compatibility. After extensive discussions with Microsoft and the SHIM Review Board—without achieving the required outcomes—we adopted a new approach:
- Full Disk Encryption no longer uses a custom‑built shim
- A custom Microsoft‑signed bootloader is now used instead
- This bootloader replaces the default Microsoft bootloader during installation
- Secure Boot compatibility is ensured without relying on expired or third‑party shims
System and Kernel Updates
- Linux IMA has been enabled to further strengthen system integrity during the boot process
- The Linux kernel has been upgraded from version 5.1.4 to 6.6.9
Pre-Boot Authentication and User Capturing
We have improved support for user capturing during the PBA process:
Windows 11 24H2 Support
- User capturing is supported on Windows 11 version 24H2 and later
- This applies only to users not using Windows Hello for Business and not enforced Microsoft/Live ID accounts
Password Change Behavior
- When users change their Windows password, the new password is not captured immediately
- The PBA screen is temporarily bypassed until the next interactive Windows login
- After a successful login, the new password is captured and PBA is shown again on the following boot
Architecture and Packaging Changes
- 32‑bit support has been removed
- All 32‑bit binaries have been removed from the FDE deployment package
- Deployment is supported on 64‑bit systems only
Stabilization and Refinement During the Controlled Rollout
Following the Controlled Rollout that started with Full Disk Encryption 25.0 Update 1, a significant part of the engineering effort focused on stabilizing the new architecture and reaching functional completeness. The improvements listed below were developed, refined, and validated during multiple Controlled Rollout updates and are fully consolidated in Full Disk Encryption 26.1
User Capturing and Pre‑Boot Authentication (PBA)
Significant improvements ensure reliable and predictable user capturing across Windows versions and login scenarios:
- Fixed cases where users were not captured after incorrect password entries during initial login
- Improved handling of user switching during active User Capture, including the Windows “Other User” scenario
- Resolved password capture issues when:
- New users were added via the Management Console
- Single Sign‑On failed and no password was entered within the expected time frame
- Improved password synchronization for:
- Password changes via CTRL + ALT + DEL
- Password changes performed on other devices
- Password changes initiated by administrators in Active Directory
- Correct synchronization when users are added to PBA without an initially known password
Additional Information: These changes align user capturing with the modern Windows Credential Provider (GetSerialization) and provide consistent behavior across Windows 10 and Windows 11. It is important to bear in mind that users need to enter their old password to pass the pre-boot authentication. Afterwards, Windows Authentication will fail due to the old password. Then, users can log in to their machine with the updated password, which will be in sync with the Pre-Boot Authentication the next time the machine boots. From then on, users can use their current password to pass the pre-boot authentication.
For adding first-time or additional users to Pre-Boot Authentication, the following scenario is supported:
- Adding users from Active Directory via the Management Console
The issue we addressed here applies when an administrator adds a new user from the Active Directory to pre-boot authentication. In most cases, the administrator would leave the password field empty because they do not know it. The newly added users will then need to enter an empty password to pass the pre-boot authentication. Windows Authentication will then fail due to the incorrect password. The user will then log in with their current credentials, at which point the issue occurs. Typically, you would expect that, after rebooting the system, the updated password would be synchronized with the pre-boot authentication. This was not the case in previous technical releases. This new version covers this use case, and the entered password is now synchronized with the pre-boot authentication immediately.
Policy Builder and Configuration Stability
Administrative reliability was improved through targeted refinements:
- FDE log file paths are no longer reset when creating or modifying PBA policies
- User Capture settings in the Policy Builder are changed only when explicitly required
- Correct application of custom PBA background images
System, Driver, and Platform Compatibility
Stability was improved across hardware platforms and OEM builds:
- Updated registry layout and driver setup to meet modern Microsoft requirements
- Fixed UI and display issues on specific devices (for example, Fujitsu Lifebook U9312X)
- Cleaned up incorrect or unnecessary registry entries in OEM variants (for example, PBACredMan)
- Corrected OEM‑specific background image issues
Emergency Recovery and Resilience
The Emergency Recovery Tool (ERT) was enhanced to improve reliability in critical situations:
- Volumes are now actively and correctly loaded in Windows 11 environments
- Recovery information is consistently accessible across Windows versions
- Improved robustness for recovery scenarios involving encrypted system drives
Additional Information: The Emergency Recovery Tool allows machine recovery in critical scenarios using Windows Preinstallation Environment (WinPE). Between Windows 10 and Windows 11, volumes are no longer preloaded on Windows 11, which previously could cause issues accessing Emergency Recovery Information from the cache or physical storage. In this update, volumes are now loaded directly by the application, ensuring recovery scenarios work reliably across both Windows versions.
Logging, Diagnostics, and Supportability
Support and troubleshooting were simplified with targeted improvements:
- The log‑capture tool now automatically requests administrative privileges
- More complete and consistent logs are collected from:
- UEFI and Pre‑Boot Authentication
- Windows runtime and recovery environments
- Reduced risk of incomplete or empty log files during support cases
These changes significantly improve diagnostic efficiency and reduce time to resolution.
Additional Information: In support cases, pe_erd_w32.exe can be used to capture logs from all Full Disk Encryption components, including UEFI and the Windows Recovery Tool. In the Full Disk Encryption release, you will find the compressed Extension Packages archive containing winpe-x86-64.zip, which includes pe_erd_w32.exe under the DE or EN folder. The improvement in this update ensures the tool automatically attempts to acquire administrative privileges to capture all relevant logs, preventing empty or incomplete log entries. This simplifies log collection and review for support cases, especially when the “Run as Administrator” option is unknown.
Security and Code‑Signing Compliance
As part of the overall stabilization effort, security‑related infrastructure was updated:
- Completed the transition to updated code‑signing certificate provider requirements
- Customers must ensure that the required GlobalSign root or intermediate certificates are present in the client trust store.
Available UEFI Certificate Variants
For Full Disk Encryption 26.1, two Marketplace packages are provided. Both packages are technically and functionally identical—there are no differences in features, behavior, or code base. The only difference between the two versions is the certificate used to sign the EFI boot files.
The background is that Microsoft has introduced changes to Secure Boot certificate handling as part of its UEFI CA update and certificate expiration process.
Depending on your system firmware, Secure Boot configuration, and applied Microsoft updates, devices may rely on:
- Full Disk Encryption 26.1.0.0, signed with the legacy Microsoft UEFI CA 2011 or
- Full Disk Encryption 26.1.0.1, signed with the new Microsoft UEFI CA 2023
To ensure compatibility across different environments, Matrix42 provides two signed variants of the same Full Disk Encryption package, each aligned with one of these certificate authorities. Please make sure to read the Migration Guide before updating to the latest release!
Recommended Approaches for Updating
Before updating to the latest Full Disk Encryption version, please review the Update Guide: Full Disk Encryption and the recommended approaches below before you start with the update.
-
Assess Your Environment and Feature Requirements
Determine whether features like Secure Boot or Pre-Boot Authentication (PBA) are required in your environment. Both are supported, but optional. -
Pilot in a Controlled Group
Begin with a small test group to validate boot behavior, deployment compatibility, and feature configurations—especially when using Secure Boot or PBA. -
Update Deployment Package
Download and use the latest FDE deployment.zippackage from the Current Release section, which includes the Microsoft-signed bootloader and 64-bit binaries. Ensure no legacy boot components or 32-bit files are used. -
Use EgoSecure Data Protection Console (Optional)
If you plan to remotely deploy FDE via the EgoSecure Data Protection Console, ensure that your environment is running Endpoint Data Protection version 25.0 or higher, as earlier versions are not compatible with this release. -
Check User Account Configurations (PBA Only)
For environments using PBA, verify that target user accounts are not tied to Windows Hello for Business or enforced Microsoft/Live IDs, as these are not supported for password capturing. -
Communicate Password Change Handling (PBA Only)
When users change their Windows password, the new password will be captured after their next interactive login. Until then, users need to use one time their old password to pass the PBA screen. -
Remove Legacy 32-bit Deployments
Ensure all deployment targets are 64-bit systems, as 32-bit support has been discontinued and removed from the new package. -
Track and Document the Rollout
Maintain a deployment record, including pilot results, rollout status, and update history to support compliance and internal reporting.
Questions and Support
If you experience problems or have questions during testing or deployment, please do not hesitate to contact Matrix42 Support. We are committed to assisting you as quickly as possible and will work with you to analyze and resolve any issues that arise. We greatly appreciate your feedback and cooperation as we continue to improve the product.