This computer is configured to require a password in order to start up windows 10

Some 22 years ago, Microsoft made an effort to make Windows even more secure by including an extra layer of security. The SAM Lock Tool, frequently known as SYSKEY (the name of its executable file), was used to encrypt the content of the Windows Security Account Manager (SAM) database. The encryption was making use of a 128-bit RC4 encryption essential.

You watching: This computer is configured to require a password in order to start up windows 10

The user had actually an option to specify a password that would safeguard authentication credentials of Windows accounts stored in the SAM database. If SYSKEY password was collection, Windows would ask for this password in the time of startup prior to displaying the login and password prompt.

While SYSKEY was not using the strongest encryption, attacking (brute-forcing or resetting) the user’s Windows login and also password would certainly not be feasible without initially decrypting the SAM database. As a result, a SYSKEY password would certainly call for the attacker to brute-force or reset SYSKEY defense prior to accessing the system’s Windows accounts. More importantly, an unknown SYSKEY password would certainly proccasion the user’s mechanism from totally booting. This truth was extensively exploited by ransomware and also frequently abused by “technology support” scammers who locked victims out of their own computers using fake “technology support” calls.

Due to SAM database encryption, reinstalling or repairing Windows would not settle the concern unless the user had accessibility to a recent backup or a System Restore Point. For this reason, Microsoft rerelocated the capacity to collection SYSKEY passwords in Windows 10 (release 1709) and Windows Server 2016 (release 1709), steering users in the direction of the much more secure BitLocker encryption rather. However, older devices are still susceptible to SYSKEY ransomware assaults.

Because SYSKEY security is fairly old by hi-technology standards, it is no much longer secure (it never been in the initially place). Victims of SYSKEY ransomware or “tech support” scammers have the right to currently restore their systems by respanning or reestablishing SYSKEY password. System Recoexceptionally has the ability to discover or reset SYSKEY passwords in order to reclaim the system’s normal boot procedure. This is additionally the initially time ever before we’re publishing display shots of the System Recovery user interchallenge.

Removing SYSKEY Password

SYSKEY encryption is a relatively bit recognized attribute that was proactively exploited by “tech support” scammers and ransomware. Once a SYSTEM password is activated, the whole SAM registry hive is encrypted. This renders it difficult to regain Windows to functioning condition, particularly if the scammer has likewise rerelocated all System Rekeep points. Victims of this scam will certainly see the complying with message once they attempt to begin their computer:

“This computer system is configured to need a password in order to begin up.” System Recovery can attempt to automatically reset SYSKEY security. A straightforward removal of SYSKEY password bears the danger of breaking the Windows boot process. For this reason, System Recoexceptionally performs a variety of safety and security checks to identify whether resetting a SYSKEY password of the certain mechanism might cause problems.

Note: instructions below assume that you already created a bootable media containing System Recovery 5.40 or newer.

See more: Failed To Read Description. Error Code 2, Failed To Read Description

In order to rerelocate an unknown SYSKEY password, carry out the complying with.

Boot your computer to bootable storage media via System Recoextremely. Depfinishing on your computer’s motherboard manufacturer, you might need to push Del, F8, F11, F12 or an additional key to invoke a unique menu to temporarily override boot order or to enter UEFI/BIOS setup.Finally, reboot your computer. Windows have to start typically.

If a potential issue is found, you will certainly watch the adhering to warning:


If you continue, you will certainly lose accessibility to DPAPI encrypted information (EFS-encrypted records and also folders). In enhancement, we recommfinish that you make backup copies of SAM, SYSTEM and also SECURITY registry hives (this should be done manually).

Disspanning SYSKEY Password

Resetting the SYSKEY password may or may not work depending on configuration of the certain mechanism. Respanning the SYSKEY password is a considerably safer operation that does not have the potential negative impact of sindicate resetting the password. System Recoextremely have the right to automatically inspect your computer system to look up for cached SYSKEY passwords throughout the mechanism. The tool will certainly analyze various regisattempt tricks, short-lived files and databases to look up for a cached copy of SYSKEY password. If this is successful, SYSKEY protection deserve to be rerelocated instantly and also risk-complimentary.

In order to look up for SYSKEY password, perform the following:

Boot your computer system to bootable storage media through System Recoextremely. Depending on your computer’s motherboard manufacturer, you may should push Del, F8, F11, F12 or one more crucial to invoke a one-of-a-kind food selection to temporarily override boot order or to enter UEFI/BIOS setup.Take a note of the found SYSKEY password and also reboot your computer. Get in the uncovered SYSKEY password as soon as triggered.

See more: What Is Windows_Ie_Ac_001 - Remote User Has Hacked Into My Computer

* System Recovery

Reset passwords to neighborhood Windows accounts and also Microsoft Account and also percreate a broad variety of governmental tasks. Assign administrative privileges to any kind of user account, reset expired passwords or export password hashes for offline recovery, and also create forensic disk imeras. System Recovery is all set to boot many thanks to the licensed Windows PE environment, allowing administrators to access locked computers.