ERROR_SECUREBOOT_POLICY_PUBLISHER_NOT_FOUND - 4423 (0x1147)

A new Secure Boot policy did not contain the current publisher on its update list.

Updated: Feb 21, 2026

Technical Background

Secure Boot is a feature in Windows that helps ensure the integrity of the operating system by verifying the authenticity of the boot components. The Secure Boot policy defines which publishers are allowed to sign and include their certificates in the Trusted Platform Module (TPM) or other secure storage mechanisms.

Error Details

The error code ERROR_SECUREBOOT_POLICY_PUBLISHER_NOT_FOUND (4423, 0x1147) indicates that a new Secure Boot policy update did not include the current publisher on its list of allowed publishers. This can occur during an attempt to apply a new Secure Boot configuration.

Common Causes

  • The new Secure Boot policy does not contain the current publisher's certificate or public key information.
  • There has been a change in the publisher's identity, such as a revocation or update, and the updated policy has not yet been applied.
  • The system is attempting to apply a policy that is incompatible with the existing configuration.

Real-World Context

This error can occur during various Secure Boot-related operations, such as updating the Secure Boot configuration through Group Policy or other administrative tools. It may also appear when a new version of an operating system or firmware updates the Secure Boot settings and encounters discrepancies in the publisher list.

Is This Error Critical?

The severity of this error depends on the context. If the current publisher is critical for the operation, such as signing kernel drivers or other essential components, the system may fail to boot correctly until the issue is resolved.

How to Diagnose

  1. Review the Secure Boot Configuration: Use tools like bcdedit to inspect the current Secure Boot settings and verify that all necessary publishers are included in the policy.
  2. Check for Policy Updates: Ensure that any pending updates or changes to the Secure Boot configuration have been applied correctly.
  3. Verify Publisher Certificates: Confirm that the publisher's certificate is present in the trusted store, such as the TPM or Windows Certificate Store.

How to Resolve

  1. Update the Secure Boot Policy: Apply the latest Secure Boot policy update from the appropriate source, ensuring it includes all necessary publishers.
  2. Reinstall Publisher Certificates: If a publisher's certificate has been revoked or updated, reinstall the correct version of the certificate in the trusted store.
  3. Restart the System: After making changes to the Secure Boot configuration, restart the system to apply the new settings and resolve any boot issues.

Developer Notes

When developing applications that interact with Secure Boot policies, ensure that all necessary publishers are included in the policy updates. Additionally, handle errors gracefully to provide users with clear feedback on what went wrong and how to proceed.

Related Errors

  • ERROR_SECUREBOOT_POLICY_NOT_FOUND
  • ERROR_SECUREBOOT_CONFIG_INVALID
  • ERROR_SECUREBOOT_SIGNATURE_VERIFICATION_FAILED

FAQ

Q: What does the error code 4423 mean?

A: The error code 4423 indicates that a new Secure Boot policy did not contain the current publisher on its update list.

Q: How can I troubleshoot this issue?

A: Review the Secure Boot configuration, check for pending updates, and verify publisher certificates. Ensure all necessary publishers are included in the policy.

Q: Can this error affect system bootability?

A: Yes, if the current publisher is critical for booting the system, the error can prevent successful boot until resolved.

Summary

The ERROR_SECUREBOOT_POLICY_PUBLISHER_NOT_FOUND (4423) error indicates a discrepancy between the current Secure Boot policy and the expected publishers. Diagnosing and resolving this issue involves verifying the policy configuration, ensuring all necessary certificates are present, and applying any pending updates. Proper handling of Secure Boot policies is crucial for maintaining system integrity and security.