I have scanned my Windows Server 2019 VM Guest (VMware) and get the Windows Security Feature Bypass in Secure Boot (BootHole) warning.
I am sure that the Secure Boot of the VM Guest has been enabled on the VMware setting. (Beside, the VMware Host is up to date)

I have run the Windows Update so that the server is up to date.
Also, I have followed Microsoft’s instruction (the link below) to apply update for Secure Boot DBX and gotten the positive result from the Server.
https://support.microsoft.com/en-us/topic/microsoft-guidance-for-applying-secure-boot-dbx-update-e3b9e4cb-a330-b3ba-a602-15083965d9ca

However, when I ran again the Nessus scan, the same vulnerabilities warning still came out with same message. What did I miss?