The hoops were, that the certificate update did not complete successfully. After a lot of research we found out that the cause was VMware, so here's what we had to do to fix it:
- Upgraded VMs to most recent hardware version (did that preemtively).
- Went into the storage folders to delete .nvram file. (VM must be powered off)
Especially the second part caused a lot of time going into orchestrating the maintenance planning to not cause any downtimes.
Once that was fixed, the certificate update was successful.
Have you found a way to verify 10000% that the new certificates are installed?
Yes, you will see a particular event (which I don't remember from the top of my head) that indicates success, together with AvailableUpdates being set to 0x4000 and the UEFICA2023ErrorEvent being void or 0. But it's best to follow Microsoft guidance. Unfortunately, that guidance is so fragmented, it's a real shame they failed to make it available in a central location. Check this blog, but also https://support.microsoft.com/en-us/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f#bkmk_certificate_deployment
You'll find the following PowerShell which can be used to check if the certificate as enrolled, but that only tells you half of the truth. Don't trust this alone!
([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).Bytes)) -match "Windows UEFI CA 2023"