Event details
Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. We recently published the first version of the Secure Boot playbook, outlining the tools and steps you can take today to proactively plan and prepare for this milestone. Join this AMA with your questions about update scenarios, inventorying your estate, and formulating the right deployment plan for your organization.
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast.
Get started with these helpful resources
113 Comments
- LakshmanaPrabhuCopper Contributor
Thank you for setting up this session, As we understand all OEMs are already providing updated certificates on new devices delivered in 2025 and existing certiticates get addressed part of the upcoming windows updates or respective OEMs firmware update.
How do we analyze in an enviroment which endpoints need this update and which are already up to date either via Intune other form of reporting , That helps in understanding the current posture and action required
- RayC15Copper Contributor
For device with require diagnostic and CFR joined, when will it be updated? (On next cumulative update?)
Is the high confidence bucket list already available? Does it get updated every month?
- SebMcCayen_SweOccasional Reader
Is it enough to install the Firmware/BIOS provided via the computer manufacturer, example HP, Dell etc?
- Kevin_Sullivan_MSFT
Microsoft
Typically, no. Installing the BIOS update from your OEM gives you the new Secure Boot certificates in the default variables, but that alone doesn’t make them active. Windows takes care of updating the active variables during the update process, which are the ones the system actually uses at startup. So, you will also need to follow the guidance to update the certificates from Windows.
- AlexHellenOccasional Reader
We have tested a scripted method for updating the keys which works but ideally we want to deploy the policy through Intune. The policy we created with the setting
Enable Secureboot Certificate Updates
(Enabled) Initiates the deployment of new secure boot certificates and related updates.
But on both 24H2 and 25H2 this seems to do nothing. Will this be usable soon?
- MadsJohansenCopper Contributor
It looks like the new Intune Settings Catalog policies to manage the rollout of the new secure boot certs is not properly working. When trying to deploy the policy it returns an error code 65000, which is a generic error code that intune usually returns for a variety of reasons, sometimes when a pre-req is not met.
I've seen this error in multiple tenants and several different customer environments. Is this something that is on your radar?
This is the policy that I'm testing from Intune: - vgrzebykCopper Contributor
Same question about: if I have devices in Autopatch & diagnostics being sent. Do I need to implement any other configuration policies or registry keys or is it all automatically completed? Or do we need this policy?
As
- Pearl-Angeles
Community Manager
Thanks for your question! The panelists covered this topic at 39:39 during the live AMA.
- DroidKidCopper Contributor
I'm trying to apply the new Intune Policies under "secure Boot" but they don't apply to the devices I get error "65000" which usually indicates the policy cannot be found.
Edit:
You said to look at Event logs but can we rely on the UEFICA2023Status reg key instead? I'm working on a BI report so that's why I'm asking. - amh0507Occasional Reader
If secure boot is not enabled, is there anything that needs to be done?
- SochiOgbuanya
Microsoft
If Secure Boot is not enabled, Windows can continue to boot and install regular OS updates. However, the device won't receive future Secure Boot/boot-chain protections until the updated 2023 certificates are applied. Turning Secure Boot on later without those certificates may lead to boot issues once newer, 2023‑signed boot components are in place. The safest path is to turn on Secure boot and apply the 2023 certificates now.
- ClientAdminCopper Contributor
- The GPO (ADMX) sets a value of 0x5944. How can we then revoke the 2011 certificates (0x80)?
- Are there any details about SVN (0x200)? What is the exact mechanism?
- Will Bitpixie and BlackLotus be mitigated with just 0x5944?
- Is SecureBootRecovery.efi application set after bootmgfw.efi if the new certificates 2023 aren't in the defaultDB?
- Can we use SecureBootRecovery.efi for warehoused devices as a PXE boot file?
- What happens on devices without Secure Boot enabled now? Will they get the Boot Manager signed with 2023 installed automatically? What happens if we enable Secure Boot at a later point as AvailableUpdates only works with Secure Boot enabled? - Kev_ChanCopper Contributor
For corporations that use a patch management software instead of Windows Update, is there any action required besides the BIOS update on the laptop?
From what I understand, this is all done via the Cumulative updates so the patch management software can do this without us having to enable Windows Update via Intune.