Event details
Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. We recently published the first version of the Secure Boot playbook, outlining the tools and steps you can take today to proactively plan and prepare for this milestone. Join this AMA with your questions about update scenarios, inventorying your estate, and formulating the right deployment plan for your organization.
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast.
Get started with these helpful resources
113 Comments
- WinPEOccasional Reader
How will the WinPE boot image (from the ADK) be affected by these changes? If it will be updated, will it continue to work on systems that have not yet installed the updated certificates?
- prabhv1982
Microsoft
If WinPE device is updated with new Windows UEFI 2023 CA signed Boot Manager, device can only boot to this media if new certificates are already installed. Devices that do not have new certificates in firmware will not be able to boot to this image. Refer to https://aka.ms/getsecureboot on how to update device to new certificates
- nipetersCopper Contributor
I'm curious when checking to see if the new 2023 certs for Secure Boot get updated, why would we only be checking this cert? [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match ‘Windows UEFI CA 2023’. This is the "How to Audit Secure Boot Configuration" portion on this page https://support.microsoft.com/en-us/topic/windows-configuration-system-wincs-apis-for-secure-boot-d3e64aa0-6095-4f8a-b8e4-fbfda254a8fe
- Ashis_Chatterjee
Microsoft
There are multiple methods to update Certificates listed in: aka.ms/getsecureboot->Guidance for IT professionals and organizations
Secure Boot Certificate updates: Guidance for IT professionals and organizations - Microsoft Support
The Monitoring Section of this document has the Events 1801 and 1808 which check for all the relevant certificate updates and their status. This would be a complete way to Audit (also the WinCS documentation is getting updated to reflect this).
- EWooCopper Contributor
Several questions:
- If the computer manufacturer is not planning on supporting or releasing a BIOS/firmware update to include the new certificate and we have Secure Boot enabled, what happens when the certificate expires in 2026 and we are unable to update it and policy states we are not permitted to disable Secure Boot nor is that feasible across the number of devices?
- Will the computer no longer boot to Windows?
- Computer will still continue to function as normal as it is today?
- Can we still reimage the device using SCCM?
- If we apply the 0x5944 registry value on updateable systems, are we still able to network boot them with our existing WinPE to image them with SCCM?
- If WinPE needs updating, which version of the Windows 11 ADK/WinPE add-on will include the updated certificate or is this a manual process?
- If this is a manual process to update WinPE/WDS/SCCM, what is the MS supported documented process for doing so?
- Somewhere I read indicated that it wasn't WinPE that needs updating but the SCCM RemoteInstall boot files needs updating, but not sure where to get the required files containing the new certs to update WDS/SCCM or how to do so in a supported manner across multiple DPs.
- If WinPE needs updating, which version of the Windows 11 ADK/WinPE add-on will include the updated certificate or is this a manual process?
- If we update the WinPE or WDS/SCCM files to support the new certificate, does that mean only the devices that got the new certificate will be network bootable for reimaging with SCCM and those devices that did not get the certificate will stop imaging or will both be supported and working?
- Our SCCM needs to support imaging of devices both with the new certificate and those older vendor unsupported devices that aren't getting the firmware updates. This should not include deploying any additional WDS/DP servers for supporting these hardware.
- Pearl-Angeles
Community Manager
Thanks for your questions! Chiming in that the panelists covered question #2 live at 4:28 during the AMA.
- prabhv1982
Microsoft
-
These certificates allow Microsoft to apply security updates to Secure Boot and boot manager components. These certificates allow Microsoft to apply security updates to Secure Boot and boot manager components. If the new certificates are not in place, this will no longer be possible. We are finalizing the defined behavior and will share full details before the change takes effect
- Yes. System will continue to boot existing boot media including network boot after the certificates are updated by applying 0x5944 registry key. If Secure Boot revocations are applied to firmware to revoke older versions of boot manager, it will require updating all boot sources to new Boot manager.
- Yes. If boot media such as WinPE or USB is updated with the new Boot Manager, the device can only boot from this updated media if the new certificates are already applied to device firmware.
- EWooCopper Contributor
Does applying the 0x5944 registry key apply the Secure Boot revocations or does this only apply the new cert, but leaves the old cert in place?
And is Microsoft planning on revoking the old cert at some point in the future?
-
- If the computer manufacturer is not planning on supporting or releasing a BIOS/firmware update to include the new certificate and we have Secure Boot enabled, what happens when the certificate expires in 2026 and we are unable to update it and policy states we are not permitted to disable Secure Boot nor is that feasible across the number of devices?
- mikehartsteinCopper Contributor
- If we are deploying the AvailableUpdates 0x00005944 registry value (either directly or indirectly via admx / AvailableUpdatesPolicy) and everything applies successfully, leaving (as stated in the IT Pro guidance) just the 0x00004000 "modifier" for the potential Microsoft Corporation UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 cert installation - how important is it that that value stays at 0x00004000 after the process is done? For example, if, months later, we want to take the extra step of adding the Microsoft Windows Production PCA 2011 cert to the DBX (BlackLotus mitigation), which requires setting AvailableUpdates to 0x00000080, after which it would end up back to 0x0. Does it matter?
- If the addition of the Microsoft Corporation KEK 2K CA 2023 cert is being denied and a BIOS update is not available from the OEM, is it possible that it will start working over the next few months without a BIOS update needed as a result of an update to KEKUpdateCombined.bin via monthly Windows Update?
- Will any devices that have the same Platform Key behave the same in terms of accepting / denying the new KEK cert update, irrespective of BIOS version?
- Our main OEM, Lenovo, has said they will provide BIOS updates for all commercially supported devices. For Lenovo that support period is about 6 1/2 years after release, meaning there are several generations of devices out there that still meet all the requirements for Win 11 (including CPU minimum) but possibly won't be able to take the updated KEK cert? What will happen to those devices after June 2026? If they cannot sign updates to the DB and DBX, what is the implication? Will regular Windows Cumulative Updates fail to install if they have a DB or DBX update piece?
- MelbatoastCopper Contributor
Is it true that Hyper-V Gen 1 VMs are not affected by this issue?
- Pearl-Angeles
Community Manager
Thanks for participating in today's AMA! The panelists covered your question at around 10:10 of the session.
- Kev_ChanCopper Contributor
Our devices are on Intune but we use a third party patch management software for updates.
Is there a specific update name to look out for to make sure the patching software does deploy this update? Or will the SB cert be deploy as part of future Windows Cumulative/Security updates as well?
Of course, we will need to make sure the devices BIOS are updated to the latest version before such deployment can occur.
- mace_9_8Occasional Reader
"For Windows running long term in a VM, the updates can be applied through Windows like any other devices, if the virtualized firmware supports Secure Boot updates."
- What do you mean by "Windows running long-term in a VM"
- How can I determine if my VMs are long-term?- prabhv1982
Microsoft
Long running virtual machines refers VMs that have been operating for extended period for years rather than short-lived or disposable VMs used for quick testing
Most recent Virtual machines created from up-to-date Hyper-V hosts already have the new certificates deployed. To verify if your VM has the required Secure Boot certificate updates:
- Refer to
https://aka.ms/getsecureboot ->Guidance for IT professionals and organizations -> Monitoring Event Logs section for guidance on how to determine if VM has latest certificates.
- Refer to
- mithunlalCopper Contributor
Does this have any relation with Defender ASR rule 'Block rebooting machine in Safe Mode'? https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction-rules-reference#block-rebooting-machine-in-safe-mode
- Pearl-Angeles
Community Manager
This question was answered during the live AMA at 12:50.
- prabhv1982
Microsoft
No. This is not related to Windows Defender's feature to block boot to Safe Mode.
- lr1Occasional Reader
1. What's the easiest way to determine if a device is compliant to below two prerequisites, to receice automatic secure boot certificates updates? Does Microsoft provide a "quick check", which can be run on a device?
"The system shares diagnostic data + is managed by Microsoft Cloud or Intune"
2. Looks like updating virtual machines by using the "AvailableUpdates" Registry Key (value 0x5944), currently results in an error state (see details in the Secure Boot playbook for certificates expiring in 2026 - Windows IT Pro Blog comments)
- The certs are up to date except for current "Microsoft Corporation KEK 2K CA 2023"
- Status of UEFICA2023Status Registry Key = "InProgress"
- UEFI2023Error Registry Key = "800703e6"
- Event log ID 1796 error "The secure boot update failed to update a secure boot variable with error invalid access to memory location"
Question 1: Is this a know error, which Microsoft / Broadcom are working on?
Question 2: The "Microsoft Option ROM UEFI CA 2023" DEFAULT certificate has not been updated by this process. Is Broadcom responsible to do so and will this happen by installing a new version of VMware tools?
3. According to https://support.microsoft.com/en-us/topic/frequently-asked-questions-about-the-secure-boot-update-process-b34bf675-b03a-4d34-b689-98ec117c7818 a device will continue to boot, if it does not have the new secure boot certificates updated, after old certificates exipres in June / October 2026, but "it will no longer be eligible to receive security fixes related to the Windows boot manager updates or Secure Boot".What does this mean in detail and how to bring a device back to a compliant state?
- AlunOccasional Reader
Just 3 questions:
- Will we need to update the WinPE build media and Windows Install Source Images if the device has the new certs installed (or the old have expired)?
- Will the Windows Install process update the Certs if the Windows Install source media has been updated and the device has not?
- Will any future cumulative patches that require new certs for a security vuln patch also force the upgrade of the cert if the device has yet to be updated?
- Pearl-Angeles
Community Manager
Chiming in that your second question was addressed live in the AMA at 7:42.
- prabhv1982
Microsoft
- If Boot Manager revocations are not deployed, existing boot media will continue to boot even after the certificate expires and/or new certificates are deployed to firmware. If revocations are deployed, all bootable media must be updated to include the new Boot Manager to ensure continued boot functionality.
Guidance on deploying Boot Manager revocations is available here:
How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 – Microsoft Support. -
Devices that do not have the required certificates will not receive proactive certificate updates from the Windows installer.
- If you attempt to boot from media that uses a Boot Manager signed with the new certificate, the device will fail to boot unless the updated certificates are already present.
- For in-place upgrades, the boot service installer will not update the Boot Manager to avoid a no-boot scenario.
- Cumulative updates include High confidence data list that includes device classes deemed safe for deployment. This data will be updated refreshed regularly as part of cumulative updates.
- The latest high-confidence list is located at: %systemroot%\System32\SecureBootUpdates\BucketConfidenceData.cab
- If your device’s BucketID is included, the update will be applied automatically if certificates are not already present.
- You can find the BucketID in Secure Boot events. Refer to https://aka.ms/getsecureboot ->Guidance for IT professionals and organizations -> Monitoring Event Logs section for details on Secure boot certificate related events
- Future cumulative updates will apply these changes automatically for devices identified by Microsoft as ready, based on a high-confidence list.
- If Boot Manager revocations are not deployed, existing boot media will continue to boot even after the certificate expires and/or new certificates are deployed to firmware. If revocations are deployed, all bootable media must be updated to include the new Boot Manager to ensure continued boot functionality.