Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
This event has concluded. Follow https://aka.ms/securebootplaybook for announcements about future Secure Boot AMAs.
Get started with these helpful resources
374 Comments
- sysadmin315Copper Contributor
On various virtual 2019 servers the certificate update is stuck in "InProgress" even after several reboots and starting the scheduled task. The host updated just fine.
Confirm-SecureBootUEFI returns "True"
Registry key "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" "AvailableUpdates’" set to 0x5944.
Schedule task "\Microsoft\Windows\PI\Secure-Boot-Update" initiated
And the computer rebooted
- Arden_White
Microsoft
Some things to look at:
- Check the registry keys UEFICA2023Status, UEFICA2023Error, and UEFICA2023ErrorEvent
- Look for events in the System log with event source TPM-WMI.
- Ensure that the Secure-Boot-Update exists and that it has active triggers (on startup and ever 12 hours)
- sysadmin315Copper Contributor
Registry keys
System log
Task scheduler
- MoazzemHossain-TBBDCopper Contributor
Thank you for the update, Arden. As a new user, this clarification is very helpful.
- cookie_monsterCopper Contributor
We use Intune + WUfB only and haven’t enabled any Secure Boot policies. ~40% of devices have already updated or are in progress, ~60% aren’t ready yet.
My understanding is:
- We can do nothing and let Windows Update handle this, which is probably the lowest risk option, but gives us the least certainty that everything will be done well before the 2026 deadline.
- Or we can enable Intune Secure Boot policies to try and push things along, but there’s no guarantee it actually speeds things up, and it could introduce risk on devices that aren’t fully ready (firmware/BIOS, etc).
Is that understanding correct?
- mihiBrass Contributor
I would say it is likely that it speeds things up, but it is not certain. And you are right about the risks.
- jeddunnCopper Contributor
I have noticed something on thousands of my devices that the WindowsUEFICA2023Capable value is set to 2 however, there is no mention of the UEFICA2023Status value. The device shows that it's booting on the 2023 cert. What does this mean?
- lr1Copper Contributor
Make sure to install the latest Windows LCU before updating the certs. For my understanding the UEFICA2023Status value changes only to the "updated" state, if your hardware type (BuckedID) has been approved as "problem-free" by Microsoft (and that definition comes with the LCU).
- kumarshai88hotmailcoCopper Contributor
Hi Arden_White
What are the methods available for Server OS to renew secure boot certificates? we are using SCCM to manage the patching of server OS.
Is any Estimated timeline for Secure Boot Certificate renewal to be delivered through monthly cumulative updates for Windows Server OS, any additional steps required to complete the certificate renewal when using cumulative updates?
My ask is about the windows Server OS (2019, 2016, 2012R2, 2012).
- Arden_White
Microsoft
For Windows Server, the supported approaches today are OS‑side deployment using Group Policy or registry keys, which can be deployed and managed through tools like SCCM.
It’s important not to rely on Microsoft‑managed controlled rollout or high‑confidence servicing for servers. Those mechanisms primarily apply to client Windows and are driven by telemetry that is typically limited or unavailable on Windows Server.
Secure Boot certificate updates for Server are delivered through normal Windows servicing, but they only apply after the device is explicitly opted in using Group Policy or registry configuration. In practice, most server environments should plan for a customer‑managed rollout rather than expecting certificates to be applied automatically.
- RoySasabe
Microsoft
Hi!
I hope this server playbook helps answer your question:
https://aka.ms/SecureBootForServer
The modules necessary for the Secure boot updates are already delivered through monthly cumulative updates for Windows Server OS. Unlike PC clients, the Secure boot cert update needs to be manually triggered by IT Administrators, and the server playbook shares the best practices on how to plan and manage this transition safely.
- YHROccasional Reader
I believe some of us get confused, between getting the certificate itself (which is part of Feb CU?), and getting the secure boot using the updated certificate.
- jeddunnCopper Contributor
I would like to verify something that we are seeing. We elected to set MicrosoftUpdateManagedOptIn to 1 in the registry however, we are not seeing any movement on the certificates installing. If I run reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f, I see movement. Am I correct in thinking that when we set the initial setting, Microsoft will eventually start the process automatically for these devices?
- Arden_White
Microsoft
Hi jeddunn, all roads lead to the AvailableUpdates registry key.
- If you opt in to MicrosoftUpdateManagedOptIn and Microsoft is receiving diagnostic data, the Controlled Feature Rollout (CFR) should get to those devices - when it does, it will set AvailableUpdates and the certificates should begin to deploy.
- If you set AvailableUpdates on a device, the certificates will begin to deploy.
- For High Confidence devices in the monthly updates, this will also set AvailableUpdates. As does Group Policy and Intune.
The Microsoft Managed updates through CFR are cautiously deploying to more and more devices each day.
Arden - Microsoft- gman1138Copper Contributor
Hi Arden_White I had a similar question so thought I'd jump on here. :)
In Intune, if we set...Configure Microsoft Update Managed Opt In to Enabled
Configure High Confidence Opt-Out to Disabled
and ignore Enable SecureBoot Certificate Updates for common devices ie Dell, Lenovo, Surface etc, then the secure boot certs will only be rolled out when Microsoft deem it safe? We can leave the Enable SecureBoot Certificate Updates policy and not deploy it?
I think that will be safest for us if I understand it right, we are still working to get our bios versions updated, but want to get started on those which are ready to go with modern bios versions.
Thank you! :)
- mikemagarelliCopper Contributor
Arden_White RoySasabe Specifically for Server 2025, we're consistently seeing systems show the new certs installed, the registry value shows that servicing succeeded, no errors in the event logs, but also there’s no 1808 event (see screenshot). This is consistent across every 2025 system I’ve seen the new certs on, so I would assume that this is expected behavior and that the server has successfully updated, but I can find no documentation anywhere that says this would be expected behavior on Server 2025. Can the MS team please clarify whether or not we should always expect the 1808 event?
- DennisJorgensenCopper Contributor
Completely same experience here. Can add that the GPO setting Enable Secure Boot Certificate Deployment also doesn't work on Windows Server 2025. Works on earlier Windows Servers.
- mikemagarelliCopper Contributor
Hopefully Arden_White or someone else on the Microsoft team can shed some light on this.
Updated my Secure Boot analyzer script because the script provided in Microsoft documentation appears unclear to me about its usage.
- yukaeCopper Contributor
The tool to assess current state of the machine and the certificates was mentioned during the event. Where will it be released?
- HeyHey16KSteel Contributor
There was a Secure Boot report in Intune, but Microsoft have since (hopefully only temporarily) revoked it due to issues.
- jeddunnCopper Contributor
I would like clarification on the process on machines that have no internet access. We have 8 domains that have nothing but Windows 10 and 11 LTSC.
- Arden_White
Microsoft
There are several approaches that can work for offline environments. If the devices are typical client machines such as desktops or laptops, they will usually receive the Secure Boot certificates automatically through the monthly cumulative updates if they are identified as high confidence devices. Another option is to manage the deployment directly by instructing the devices to install the certificates through Intune, Group Policy, or registry-based configuration.
It is important to monitor each device in your fleet to understand its current status. Several registry keys and event log entries report the state of the Secure Boot update process. These documents are being updated this week, so check the Change log on each page for the latest information.
Building a dashboard that tracks these signals will help you understand how the deployment is progressing. In particular, watch the BucketConfidenceLevel in Event 1801, since it indicates whether the device qualifies as a high confidence system for automatic updates.