Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
This event has concluded. Follow https://aka.ms/securebootplaybook for announcements about future Secure Boot AMAs.
Get started with these helpful resources
327 Comments
- IT_SystemEngineerBrass Contributor
Please correct the error/misunderstanding regarding the GPO "Automatic Certificate Deployment via Updates"
Automatic Certificate Deployment via Updates
Enabled = HighConfidenceOptOut = 1
Disabled = HighConfidenceOptOut = 0
https://support.microsoft.com/en-us/topic/group-policy-objects-gpo-method-of-secure-boot-for-windows-devices-with-it-managed-updates-65f716aa-2109-4c78-8b1f-036198dd5ce7>> correct description!
#######
Secure Boot playbook for certificates expiring in 2026
>> incorrect description at the End! (Should be "Enabled")- Arden_White
Microsoft
Good eye! I'll see about getting that changed.
I believe theGroup Policy Objects (GPO) method of Secure Boot for Windows devices with IT-managed updates page has the correct description.
Thank you so much for this AMA
- Q1A) What happens to VMware UEFI VMs, as well as Hyper-V, Azure Local and Azure generation 2 VMs that are isolated from the Internet?
Q1B) What is the step-by-step procedere to change their Secure Boot root certificate at scale? Especially the Platform Key (PK)? - Q2: Is there any dependency on the root hardware for VMware ESXi hosts or Hyper-V hosts and the certificate change?
- Q3A) What happens to end user devices at home or work or physical servers which will not or never receive any UEFI firmware updates after the old root cert, especially PK expires?
Answer for Q3A:The device will continue to boot and function normally. However, it will no longer receive future security fixes for Windows boot manager updates or Secure Boot, compromising the security of the device. Source: General Questions, Q4
- Q3B) Will devices with the old expired (insecure) Root Certificate still be functional and booting Windows or other OSes using Secure Boot?
If yes, how is it ensured and secure that they boot with an expired (or even tampered) certificate?
If no, do you have a step by step guide how to remediate a relevant amount of these outdated systems at scale?
Answer for Q3B:
The device will continue to boot and function normally. However, it will no longer receive future security fixes for Windows boot manager updates or Secure Boot, compromising the security of the device. Source: General Questions, Q4.
You might need to update the devices manually when the OS is still supported. How-To: Michael Niehaus (PS Module) / Gunnar Haslinger (Guide), please use Edge for in-line translation. - Q3C) When the (Windows or Linux) OS deployed the new keys into the Firmware, and the PK remains outdated (CA2011), then the customer / user updates the Firmware, will Windows boot?
Asking because often Firmware (UEFI / BIOS Updates) reset the keys or entering setup phase. When I understand this correctly the PK key is outdated and revert the updates made by the OS.
What is your guidance here?
Answer to Q3C:
Resetting the DB / KEK after it has been updated with a BIOS reset / Secure Boot Reset or BIOS Update that does not contain the CA2023 PK might tamper Secure Boot - as designed -
Windows will stop booting due to the Secure Boot Violation. This might trigger Bitlocker, Windows Hello (PIN) and other features.
Source: Customer / IT Managed Systems Q1 & Q7, ref to Bitlocker / Windows Hello (PIN) - based on own tests. - Q4) Could you please describe, if any, the dependency between the OS level update process in the Windows, Windows Server or Azure Local OS and the UEFI firmware?
Answer to Q4:
For Windows Server, Hyper-V things should go well as Microsoft will try to update both DB and KEK in the VM. Before that a workaround was required.
Source: Customer / IT Managed Systems Q5 / General Question Q7 - Q5) What happens to older OS that are receiving ESU, or do not receive ESU? Theoretically all devices since Windows Server 2012 R2, 8.1 could be configured with UEFI OS Secure Boot.
Answer to Q5:
Windows OS with ESU are considered supported / eligible systems. Unsupported OSes will not receive any updates. They remain bootable but Secure Boot becomes insecure. See Q3. - Q6A) Is there any obligation for OEMs and ISV - especially including retail mainboard manufacturers, such as MSI, Asus, Asrock, Gigabyte, Medion, Huawei, Intel etc.- to update their UEFI firmwares?
Answer to Q6A:
Appears there is no eligibity for OEMs or ISV / Retail to provide updates. Source: Please consult OEM pages. Retail is missing out. I am asking for further clarification, esp. for non OEM systems, or OEM systems that are unlisted.
Q6B) what is their timeline?
Q6C) will this include all mainboard models and chipsets, which still could run CPUs, certified for Windows 11?
Context: Thinking about some million of custom build (workstation) computers or gaming computers out there that are not "OEM" and eventually not managed by organizations. - Q7) How can we ensure that default Windows RE partitions across the board, or custom Windows PE images are updated and compliant with the new Secure Boot root cert?
- Q8) Are Linux distros adopting this change?
Context:
When Microsoft adapted Secure Boot there was a large fallout with Linux distros which didn't support UEFI at all in grub /Kernel. Thankfully this has changed so no one has to turn off Secure Boot for using Windows and Linux on the same hardware.
Preliminary note:
My own tests are not running good! When Windows 11 has updated Secure Boot, Distros with older CA2011 certs cause a boot violation (as per design). - Q9) Are other vendors adopting the change?
Context:
Other vendors in business and non business bootable devices, including backup vendors, partition tools, driver and firmware updater - ISOs or USB creation tools by HPE, Dell, Seagate, Samsung etc.
My concern is that they will keep using the expired UEFI root certs, which could deny booting.
Macrium Reflect X is the first product I see that has implemented a choice for the new or old root certificate for Windows RE /PE rescue media.
added Q3C, having a better understanding.
added answers and sources, as per current availability pre this AMA event.
- Arden_White
Microsoft
Great questions. I'll do my best to answer some of these.
For Q1A&B and Q2)
In general, virtualized environment are like virtual OEMs. If you create a new VM in these environments, there's a good chance they'll come with the new certificates. For long running VMs, they'll need to be updated like existing machines in your environment. I'm not familiar with the ins and outs of these environments. A couple of details that I'm aware of:- Hyper-V support to allow KEK updates is expected to be available in March.
- VMware has some details on their site.
Q3A)
The firmware does not care about certificate expiration and will continue to use the certificates after they expire. The need to update certificates is 1) good PKI practice, 2) necessary to continue signing binaries/programs. The new certificates will allow signing of the Windows Boot manager, future Secure Boot updates, third-party boot loaders and Option ROMs. Without the new certificates, components signed with these certificates will not be trusted by the firmware.
6) There are many nuances to this question. I'll try to give some details
- If the device came with UEFI Secure Boot support and had the Microsoft certificates from 2011. That's a good start.
- If the firmware code for processing the certificate updates operates correctly, then that should allow the three certificates for the DB to be updated without issue.
- The KEK is more complicated. To allow Microsoft's KEK to be applied to a device, it should be signed by the device's Platform Key (PK). Microsoft has been working with OEMs to sign the KEK with their PK and send it back to Microsoft to be included in the cumulative updates. For the manufacturer of devices that have done this, the KEK update should work as well - again assuming no issues with the firmware performing the updates. If there is no PK signed KEK for a device, Windows will emit an 1803 event.
Q7) The Windows RE is using the same certificates and boot loader as the main OS and should not need updating. Bootable images such as PxE, USB drives, etc. will continue to work assuming the device has both the 2011 and 2023 certificate. If you add the 2011 certificate to the DBX, then bootable images will need to be updated to use the 2023 signed boot loader.
Q8) I don't know much about Linux distros. I know there are people in our team that are regularly working with the Linux community and care deeply about it. Adding the new certificates should not affect the trust of Linux since the existing trust is not removed. I don't know why the boot violations would occur.
- Chris_CrampBrass Contributor
Karl-WE
You have asked a lot of the questions I would have wanted answers to and more!
I have not seen Microsoft publish answers to the questions you ask, let's hope we can learn more at the AMAThis looks, like a lot of work for a lot of people to resolve all the issue arising from getting all our Secure Boot certificates updated.
Yesterday when I first heard about this after reading an email. I thought I would kick thing off by running the script on work laptop. So, my laptop which is only 2 years old does need its certificate updating. Now I spent a good few hours trying to update the certificate, but my laptop is stuck 'InProgress' and from all the research I have done it looks like a repair install is the only way it can be fixed.
So now I have another 53 client devices and 6 servers to check over and resolve. Due to a lack of budget where I work, we still have few client computers running Windows10, thanks a bunch Microsoft for keeping me in Job!- Kevin_Sullivan_MSFT
Microsoft
Sorry to hear about the issue with your laptop update. We'd appreciate if you can file feedback for that device.
Send feedback to Microsoft with the Feedback Hub app - Microsoft Support
These are the most comprehensive guidances I have found and some questions from above are answered in these. I would still like to have them answered in one place or suggest a single "Q&A" page based on relevant comments of the previous and the upcoming session.
1. Guide 1: Very complete: Secure Boot playbook for certificates expiring in 2026Thanks HeyHey16K for sharing the previous session. Please check the comments of this session.
WARNING: When using the GPO to enable the settings, that GPOs are marked. This means you can only configure them one time and then they will stick. Removing or reverting via GPO does NOT work!
The registry settings that directly edit required HKLM items could be reverted. For Example with a GPO Client Side Extension Registry item (GPO WinXP Look).
2. Guide 2: https://support.microsoft.com/en-gb/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f
the first script has an issue, using Write-Verbose instead of Write-Host.
Write-Verbose would only work if you save the script to a file then executing the file in PS with -verbose
Otherwise it will not give any output and just the error is there is any.
Also this guidance does not contain the required settings for the registry / GPO etc, but other information how to collect data.
- Q1A) What happens to VMware UEFI VMs, as well as Hyper-V, Azure Local and Azure generation 2 VMs that are isolated from the Internet?
- SimoneTacCopper Contributor
Is it valid to check for EventID 1808 to confirm that all certificates are updated ?
- Derek HarkinCopper Contributor
For devices that don't use autopatch (on networks not connected to Internet) will the CU have the information bundled in it to automatically kick off the high confidence deployment?
From January CU release notes:
Windows quality updates include a subset of high confidence device targeting data that identifies devices eligible to automatically receive new Secure Boot certificates
This seems to indicate applying the CU on its own is enough for this subset of devices, Windows Update/Autopatch connectivity not needed?
- Arden_White
Microsoft
Installing the January cumulative update does include the high confidence targeting data for some client devices, and the number of high confidence devices will increase over the coming months. This allows Windows to identify many devices that are eligible to automatically receive the new Secure Boot certificates without requiring Windows Update or Autopatch connectivity.
However, this applies only to the subset of devices covered by the high confidence data included in the update. It is still important to monitor deployment results in your environment. Event 1801 can help indicate when a device needs attention.
Devices that fall outside the identified high confidence subset require customer‑managed deployment, and this is especially true for servers and IoT systems. These device types are not expected to receive automatic updates and must be updated manually using the guidance in Secure Boot Certificate updates: Guidance for IT professionals and organizations.
- HeyHey16KSteel Contributor
Hey guys 👋,
In the last Secure Boot AMA (https://techcommunity.microsoft.com/event/windowsevents/ama-secure-boot/4472784) someone asked about the UEFICA2025Status Reg Key showing an unexpected status of "NotStarted". You responded to say you would investigate and advise what to do in this situation. We have this in our environment. When will we be told what to do please?- PieterP84Copper Contributor
Saw this only on computers that have a patching problem. See article:
https://support.microsoft.com/en-us/topic/group-policy-objects-gpo-method-of-secure-boot-for-windows-devices-with-it-managed-updates-65f716aa-2109-4c78-8b1f-036198dd5ce7
October or November 2025 patch level is required - ChromeShavingsCopper Contributor
From my understanding, the AvailableUpdates (0x5944) reg key needs to be applied and then a manual fire-off of the scheduled task needs to happen afterward. Once I did this, in this order, the status of UEFICA2023Status went from “NotStarted” to “InProgress”. It took me about 2-3 reboots for changes to take effect.
Questions I hope to have answered are below:
- Are all 3 certificates (2 DB and 1 KEK) required to rotate in? How many certificates do we need to check for to meet compliance? Some are checking for just one, some are checking for 3… which is it?
- If one certificate is missing in either the DB or KEK databases, is a firmware upgrade of the BIOS required?
- According to the documentation, there is an option for “Controlled Feature Rollout” using Microsoft Update Managed certificates (MicrosoftManagedUpdateOptIn). Not too concerned about the level of telemetry that is pulled; however, just curious if this is something that customers can turn on to quickly retrieve these certs. Or if it’s necessary for future cert rotations.
- And! What happens if a computer doesn’t have Secure Boot enabled? Or if Secure Boot is enabled, what happens to that device if not compliant by June of 2026?
- Prabhakar_MSFT
Microsoft
Setting 0x5944 does not require manual intervention to trigger the update. The Secure Boot Update schedule task is configured to execute 5 mins after the boot and then once every 12 hours. Task will automatically apply the certificates if task detects the setting in the next execution. The task can also be triggered manually to allow immediate application of the certificates.
Below are answers to your questions:
1) There is total 4 Certificates (3 in DB and 1 in KEK). Devices in Secured Core configuration that does not trust Microsoft UEFI CA 2011, only require 2 certificates (Microsoft Corporation KEK 2K CA 2023 and Windows UEFI CA 2023). Setting 0x5944 will ensure applicable certificates are deployed based on device configuration.
2) Some devices may have issues applying the certificates. It is recommended to apply latest available firmware updates from device manufacturer and then retry the certificate updates.
3) MicrosoftManagedUpdateOptIn enables Microsoft to leverage CFR (Controlled Feature Rollout) mechanism to safely rollout the certificate updates in the environment. This requires enterprises turning on Required diagnostic data. For more details on how to enroll to this setting, refer to https://aka.ms/getsecureboot
4) Secure Boot not enabled devices are not in scope for certificate updates. Devices will continue to receive the applicable security updates. We recommend enabling Secure Boot if device is capable to ensure devices get all Boot Security Integrity features.
- lalanc01Iron Contributor
Hi, any news/eta of the reporting capabilities in Intune to see which devices have the new cert?
thks- lalanc01Iron Contributor
I now see the new Secureboot report in Intune.
thks - Brandon_CornishCopper Contributor
I would like to know this too.