Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
This event has concluded. Follow https://aka.ms/securebootplaybook for announcements about future Secure Boot AMAs.
Get started with these helpful resources
327 Comments
- HeyHey16KSteel Contributor
Could you talk about the device's local Secure Boot enforcement mode (Strict, Standard, Audit etc.) please? Someone in our team mentioned it today - that if devices are in Strict mode they won't boot without the new certificate? I've not seen this mentioned in the MS docs I've read. Thank you 🙂
- Pearl-Angeles
Community Manager
Thanks for your participation in the AMA! Panelists covered this topic at around 9:10.
- HeyHey16KSteel Contributor
- mihiCopper Contributor
Posting the link from the footnote (windowsforum) would have been more useful than a screenshot of Copilot, as it would allow to see the original discussion and what actually was talked there. And do not forget that copilot can be wrong and often is when you use terms that are not official (like Secure Boot Strict Mode - There is Setup Mode and User Mode, but no Strict Mode in Secure Boot specification. Some UEFI also have "Custom mode" vs. "Vendor mode" which refers whether to use platform keys from the UEFI vendor or your own ones. But no Strict Mode).
- HeyHey16KSteel Contributor
The new "Secure Boot" Intune report (Reports > Windows Quality Updates > Secure Boot) only shows 100 devices onscreen out of all the devices in our estate - even when exported. The summary numbers at the top of the report I suspect are correct, but unable to confirm as the report itself is limited to 100 devices. Also keep seeing the below error when scrolling through the 100 it does show. Please can this be fixed 🙏
- dimitchavCopper Contributor
Hello, I would like to get some clairty on the following questions.
- Is there a prerequisite of updating the system to the latest BIOS / UEFI version from the vendor to before updating the certificates ?
- Is there a list of High Confidence devices that Microsoft is able to provide ?
- Outside of InTune deployment which method does Microsoft suggest using for the most reliable way to update the certificates ?
- The most recent one via WinCS (Option 3) ? or the (Option 2) via Registry keys?
- In the troubleshooting section Microsoft recommends you have the Bitlocker recovery key available.
- Does the updating the certificates via any of the methods suggest suspend bitlocker for them to apply and how do we monitor this via telemetry, events etc?
- If Secure boot is not on and we let the certificate expire and we enable secure boot at a later date, what is the impact ?
- mihiCopper Contributor
Q1: In the common case (no firmware bugs) it does not matter whether the firmware update is installed before or after updating the certificates. The firmware update will provide new certificates in case the UEFI variables are reset, and the certificate update will provide new certificates for the currently running system. If there is a firmware bug that lets the certificate update run into an error, obviously you need to install the firmware updates.
Q5: You will have to update the certificates at a later date, either from the system or via securebootrecovery.efi, or the system will stop booting in case it got a newer bootloader signed with the new certificates. As UEFI generally cannot securely validate timestamps, the update will either (most likely) just work or will require to switch back the system time before applying securebootrecovery.efi, and fix the system time again afterwards. So, as a worst case, a few more manual steps required.
- lalanc01Iron Contributor
Hi, I would like to have some clarification to know if we enable this
What is the Controlled Feature Rollout for secureboot?
Does that mean that MS will be in charge of updating the certs like for high confidence devices?
So it's kinda like us deciding which devices we know can have the cert renewed by MS?
Or it's something else?
thks for clarifying.- HeyHey16KSteel Contributor
That's how we have interpreted it - by configuring those RKs on devices, you're giving MS the greenlight to deploy the certs automatically to them.
- renzobarontiCopper Contributor
Is there a supported method to manually determine a successful deployment outside of a registry key value being switched to "Updated"? So far, I have yet to run into issues testing in our lab environment, but I don't have high confidence only relying on the registry key and event ID 1808...
Hi renzobaronti I have posted a script in the comments. This allows you to identify the situation at scale.
Ask Microsoft Anything: Secure Boot - February 5, 2026 - Windows Tech Community
- mikehartsteinCopper Contributor
We are using the AvailableUpdates=x5944 method to make these changes in our environment. Two out of our ~ten active, Win11-supported models of Lenovo desktops/laptops will not take the KEK cert update (the DB certs and bootloader update fine on them, but the KEK piece fails with Event ID 1795). In the last month, Lenovo has released BIOS updates for those models that add the 2023 certs to the default Secure Boot key stores, but not the active store, and the KEK update from within the OS still fails. Lenovo's recommended process is to update the BIOS and then use the "Restore Factory Keys" get the new certs into the active store. We have started doing this and it works but it is obviously a hands-on process (in particular, the "reset to factory keys" part cannot be automated and requires physical presence, as far as I know).
Is there any hope that Microsoft (maybe in partnership with these OEMs) will add "support" for more hardware models to take the KEK cert via AvailableUpdates before June, or, if it doesn't do it now, is that not going to change?
- mihiCopper Contributor
Event ID 1795 should include an error code that might be useful to diagnose this (Not all 1795 are equal).
For the KEK update to work, the OEM needs to submit a signed variable update with the new KEK that is signed with the Platform Key. and upload to Microsoft's secureboot_objects repo on GitHub. A list of all platform keys they have received (even those that did not make it into the January CU) with their thumbprint is available at
https://github.com/microsoft/secureboot_objects/blob/main/PostSignedObjects/KEK/kek_update_map.json
You can check the Subject and Thumbprint of the used platform key on affected machines that did not reload the factory keys, by installing and importing UEFIv2 Powershell module and running:
(Get-UEFISecureBootCerts pk).Signature | Format-List Subject,Thumbprint
If the thumbprint has already been submitted to Microsoft, it will probably be part in one of the subsequent updates and therefore the KEK update may work. If the KEK update causes a firmware error, the OEM might push a firmware update to fix this. So time can fix this.
The most likely case for a vendor like Lenovo to release a firmware update but not submit a signed KEK to Microsoft would be that they simply lost the private key to the PK used in those firmware versions. You can check on a machine that already uses the new factory keys (or by looking at pkdefault instead of pk if the firmware exposes that variable) if it uses a PK with different thumbprint. If yes, that is a telltale sign.
In that case, automated fixing is not possible (if the machine has an active TPM, which it probably has if it is Win11-supported). If Lenovo pushed a firmware update that either updated PK or KEK, it would invalidate PCR7 of the TPM and in case Bitlocker uses that PCR to seal their keys you would end up in Bitlocker recovery (which is a tedious manual step as well). And as long as they cannot sign a new KEK update with the PK as they lost it, Microsoft cannot do anything either.
That's exactly what Secure Boot tries to prevent.
- mikehartsteinCopper Contributor
mihi - thanks for clarifying why the BIOS update can't realistically update the active keys.
The two models we have that won't take the KEK update via the OS (as of the January B-Week CU, anyway) are PK thumbprints F2E851A4D6C74F0671DC0DCF392C96F94AE30816 and EF95E29CCE285D87734012EF940FB14EE0A7118B, respectively. Both of these have been on the JSON file you referenced since it was first published last May. The PK thumbprint is still the same after updating the BIOS to the version that adds the new certs to the factory defaults and performing a reset to factory keys.
It sounds like Microsoft still might add support, then? That said, with taking so long to do so, our hand is basically being forced to undertake an extremely intensive manual process, since we can't afford to wait until a month or two before June with no guarantee that Microsoft will actually get around to it and then not have enough time to complete the updates manually ourselves.
Can you give any insight into how much of a "backlog" MS has in adding support for PKs already submitted by vendors? Any specifics into when the two thumbprints I provided might be added?
- Joaki1810Copper Contributor
Given that :
- All Windows devices are one of the following manufacturers, Dell, Lenovo and HP
- All Windows devices are updated via WUfB (Intune update rings, Windows drivers = Allow, i.e. all BIOS are updated via WUfB)
- Full https://learn.microsoft.com/sv-se/windows/client-management/mdm/policy-csp-System?WT.mc_id=Portal-fx#allowtelemetry is configured (Allow Telemetry = Full) for all Windows devices
- Assuming that WUfB and AllowTelemetry are working as intended
Can we just sit back and wait for WUfB to update all Windows devices secure boot certificates?
- Matthew_StevensonBrass Contributor
Hello!
We are currently testing the cert update in our VMWare ESXi 8 environment for server OS. Testing 2016, 2019, 2022, and 2025. All VMs are fully patched and have latest VMWare tools installed.
After setting the GPO "Enable Secure Boot Certificate Deployment":
2016 updates all certs, EventID 1808 is written.
2019 and 2022, most certs are updated however the KEK is not, giving the Event error 1796.
2025 does not update any certs, nor does it start the update process at all.
- Anyone else having issues with VMWare guests and KEK update for 2019 and 2022?
- Any clue as to why 2025 is not even starting the update process?
Thanks!
- Arden_White
Microsoft
I found these two articles on the Broadcom site that might be helpful.
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
https://knowledge.broadcom.com/external/article/423919
Arden - Microsoft
- GoogolBrass Contributor
I am not sure why on my Server 2022 testing, but you can just update the KEK the same way you did the PK via EFI and broadcom instructions. they had it on their KB before, then was removed.
you just select enroll PK, then enroll KEK and select the cert on your drive you added to the VM.
now the PK and KEK is updated, start the reg key and updating process, goes to Updated status. you can verify the certs are there after
- LucasVitaCopper Contributor
Is there any risk in attempting to apply the Secure Boot certificate update (AvailableUpdates = 0x5944) before updating the BIOS/UEFI to the version recommended by the OEM? In other words, is having the latest BIOS strictly a prerequisite, or just a best‑practice recommendation?
In the troubleshooting documentation, Microsoft mentions that during the Secure Boot certificate update process a device may fail to boot or require a recovery key. Are these the main risks involved? How likely are these scenarios in real‑world deployments?
Finally, how can I detect if these no‑boot or recovery‑key events were actually caused by issues during the certificate update? What signals, logs, or telemetry can I use to monitor and correlate these occurrences?
- mihiCopper Contributor
As for the likeliness of the scenarios, I'd also like to hear feedback from Microsoft. But at least I can list a few scenarios I am aware of:
- Everything works flawlessly. Hopefully the most likely one
- One of the updates runs into a defined error, which is logged to event log and reflected in registry values. You are not off worse than not trying
- Bitlocker Recovery key required: This can only happen if Bitlocker is used and uses PCR7 in TPM in a key protector. In two possible scenarios:
- (1) Measured Boot cannot properly reseal the PCR after adding key to DB or KEK database.
- (2) One of the variables does not persist on boot, but the PCR has already been resealed to the new value
- In any case, this issue can be totally avoided by suspending Bitlocker before the attempted update for a few reboots. When resuming Bitlocker after the changes has happened and the system rebooted, the new PCR7 value can be obtained and used to re-seal PCR.
- The system freezes/hangs and requires a full power cycle to boot up again (with the old keys). Only a nuisance when deploying the changes remotely.
- The system reboots after apparently having applied the update but one of the values does not persist. As the bootloader is replaced after the first reboot, this will not cause any Secure Boot violations. It may (see above) result in Bitlocker Recovery key as PCR7 has been sealed to new keys but actually present keys are old keys.
- The system reboots, has applied the keys, but the boot fails with a Secure Boot violation due to a firmware bug. In that case, enter Setup, restore the values back to setup defaults, boot up again (again taking care of BitLocker as the PCR7 will not match or was cleared due to the UEFI reset) and best do not try applying the keys before getting the firmware updated (if available)
- The system reboots, but then is "bricked" (freezes on every reboot even before being able to enter the BIOS/UEFI setup). On some old systems, this has been a known, very rarely happening issue for any UEFI variable updates (not just DB/DBX/KEK), when the EFI variable store is almost full. There have been reports about this issue years ago, on very old firmware (think about the age of when Windows 8 came out), only happening very rarely, but if your machine is affected it could have as well happened during a normal DBX update. Probably less likely to encounter this in a corporate environment as machines are newer. And I would assume Microsoft would by now have applied safeguards not to apply any UEFI variables updates (neither DBX updates nor the new Secure Boot Certificate updates) on such devices if the UEFI variable store is almost full.
- Matt_RinaldiCopper Contributor
Hello, I'm looking for some clarity regarding BIOS updates. It is my understanding that if we choose to leverage the REG keys (https://support.microsoft.com/en-us/topic/registry-key-updates-for-secure-boot-windows-devices-with-it-managed-updates-a7be69c9-4634-42e1-9ca1-df06f43f360d) to enable updating the Secure Boot Certs via Cumulative Updates, all the required certs will be updated in the Active DB without requiring any BIOS updates. However, this process will NOT update the certs in the Default DB, only a BIOS update can update the Default DB. Is this all correct?
If the above is correct, what would occur in a scenario where the Active DB was updated but BIOS was never flashed, and 6 months after the 2011 certs expire, a device with an old BIOS version (missing 2023 certs) is reset to defaults? I assume since the Default DB was never updated, the device would revert back to the old 2011 certs. If that occurs, would this device still be able to boot/PXE?From my searching this is the basic understanding I have; however, I'm not sure if it's accurate:
Update Mechanism Updates Active DB Updates Default DB Required for long‑term compliance Cumulative Updates (AvailableUpdates opt‑in) ✔ Yes ✘ No Partial – active DB only OEM BIOS Update ✔ Yes (after reset) ✔ Yes Full compliance & future‑proofing
Would it be fair to say ensuring the Active DB is updated before June 2026 is most important, and the Default DB is more of a secondary concern? Essentially I'm just trying to understand the best order of operations here regarding leveraging Cumulative Updates vs BIOS updates to handle this process.- mihiCopper Contributor
As the new bootloader on disk will be signed with 2023 certs, it will deny the boot with a Secure Boot violation. But you can boot external media from "C:\Windows\Boot\EFI\SecureBootRecovery.efi" which will add back (just) the 2023 Windows CA certificate to DB, so that the system can boot again and fix up the rest. In this process, PCR7 sealing of TPM will cause a mismatch (if not already the resetting of the UEFI did so), so if you use Bitlocker sealed against PCR7, you'd also need the Recovery Key. Afterwards, the booted system will restore the rest of the KEK/DB/DBX certificates.
Booting from PXE would also require to boot from a different image (signed with the old keys) and chainloading securebootrecovery.efi.