Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast.
Get started with these helpful resources
327 Comments
- Id_JamieCopper Contributor
if I build a new device how can I ensure the image I am using has the latest updates "without needing to set availableupdates 0x5944 key along with needing to run scheduled task "
- mihiCopper Contributor
availableupdates key will not change what is on your disk (which would be deployed by your image). It will change your firmware configuration.
When you build a new device and the device is Logo certified for Win11 25H2, it has to have the new certificates in the firmware already. When you are building a "new device" from old already used hardware, it might have the certificates already from its past use.
Still availablaupdates key is only needed if your device is not yet in the high confidence list. Otherwise it will get the updates even if the key is still set to 0x0.
And maybe your image deployment software has (or will get) an option to deploy the certificates to UEFI as well when deploying the image (fwupd for Linux can do it, for example, and it is also possible from WinPE by a script).
- Vinod7Brass Contributor
Also Secure boot report in the Intune portal under Autopatch has discrepancy with our own inventory PowerShell script. what can be the reason? There are many devices like this
- M_Wilkinson_Brass Contributor
Is there any risk to deploying the registry setting for AvaliableUpdates (or GPO/Intune) to all devices in your fleet?
- mihiCopper Contributor
If there wasn't, there would not be the option, it would just happen. Be able to service devices in case they get stuck or need a forced reboot. If you cannot handle it, wait for Microsoft to do it in the LCU and only do it later when you see that your configuration is too exotic to get handled by LCUs.
When you have your devices grouped by hardware model, start with a few from each model, then roll to all of them if no problems occur.
Nobody likes to see hundreds of frozen departure/arrival indicator screens in a large airport. Better only have one in each terminal frozen :)
- lkampeterOccasional Reader
How does this affect VMware virtual machines? Per Broadcom's article - "There is no need to take any manual action at this time. The ESXi host UEFI is managed by the vendor's BIOS firmware. Systems will continue to boot even if the UEFI certificates expire. This is not a cause for concern at the moment."
- RobC0619Copper Contributor
Intune configuration still errors out with error 65000 and policymanager licensing issue. This happens on any of our machines that were upgraded to Windows Enterprise through our e5's. When will this be fixed?
- Prabhakar_MSFT
Microsoft
Thank you for reporting this issue. This issue is now fixed. the devices will automatically remediate on next license renewal that happens monthly. For immediate resolution, refer to steps mentioned in known issue section in this article: Microsoft Intune method of Secure Boot for Windows devices with IT-managed updates - Microsoft Supp…
- AntonDobschenskyBrass Contributor
For that controlled rollout MS is managing, how far along is that. I'm seeing about half my devices showing as Up To Date in the new Secure Boot Status report. Should I at this point be concerned the remaining half will not fall into a bucket?
- Mike24Occasional Reader
Is the reporting workbook available in Intune for Windows Client Update policies?
- McGoldrickCopper Contributor
1) What is level of confidence that devices that cannot update their certificate will remain functional. Has it been tested somehow?
2) Any concerns with Registry key for enabling secureboot certificate updates being set on devices that are not able to update it (out of support devices that will not get a firmware update).
3) How quick should we expect to see BIOS updates for this to be made available in WUfB? Seems like there are a lot missing in our fleet
4) Will a device that does not get the latest secureboot certificate, still receive monthly cumulative updates if it is on a supported OS?
5) Any other impact/risk to devices that are not able to update their SecureBoot certificate?
6) Are there other mitigations we can take in our environment to ensure devices that cannot get the certificate are less vulnerable?
- Pearl-Angeles
Community Manager
Thanks for your questions! Panelists covered question #6 at 24:38 during the live AMA.
- mikemagarelliCopper Contributor
We've been seeing devices that appear to be eligible for the automatic Secure Boot cert updates based on the documentation available via MS but don't seem to progress. Can you confirm the minimum “eligibility checklist” for the automatic Secure Boot certificate update (OS baseline, update level, UEFI + Secure Boot, diagnostic data level, etc.), and which items are hard blockers vs “recommended”? Once a device is eligible, what is the typical timeline (hours, days, weeks) to observe progress?
- Pearl-Angeles
Community Manager
Thanks for your question! Panelists covered this at around 13:46 during the live AMA.
- Frank Rijt-vanBrass Contributor
Will the Intune 65000 error being fixed, hampering Intune Policies to update the certificates soon?