Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast.
Get started with these helpful resources
327 Comments
- DonDottaNonHottaOccasional Reader
Are there plans to prevent SB enabled devices without updated certs from upgrading to future OS versions where the Boot Manager is signed with the 2023 certs (26H2?)
- mihiCopper Contributor
25H2 shipped with both boot managers, and insider builds do as well (\Windows\Boot\EFI vs \Windows\Boot\EFI_EX). I would assume that 26H2 will still ship with both boot managers, albeit the 2011 signed one not being updated any longer.
Nobody knows about the more distant future, but my guess is that even 27H2 will ship with both boot managers.
- cjsantoCopper Contributor
If I am not mistaken it was mentioned about updating firmware and installing related windows update. My question: Do we need to do both or just update the firmware or install the related Windows update? Thank you.
- mihiCopper Contributor
Both will have different effects. Firmware updates will fix firmware bugs and change the "default db" which is/may be used for Secure Boot if you reset your UEFI settings. OS updates will udpate the "active db" which is used by the current system.
In case there are no firmware bugs related to UEFI variable updates, and you won't mess with your UEFI settings, you only "need" the Windows updates.
If you only install the firmware updates, you will have to mess with the UEFI settings (reset UEFI settings) for it to take effect for the current system. Not recommended in case BitLocker or TPM are used.
- brandonlacekOccasional Reader
I can see from event ID 1801 that devices are in buckets but there's nothing listed for BucketConfidenceLevel. Does this mean Microsoft isn't confident enough? Why is it just blank? If there is a BucketId shown, do we need to do anything else other than keep an eye on it? For context, we use WSUS -- not sure if that matters.
- PaulJones22Occasional Reader
we've seen in our estate that users are getting prompted for bitlocker recovery keys, is this expected behaviour?
- Mabel_Gomes
Microsoft
Bitlocker recovery is not expected assuming the key updates are being done following our documentation; it can happen in some specific occasions or if you are doing it directly via firmware update.
- DPelleCopper Contributor
Why have you made it so difficult to join this event. I am not able to join and signed up over a week ago. It will not add to my calendar.
- GoogolBrass Contributor
if we update the PK file via efi for vmware guest os, is there a future update for updating KEK since its not occurring? some coordination between microsoft and broadcom on this? or do we need to apply the KEK manually via the efi then I see it going to status Updated.
what is the best way to validate systems are completed, just be in Updated status?
- lord_eddard_starkCopper Contributor
I’m planning to enable the Intune policy and use Intune reporting to target BIOS updates only to devices that still show they don’t have the updated Secure Boot certificates. The goal is to avoid a blanket, enterprise-wide BIOS update rollout given our size (150000+ devices) and the 150 hardware models we support. Any concerns or recommendations?
- Id_JamieCopper Contributor
how can I validate my WINRE has been updated correctly I havent seen any commands to run from WINRE only seen scripts which is in powershell which isnt in WINRE.
- Mike24Occasional Reader
I'm seeing the below error: Write-Host "Event 1801 found but confidence value not in expected format? How can we troubleshoot this error when machines are sending telemetry to Microsoft, and Firmware is updated.
- jeddunnCopper Contributor
Will Microsoft force the revocation of the 2011 certs at some point?
- Pearl-Angeles
Community Manager
Thanks for your question! In addition to Mabel's response below, the panelists answered this live at 35:34.
- Mabel_Gomes
Microsoft
Thanks for the question. There is no immediate plan to automatically apply 2011 certificate revocation. Enterprises can plan the 2011 certificate revocation once all boot sources have been updated.