Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast.
Get started with these helpful resources
327 Comments
- LarsDKOccasional Reader
We are rolling this out with the Intune policies, and overall it appears to be working well. The new report in Autopatch looks great - thanks.
However, we have encountered a consistent issue with Dell OptiPlex 3040 and 7040 systems.
On these models, running the latest firmware and Windows 11 LTSC (unsupported, we understand), the machines lock up completely a few minutes after boot when network access is available. There is no blue screen or crash dump—the system simply freezes as if time has stopped. This behavior does not appear to occur when the network is disconnected.
These devices have been running since purchase in 2016 and have been using the same Windows 11 LTSC image since it was released, without prior issues.
We have confirmed that disabling Secure Boot in the BIOS immediately resolves the problem. Every OptiPlex 3040 and 7040 that has received this policy is affected.
These models must be on the known good list, but this specific configuration clearly does not work as expected.
- Eric_BlCopper Contributor
Hi Lars,
I got exactly the same behavior on my older machine as described in this previous comment:(complete freeze of the PC after 5 min, and only when network is access is activated, caused by a scheduled task trying to update the certificates, see my comment. My PC is running Windows 10 Pro ESU, and has a i5 4670k CPU from 2013 so Gen4! It has no TPM chip despite having a connector for extra module).
AFAIK, your systems are running Gen6 of Core CPU, correct?What means the "yeah" in AaronCR's question? It is failing despite those settings or no failure anymore after the settings?
Likely keeping SecureBoot activated but disabling the "enable secure boot certifcate updates" will stop running the task freezing the systems.
As mihi responded to my other comment, "for the foreseeable future, having a system that has secure boot enabled but expired KEK only (or even expired KEK and expired DB) is still more secure than secure boot off, as it will properly protect agaisnt a lot of old attacks. It will not protect against new attacks, but disabled Secure Boot will neither." - AaronCRCopper Contributor
Hello LarsDK,
Do you just have the below config set and its working?
- LarsDKOccasional Reader
Yeah!
Hi there I've noticed a problem with AMD consumer platforms. Confirmed with two different AMD chipsets, SVM (CPU Hyper-V required feature) is disabled by default. But this is required along with Secure Boot to make use of VBS and other subsequent security features, that are to be set in Microsoft Security App (Defender).
- mikemagarelliCopper Contributor
After today's AMA, I think I understand that as long as IT managed systems are configured with this reg key / value - 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates' to '0x5944', that should trigger the system to apply the updated Secure Boot certs as long as the firmware supports the update and the machine has the certs via CU. Can you please verify that my understanding is correct? If it's not correct, what additional requirements am I missing? Additionally, with the above configuration, what does timing look like? Should the certs be applied relatively quickly or is there still a wait period before you should expect the updated certs?
- mihiCopper Contributor
Is correct.
Should be applied relatively quickly (when the scheduled task runs again). Note that the boot manager will be updated only after next reboot (when certificates have been installed properly).
- Pearl-Angeles
Community Manager
Thanks for your participation in today’s AMA! We’ll post a recap of the questions panelists answered during the live AMA, shortly.
- DPelleCopper Contributor
what about the 65000 error in Intune.... there are enough people posting this, why isn't it being covered in this discussion thoroughly?
- xrpfan1337Copper Contributor
Not super important, It will get fixed by another team soon. This AMA was more about the process and technical background.
- Jacktech76Copper Contributor
I'd also like an answer on if this will be fixed. Here's a really good resource on why its happening for anyone that hasn't found it already. Should be the top result if you search it by title: "Policy is rejected by licensing: Error Code 0x82B00006"
https://patchmypc.com/blog/intune-policy-rejected-by-licensing/
- laytonm21Copper Contributor
In my environment, we are not currently consuming all the event logs to look for 1808, but I have a MECM (SCCM) baseline looking for the regkey status of "Updated". For those workstations that show "Updated" does that mean they are good? Nothing else to do?
- DonDottaNonHottaOccasional Reader
Are you guys aware if there are plans to allow the OS to automatically suspend BitLocker protection when a firmware update comes down via Windows Update on devices where Secure Boot is enabled but the PCR 7 binding is not possible?
Firmware updates coming from WU are currently being prevented from installing when Bitlocker Protection is On and the PCRs are set to 0,2,4,11 (generally devices with Secure Boot turned off). The main concern is a subset of devices that leverage OROMS can not bind PCR7 when Secure Boot is enabled and BitLocker is enabled. This causes an SB enabled device to have 0,2,4,11 PCRs preventing them from receiving important firmware updates with updated Default DB 2023 certs. Depending on the client base to suspend bitlocker protection periodically is not a viable solution and doing it automatically via Remediation script would be a security concern. - knmcelhaneyCopper Contributor
If a device receives the new certificate in the active db and is later reimaged, would the device lose the new certificate? I'm unclear how reimaging affects the db/bootmgr since the drive has to be en-encrypted?
- mihiCopper Contributor
active db is stored in your firmware/NVRAM, so should not be touched by anything you can do to your drives.
- HicksterCopper Contributor
Does triggering the update manually via registry key in a corporate environment on sample machines help to develop the confidence buckets?
- mihiCopper Contributor
If you have (full) telemetry enabled and the telemetry is not blocked by the corporate firewall, it will help, regardless which method the update has been pushed.
- kumarshai88hotmailcoCopper Contributor
Is there any potential impact on installed applications following the renewal of Secure Boot certificates? Is there any rollback plan in case of any issues?