Event details
Want to ensure you maintain a trusted boot environment for your Windows devices? Walk through essential guidance - including how to test firmware, monitor device readiness, deploy updated certificates, and diagnose issues using the latest tools and deployment aids. Learn what’s changing, why it matters, and how to ensure your fleet stays secure and compliant ahead of the deadline. Whether you manage a small set of devices or a large enterprise environment, you’ll leave with practical steps to confidently navigate this major Secure Boot update.
Speakers: Sochi Ogbuanya & Jordan Geurten
This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, click Attend for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.
48 Comments
- Steve CheckettsCopper Contributor
Hi,
Have you any docs to cover inventory & deployment/best practices based on MECM. the only articiles i can seem to locate refer to Intune
Also, once the updated certificates are installed, have you the process of what is required to update WDS / PXE services with an updated Boot image?
- mihiBrass Contributor
Just installed KB5079473 on my Win11 machine that acts as a Hyper-V host. KEK updates in VMs are still not working (failing with error 1795). Is that expected? Has the Hyper-V update been delayed?
Die Systemfirmware hat beim Versuch, eine Variable für den sicheren Start KEK 2023 zu aktualisieren, den Fehler Zugriff verweigert zurückgegeben. Diese Gerätesignaturinformationen sind hier enthalten.
DeviceAttributes: FirmwareManufacturer:Microsoft Corporation;FirmwareVersion:Hyper-V UEFI Release v4.1;OEMModelNumber:Virtual Machine;OEMManufacturerName:Microsoft Corporation;OSArchitecture:amd64;
BucketId: 4e22d051e8c143d2875b9d16ef2241c7ec548985a21e5073126d3c1f9bf53bb2
BucketConfidenceLevel: .
Weitere Informationen finden Sie unter https://go.microsoft.com/fwlink/?linkid=2169931This is from a Windows 10 LTSC 2019 VM with system language German.
- Arden_White
Microsoft
mihi,
I don't know why this isn't working. I'm seeing others that are saying they were successful. One person said it took a little while before they worked.
I forgot to say: one other detail is that you need to apply the March updates on the guests as well. This will give the guests a Hyper-V PK signed KEK to apply. That is not why you got the 1795 event but wanted to make sure you (and everyone else) were aware of this.
Let me know if you can't get it solved.Arden
- mihiBrass Contributor
Thanks for the feedback, after applying the updates on the guest as well, it indeed went through.
- link470Copper Contributor
I've watched the video and read the comments a few times, and I think I'm getting closer to understanding, but I still have some questions. Let's assume the devices below are all released within the last few years, and have their BIOS/UEFI fully up to date and are on the manufacturer list of devices capable of installing 2023 secure boot certificates.
[1] Windows devices on an Active Directory domain (GPO managed, not InTune managed), with the Allow Diagnostic Data GPO set to Enabled and Diagnostic Data Off will never add the secure boot certificates to UEFI and update the boot loader automatically. Is this correct?
[2] My understanding is that the GPO Automatic Certificate Deployment via Updates, if set to Not Configured, means that Windows will go ahead and add the secure boot certificates to UEFI and update the boot loader automatically come time that Microsoft deems a domain joined system is high confidence for success. Is this correct?
[2.1] If the above is correct, will the secure boot certificates and boot loader update automatically even if the Enable Secure Boot Certificate Deployment GPO is set to Not Configured, and the Allow Diagnostic Data GPO is Enabled and set to Diagnostic Data Off? If the answer is No, which of those two GPOs, or both, are required for successful automatic deployment when Microsoft deems the devices are in a high confidence bucket? For the Allow Diagnostics Data GPO, if this is required, which level of diagnostics are required (required or optional)?
[3] Is the Allow Diagnostic Data GPO required to be set to Enabled and Send required diagnostic data or Send optional diagnostic data in order for the updated secure boot certificates and boot loader to be deployed and activated for any scenario, or does enabling the Enable Secure Boot Certificate Deployment GPO completely bypass the need for sending diagnostic data or Microsoft confidence buckets, and you're essentially saying "yes, I've updated the BIOS/UEFI on these machines, so my own confidence is high and I'm telling machines to go ahead and update the secure boot certificates and boot loader"?
[4] A regular, non-domain joined and non-Entra managed, residential consumer PC running Windows 11 doesn't need to do anything and will receive the certificates and boot loader update automatically, because that device is always sending at least the required level of diagnostic data, which can't be turned off. Is this correct?
Thank you!
- Arden_White
Microsoft
[1] If the device is not sending diagnostic data, there is still an alternate path for Secure Boot certificates to be applied. Devices can be included in the High Confidence database that is delivered with cumulative updates. When a device is identified as High Confidence, the Secure Boot certificates are applied automatically.
For client devices, there is a relatively high likelihood of being classified as High Confidence. This is much less likely for server and IoT devices.
[2] Yes. Automatic application occurs for devices that are determined to be High Confidence based on data from other similar devices.
[2.1] The default Secure Boot behavior will automatically apply certificates for High Confidence devices. Leaving Automatic Certificate Deployment via Updates set to Not Configured or Disabled allows this path to function. Unless there is a strong reason to avoid relying on this mechanism, it is generally recommended.
As you noted, Certificate Deployment via Controlled Feature Rollout must be Enabled, and Required diagnostic data must be sent for this option to work. This can be more difficult for some IT organizations, either due to data‑sharing policies or challenges ensuring diagnostic data reaches Microsoft.
[3] Yes. Enabling Enable Secure Boot Certificate Deployment bypasses the need to send diagnostic data. This explicitly instructs the device to apply the Secure Boot certificates and the 2023‑signed boot manager. This option is appropriate when you have confidence that the device firmware can successfully process the update.
[4] Yes, that is correct.
Additional note on firmware updates
Firmware updates are not required in most cases. They are primarily needed when there is a firmware defect that prevents Secure Boot certificates from being updated, or when you want the new certificates present in the firmware default variables. The default variables are used to initialize the active Secure Boot variables.
I hope I've answered your questions.- link470Copper Contributor
Thanks very much, this helps a lot!
- jeddunnCopper Contributor
Thanks for the info. I do have a question about the status key value. In our environment, we have a large number of the devices that do not have the key value of UEFICA2023Status rather, we have the key value of WindowsUEFICA2023Capable which is set to 2. I have validated that the device is booting off the 2023 cert but would like some clarification on why we are seeing this?
- mihiBrass Contributor
Assuming they are on current patchlevel, I would assume they have been delivered with the new 2023 certificates from the factory and therefore the job would have never needed to update anything.
- Arden_White
Microsoft
It would be worth checking to see if the System Event log has 1801 or 1808 events. If 1808 events, then all is well. If 1801, then it may be that the KEK and/or the 3rd party CAs were not shipped as part of the firmware.
The WindowsUEFICA2023Capable key can be misleading as it only indicates status of the 1st party CA and boot manager. I don't recommend using this key for that reason.
- AuzMacCopper Contributor
We have a WinServer 21H2, build 20348.4773, VMware virtual servers on VMX21, BIOS Date 2025-01-17.
Ran the CheckCA2023 script and stepped through the check, SET and Start task, rebooted twice, only to find this error in the logs for Event ID 1796:
"The Secure Boot update failed to update KEK 2023 with error Invalid access to memory location.. For more information, please see https://go.microsoft.com/fwlink/?linkid=2169931"
When we refresh the CheckCA2023, we see:
AvailableUpdates equals 0x4004 "A PK signed KEK from the OEM isn't available"
UEFIACA2023Status is "In Progress - The update is actively in progress"
WindowsUEFICA2023Capable: 0x0002.
UEFIACA2023ErrorEvent is 1796 and references what I put it quotes above.
We did come across this as well, as it pertains to VMware:
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
https://knowledge.broadcom.com/external/article/423919/manual-update-of-the-secure-boot-platfor.html
- Joaki1810Copper Contributor
Will Windows 11 (24H2/25H2) devices that are hotpatch enabled also get Secure Boot updates?
I’m wondering because the normal (with reboot) LCU for February notes Secure boot under Improvement. But no such information for the hotpatch variant for February.
https://support.microsoft.com/en-us/topic/february-10-2026-kb5077181-os-builds-26200-7840-and-26100-7840-f0fa9e54-a22a-4a06-96b6-bf5b2aded506https://support.microsoft.com/en-us/topic/february-10-2026-hotpatch-kb5077212-os-builds-26200-7781-and-26100-7781-722c74c5-ea30-4622-8436-6b8dcb975b2b
- Arden_White
Microsoft
Hi Joaki1810,
Hotpatch updates are security‑only updates. The OS support required for Secure Boot certificate updates was delivered in prior monthly cumulative updates, including those released before the January hotpatch baseline.As a result, hotpatch‑enabled Windows 11 24H2 and 25H2 devices can still receive Secure Boot certificate updates. In most cases, these certificate updates can be applied without a reboot. Some Secure Boot changes do require a restart, such as applying a newly signed Windows Boot Manager, and those changes are applied during the baseline month when a reboot occurs.
For devices relying on hotpatch, High Confidence targeting data is only updated during baseline months. When that High Confidence data is refreshed, hotpatch‑enabled devices that meet the criteria will have their Secure Boot certificates updated at that time.
This is why Secure Boot improvements may be called out in the standard February cumulative update but not explicitly listed in the February hotpatch update.
Arden
- lfreiCopper Contributor
hi, is there a way to check the signage of bootx64.efi (and the other) with powershell or cmd?
- trevorjonesBrass Contributor
I use the following code to check certificate on the boot file in the EFI partition. You could simplify by using mountvol if you prefer. This is just for the active boot file - not the copy in the Windows file system (C:\Windows\Boot\Efi)
$SystemDisk = Get-Disk | Where-Object IsSystem if ($SystemDisk) { $SystemPartition = Get-Partition -DiskNumber $SystemDisk.DiskNumber -ErrorAction SilentlyContinue | Where-Object IsSystem if ($SystemPartition) { $params = @{ DiskNumber = $($SystemPartition.DiskNumber) PartitionNumber = $($SystemPartition.PartitionNumber) AccessPath = 'S:' } Add-PartitionAccessPath @params -ErrorAction SilentlyContinue $SystemPartition = Get-Partition -DiskNumber $SystemDisk.DiskNumber -ErrorAction SilentlyContinue | Where-Object IsSystem if ($SystemPartition.AccessPaths -contains 'S:\') { $bootmgrPath = Join-Path 'S:\' 'EFI\Microsoft\Boot\bootmgfw.efi' if (Test-Path $bootmgrPath) { try { $cert = [System.Security.Cryptography.X509Certificates.X509Certificate2]::CreateFromSignedFile($bootmgrPath) } catch { } if ($null -ne $cert) { $issuerName = $cert.Issuer $commonName = $issuerName.Split(',')[0].TrimStart('CN=') $dateString = $cert.GetExpirationDateString() $notAfter = $dateString | Get-Date -Format "yyyy-MM-dd HH:mm:ss" $expiresInDays = ((Get-Date $dateString) - (Get-Date)).Days } } Remove-PartitionAccessPath @params -ErrorAction SilentlyContinue } } }- lfreiCopper Contributor
thanks, the CreateFromSignedFile was the missing part for me.
- Claude_Boucher_OEMCopper Contributor
After watching the demo... all those command lines 😅
Maybe this could help 👇
CheckCA2023 — PowerShell + XAML utility that puts all of this in a single graphical interface : Secure Boot certificate stores, registry keys, Event IDs — no command line required 😊
https://github.com/claude-boucher/CheckCA2023
- mihiBrass Contributor
I have to say that I like your UI.
Would you mind adding some more metrics/information?
- Which certificate \EFI\Microsoft\Boot\bootmgfw.efi on EFI system partition is signed with
- Reason: In Multiboot scenarios (e.g. Win10+Win11, or multiple systems using Boot2VHD) the "global truth" does not always match the "local truth" reflected in the system registry
- In case EFI system partition contains \EFI\boot\bootx64.efi, whether it is a Microsoft boot loader and if yes which certificate it is signed with
- Reason: When working with multiple OS (Win+Win, or Win+Other), sometimes there appears such a fallback bootloader, which may be used by the firmware for booting despite a "correct" bootloader is present in the EFI variables. Getting to know whether that one is still outdated
- The thumbprint of the Platform Key in a form that can be copied.
- Whether
"C:\Windows\System32\SecureBootUpdates\KEKUpdateCombined.bin" of the currently booted Windows instance contains a KEK update for that platform key
- Whether https://github.com/microsoft/secureboot_objects/blob/main/PostSignedObjects/KEK/kek_update_map.json contains a KEK update for that platform key
- Reason: Getting a better feeling whether there is a chance that the KEK gets updated when flicking the switch now, and whether there is a chance for it to work in the future
Thank you.
- Which certificate \EFI\Microsoft\Boot\bootmgfw.efi on EFI system partition is signed with
- Stuart_SmilesCopper Contributor
What do people do where it's a non-business device, it's got win 11 but not on the boot certificates update list as only some devices have been added to it ?
How are normal users going to be able to do this ?
MS OEM list:
https://support.microsoft.com/en-us/topic/original-equipment-manufacturer-oem-pages-for-secure-boot-9ecc3ba4-fb50-4bd3-9e9b-f16b35b8fb68
Dell info:
hxxps://www.dell.com/support/kbdoc/en-us/000368610/how-to-update-secure-boot-active-database-from-bios
costs and Duration:
Is there a cost associated with the new certificates?
There is no direct cost for receiving the 2023 certificates using Windows Update, and the 2023 CAs are already available for free at [ hxxps://learn.microsoft.com/en-gb/windows-hardware/manufacture/desktop/windows-secure-boot-key-creation-and-management-guidance?view=windows-11]
However, BIOS updates for out-of-service devices may require manual intervention or service engagement, which could incur costs depending on support agreements.
>>
Dell devices supported list: - how do consumers resolve if their equipment is not on the lists for bios updates below, but does have win 11 ?
hxxps://www.dell.com/support/kbdoc/en-us/000347876/microsoft-2011-secure-boot-certificate-expiration#Lat
HP devices supported list:
hxxps://support.hp.com/us-en/document/ish_13070353-13070429-16
Lenovo Supported list: [ from MS List above ]
- Claude_Boucher_OEMCopper Contributor
Don't be afraid of the "minimum BIOS version required" or "compatible hardware" lists you can read on LENOVO, DELL, HP, ... Web Site. (in rare case you need to upgrade your Bios before using MS CA 2023 Process)
BIOS updates from your OEM will provide certificates stored in a dedicated area of the firmware — but the certificates needed to start the Secure Boot chain are actually provided by Microsoft through the process they described. And of course there is absolutely no cost involved.
If you only have a few devices, the simplest path is just to let Windows Update handle it — it will deliver the necessary certificates and boot loader updates automatically.
see my other message ;) - Arden_White
Microsoft
Hi Stuard_Smiles,
For home users, Secure Boot certificate updates are delivered automatically through Windows Update at no cost. OEM BIOS lists are provided for reference when firmware updates are required, but most Windows 11 devices do not need manual action unless the system reports a compatibility issue.
Arden
- SCCM_TerrorCopper Contributor
The Intune-Policy still cannot be used, as I get an error on most of the clients: "Enable Secureboot Certificate Updates - Error 65000".
All of the clients are EntraOnly-Joined Win11 Enterprise 24h2/25h2. Windows is activated with M365 License. Will you fix this policy before June 26?
- Arden_White
Microsoft
Hi SCCM_Terror,
we recently discovered an issue with Windows 11 23H2 Enterprise-Pro where you would still get this error. A fix for this is planned for the April updates. It should be working with Windows 11 24H2 and 25H2.
Sorry for the inconvenience.Arden
- Steven R KisterCopper Contributor
Still seeing the 65000 error on Windows 11 25H2. Followed MS doc
https://support.microsoft.com/en-us/topic/microsoft-intune-method-of-secure-boot-for-windows-devices-with-it-managed-updates-1c4cf9a3-8983-40c8-924f-44d9c959889d but issue remains.
Resolution
The Microsoft Intune licensing service was updated on January 27, 2026, to allow Secure Boot configuration settings deployment on Pro editions of Windows 10 and Windows 11. Devices that received their Microsoft Intune license before this date will need to renew their license to resolve this issue. Licenses are automatically renewed every month, so this issue will be resolved for all devices by February 27, 2026. To resolve this issue immediately, you can renew the license on your device by running the following commands on the user's behalf (under the user's context):
- ClipDLS.exe removesubscription
- ClipRenew.exe