Event details
Want to ensure you maintain a trusted boot environment for your Windows devices? Walk through essential guidance - including how to test firmware, monitor device readiness, deploy updated certificates, and diagnose issues using the latest tools and deployment aids. Learn what’s changing, why it matters, and how to ensure your fleet stays secure and compliant ahead of the deadline. Whether you manage a small set of devices or a large enterprise environment, you’ll leave with practical steps to confidently navigate this major Secure Boot update.
Speakers: Sochi Ogbuanya & Jordan Geurten
This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, click Attend for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.
54 Comments
- mijedanofficeitCopper Contributor
Hi Guys. After watching this very informative video, I'm still left with a single question.
Assume a customer decides to apply Intune policy to "push" new certs via CFR, and some devices does not have a hardware BIOS, that is updated. Will the deployment just fail silently or can It cause any issues on those devices.
- mihiBrass Contributor
If the device does not use Secure Boot, the deployment will do nothing.
If the device has Secure Boot, it has some kind of firmware where environment variables are stored (or else Windows could not boot as it could not store the location of Windows Boot Manager) - an attempt is made to update those variables with the latest certs.
This update can fail (both on hardware and virtual machines) due to implementation bugs in the firmware, causing a freeze or in the unlikely worst case a system that won't boot automatically again. That is the whole reason why Microsoft is adding so many switches and does not just apply the update everywhere. But this is unrelated whether the firmware is "a hardware BIOS" or "not a hardware BIOS", whatever that might refer to (e.g. a firmware that is not called BIOS but UEFI++, or a firmware that does not have a built-in setup menu, or the virtual firmware of a virtual machine).
- Claude_Boucher_OEMCopper Contributor
Dear Team,
I have updated CheckCA2023 to version 1.3.0 and added several new features.
You are more than welcome to share your feedback or suggestions in the Issues section of the GitHub page.
I will continue adding features based on your needs.
GitHub : https://github.com/claude-boucher/CheckCA2023
- Steve CheckettsCopper Contributor
Hi,
Have you any docs to cover inventory & deployment/best practices based on MECM. the only articiles i can seem to locate refer to Intune
Also, once the updated certificates are installed, have you the process of what is required to update WDS / PXE services with an updated Boot image?
- mihiBrass Contributor
Just installed KB5079473 on my Win11 machine that acts as a Hyper-V host. KEK updates in VMs are still not working (failing with error 1795). Is that expected? Has the Hyper-V update been delayed?
Die Systemfirmware hat beim Versuch, eine Variable für den sicheren Start KEK 2023 zu aktualisieren, den Fehler Zugriff verweigert zurückgegeben. Diese Gerätesignaturinformationen sind hier enthalten.
DeviceAttributes: FirmwareManufacturer:Microsoft Corporation;FirmwareVersion:Hyper-V UEFI Release v4.1;OEMModelNumber:Virtual Machine;OEMManufacturerName:Microsoft Corporation;OSArchitecture:amd64;
BucketId: 4e22d051e8c143d2875b9d16ef2241c7ec548985a21e5073126d3c1f9bf53bb2
BucketConfidenceLevel: .
Weitere Informationen finden Sie unter https://go.microsoft.com/fwlink/?linkid=2169931This is from a Windows 10 LTSC 2019 VM with system language German.
- Arden_White
Microsoft
mihi,
I don't know why this isn't working. I'm seeing others that are saying they were successful. One person said it took a little while before they worked.
I forgot to say: one other detail is that you need to apply the March updates on the guests as well. This will give the guests a Hyper-V PK signed KEK to apply. That is not why you got the 1795 event but wanted to make sure you (and everyone else) were aware of this.
Let me know if you can't get it solved.Arden
- mihiBrass Contributor
Thanks for the feedback, after applying the updates on the guest as well, it indeed went through.
- link470Copper Contributor
I've watched the video and read the comments a few times, and I think I'm getting closer to understanding, but I still have some questions. Let's assume the devices below are all released within the last few years, and have their BIOS/UEFI fully up to date and are on the manufacturer list of devices capable of installing 2023 secure boot certificates.
[1] Windows devices on an Active Directory domain (GPO managed, not InTune managed), with the Allow Diagnostic Data GPO set to Enabled and Diagnostic Data Off will never add the secure boot certificates to UEFI and update the boot loader automatically. Is this correct?
[2] My understanding is that the GPO Automatic Certificate Deployment via Updates, if set to Not Configured, means that Windows will go ahead and add the secure boot certificates to UEFI and update the boot loader automatically come time that Microsoft deems a domain joined system is high confidence for success. Is this correct?
[2.1] If the above is correct, will the secure boot certificates and boot loader update automatically even if the Enable Secure Boot Certificate Deployment GPO is set to Not Configured, and the Allow Diagnostic Data GPO is Enabled and set to Diagnostic Data Off? If the answer is No, which of those two GPOs, or both, are required for successful automatic deployment when Microsoft deems the devices are in a high confidence bucket? For the Allow Diagnostics Data GPO, if this is required, which level of diagnostics are required (required or optional)?
[3] Is the Allow Diagnostic Data GPO required to be set to Enabled and Send required diagnostic data or Send optional diagnostic data in order for the updated secure boot certificates and boot loader to be deployed and activated for any scenario, or does enabling the Enable Secure Boot Certificate Deployment GPO completely bypass the need for sending diagnostic data or Microsoft confidence buckets, and you're essentially saying "yes, I've updated the BIOS/UEFI on these machines, so my own confidence is high and I'm telling machines to go ahead and update the secure boot certificates and boot loader"?
[4] A regular, non-domain joined and non-Entra managed, residential consumer PC running Windows 11 doesn't need to do anything and will receive the certificates and boot loader update automatically, because that device is always sending at least the required level of diagnostic data, which can't be turned off. Is this correct?
Thank you!
- Arden_White
Microsoft
[1] If the device is not sending diagnostic data, there is still an alternate path for Secure Boot certificates to be applied. Devices can be included in the High Confidence database that is delivered with cumulative updates. When a device is identified as High Confidence, the Secure Boot certificates are applied automatically.
For client devices, there is a relatively high likelihood of being classified as High Confidence. This is much less likely for server and IoT devices.
[2] Yes. Automatic application occurs for devices that are determined to be High Confidence based on data from other similar devices.
[2.1] The default Secure Boot behavior will automatically apply certificates for High Confidence devices. Leaving Automatic Certificate Deployment via Updates set to Not Configured or Disabled allows this path to function. Unless there is a strong reason to avoid relying on this mechanism, it is generally recommended.
As you noted, Certificate Deployment via Controlled Feature Rollout must be Enabled, and Required diagnostic data must be sent for this option to work. This can be more difficult for some IT organizations, either due to data‑sharing policies or challenges ensuring diagnostic data reaches Microsoft.
[3] Yes. Enabling Enable Secure Boot Certificate Deployment bypasses the need to send diagnostic data. This explicitly instructs the device to apply the Secure Boot certificates and the 2023‑signed boot manager. This option is appropriate when you have confidence that the device firmware can successfully process the update.
[4] Yes, that is correct.
Additional note on firmware updates
Firmware updates are not required in most cases. They are primarily needed when there is a firmware defect that prevents Secure Boot certificates from being updated, or when you want the new certificates present in the firmware default variables. The default variables are used to initialize the active Secure Boot variables.
I hope I've answered your questions.- link470Copper Contributor
Thanks very much, this helps a lot!
- jeddunnCopper Contributor
Thanks for the info. I do have a question about the status key value. In our environment, we have a large number of the devices that do not have the key value of UEFICA2023Status rather, we have the key value of WindowsUEFICA2023Capable which is set to 2. I have validated that the device is booting off the 2023 cert but would like some clarification on why we are seeing this?
- mihiBrass Contributor
Assuming they are on current patchlevel, I would assume they have been delivered with the new 2023 certificates from the factory and therefore the job would have never needed to update anything.
- Arden_White
Microsoft
It would be worth checking to see if the System Event log has 1801 or 1808 events. If 1808 events, then all is well. If 1801, then it may be that the KEK and/or the 3rd party CAs were not shipped as part of the firmware.
The WindowsUEFICA2023Capable key can be misleading as it only indicates status of the 1st party CA and boot manager. I don't recommend using this key for that reason.
- AuzMacCopper Contributor
We have a WinServer 21H2, build 20348.4773, VMware virtual servers on VMX21, BIOS Date 2025-01-17.
Ran the CheckCA2023 script and stepped through the check, SET and Start task, rebooted twice, only to find this error in the logs for Event ID 1796:
"The Secure Boot update failed to update KEK 2023 with error Invalid access to memory location.. For more information, please see https://go.microsoft.com/fwlink/?linkid=2169931"
When we refresh the CheckCA2023, we see:
AvailableUpdates equals 0x4004 "A PK signed KEK from the OEM isn't available"
UEFIACA2023Status is "In Progress - The update is actively in progress"
WindowsUEFICA2023Capable: 0x0002.
UEFIACA2023ErrorEvent is 1796 and references what I put it quotes above.
We did come across this as well, as it pertains to VMware:
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
https://knowledge.broadcom.com/external/article/423919/manual-update-of-the-secure-boot-platfor.html
- Claude_Boucher_OEMCopper Contributor
I updated the file : version 1.30 Have a look at the right part.
https://github.com/claude-boucher/CheckCA2023
- Joaki1810Copper Contributor
Will Windows 11 (24H2/25H2) devices that are hotpatch enabled also get Secure Boot updates?
I’m wondering because the normal (with reboot) LCU for February notes Secure boot under Improvement. But no such information for the hotpatch variant for February.
https://support.microsoft.com/en-us/topic/february-10-2026-kb5077181-os-builds-26200-7840-and-26100-7840-f0fa9e54-a22a-4a06-96b6-bf5b2aded506https://support.microsoft.com/en-us/topic/february-10-2026-hotpatch-kb5077212-os-builds-26200-7781-and-26100-7781-722c74c5-ea30-4622-8436-6b8dcb975b2b
- Arden_White
Microsoft
Hi Joaki1810,
Hotpatch updates are security‑only updates. The OS support required for Secure Boot certificate updates was delivered in prior monthly cumulative updates, including those released before the January hotpatch baseline.As a result, hotpatch‑enabled Windows 11 24H2 and 25H2 devices can still receive Secure Boot certificate updates. In most cases, these certificate updates can be applied without a reboot. Some Secure Boot changes do require a restart, such as applying a newly signed Windows Boot Manager, and those changes are applied during the baseline month when a reboot occurs.
For devices relying on hotpatch, High Confidence targeting data is only updated during baseline months. When that High Confidence data is refreshed, hotpatch‑enabled devices that meet the criteria will have their Secure Boot certificates updated at that time.
This is why Secure Boot improvements may be called out in the standard February cumulative update but not explicitly listed in the February hotpatch update.
Arden
- lfreiCopper Contributor
hi, is there a way to check the signage of bootx64.efi (and the other) with powershell or cmd?
- trevorjonesBrass Contributor
I use the following code to check certificate on the boot file in the EFI partition. You could simplify by using mountvol if you prefer. This is just for the active boot file - not the copy in the Windows file system (C:\Windows\Boot\Efi)
$SystemDisk = Get-Disk | Where-Object IsSystem if ($SystemDisk) { $SystemPartition = Get-Partition -DiskNumber $SystemDisk.DiskNumber -ErrorAction SilentlyContinue | Where-Object IsSystem if ($SystemPartition) { $params = @{ DiskNumber = $($SystemPartition.DiskNumber) PartitionNumber = $($SystemPartition.PartitionNumber) AccessPath = 'S:' } Add-PartitionAccessPath @params -ErrorAction SilentlyContinue $SystemPartition = Get-Partition -DiskNumber $SystemDisk.DiskNumber -ErrorAction SilentlyContinue | Where-Object IsSystem if ($SystemPartition.AccessPaths -contains 'S:\') { $bootmgrPath = Join-Path 'S:\' 'EFI\Microsoft\Boot\bootmgfw.efi' if (Test-Path $bootmgrPath) { try { $cert = [System.Security.Cryptography.X509Certificates.X509Certificate2]::CreateFromSignedFile($bootmgrPath) } catch { } if ($null -ne $cert) { $issuerName = $cert.Issuer $commonName = $issuerName.Split(',')[0].TrimStart('CN=') $dateString = $cert.GetExpirationDateString() $notAfter = $dateString | Get-Date -Format "yyyy-MM-dd HH:mm:ss" $expiresInDays = ((Get-Date $dateString) - (Get-Date)).Days } } Remove-PartitionAccessPath @params -ErrorAction SilentlyContinue } } }- lfreiCopper Contributor
thanks, the CreateFromSignedFile was the missing part for me.
- Claude_Boucher_OEMCopper Contributor
After watching the demo... all those command lines 😅
Maybe this could help 👇
CheckCA2023 — PowerShell + XAML utility that puts all of this in a single graphical interface : Secure Boot certificate stores, registry keys, Event IDs — no command line required 😊
https://github.com/claude-boucher/CheckCA2023
- mihiBrass Contributor
I have to say that I like your UI.
Would you mind adding some more metrics/information?
- Which certificate \EFI\Microsoft\Boot\bootmgfw.efi on EFI system partition is signed with
- Reason: In Multiboot scenarios (e.g. Win10+Win11, or multiple systems using Boot2VHD) the "global truth" does not always match the "local truth" reflected in the system registry
- In case EFI system partition contains \EFI\boot\bootx64.efi, whether it is a Microsoft boot loader and if yes which certificate it is signed with
- Reason: When working with multiple OS (Win+Win, or Win+Other), sometimes there appears such a fallback bootloader, which may be used by the firmware for booting despite a "correct" bootloader is present in the EFI variables. Getting to know whether that one is still outdated
- The thumbprint of the Platform Key in a form that can be copied.
- Whether
"C:\Windows\System32\SecureBootUpdates\KEKUpdateCombined.bin" of the currently booted Windows instance contains a KEK update for that platform key
- Whether https://github.com/microsoft/secureboot_objects/blob/main/PostSignedObjects/KEK/kek_update_map.json contains a KEK update for that platform key
- Reason: Getting a better feeling whether there is a chance that the KEK gets updated when flicking the switch now, and whether there is a chance for it to work in the future
Thank you.
- Claude_Boucher_OEMCopper Contributor
I updated the file. :)
https://github.com/claude-boucher/CheckCA2023
- Which certificate \EFI\Microsoft\Boot\bootmgfw.efi on EFI system partition is signed with