Event details
Want to ensure you maintain a trusted boot environment for your Windows devices? Walk through essential guidance - including how to test firmware, monitor device readiness, deploy updated certificates, and diagnose issues using the latest tools and deployment aids. Learn what’s changing, why it matters, and how to ensure your fleet stays secure and compliant ahead of the deadline. Whether you manage a small set of devices or a large enterprise environment, you’ll leave with practical steps to confidently navigate this major Secure Boot update.
Speakers: Sochi Ogbuanya & Jordan Geurten
This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, click Attend for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.
48 Comments
- Heather_Poulsen
Community Manager
Thanks for joining today’s session on “Secure Boot certificate updates explained” at Microsoft Technical Takeoff. Q&A will remain open through Friday so keep your comments and questions coming! Up next: Feedback wanted: App management in the enterprise
- MichaelHildebrand
Microsoft
I used this text, pasted into the Device Queryfield for a given device in Intune, to do a 'live' check for the device's status (as long as the device is on-line): "WindowsRegistry('HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing')"
- jbennettCopper Contributor
Is MicrosoftUpdateManagedOptIn enabled by default, or must we take steps to set that value?
- Prabhakar_MSFT
Microsoft
This is opt in policy that enterprises need to enable to be opted into Microsoft Managed Controlled Feature Rollout of certificate updates. Note that, this requires enabling Diagnostics data to enable Microsoft to have visibility to the device bucket to enable the Microsoft managed rollout.
Refer to following links
Group Policy Objects (GPO) method of Secure Boot for Windows devices with IT-managed updates - Microsoft Support for details on the policy
Microsoft Intune method of Secure Boot for Windows devices with IT-managed updates - Microsoft Support for Intune based policies
Configure Windows diagnostic data in your organization - Windows Privacy | Microsoft Learn for how to configure diagnostic data
- Arden_White
Microsoft
Hi jbennett,
MicrosoftUpdateManagedOptIn is not enabled by default. You must enable it and ensure that the devices are sending Diagnostic data. This works for client versions of Windows. If you are managing server or IoT devices, you should be sure to focus on getting those updated.
Arden
- VaishnavK1993Brass Contributor
If the Secure Boot certificate is not updated on a small set of machines before the deadline and the certificate expires, what would be the recommended next steps to remediate those devices?
- Arden_White
Microsoft
Hi VaishnavK1993.
the devices will continue to boot and operate normally. The steps to get them remediated are the same steps as before the certificates expire.
Test devices and apply across the devices. Update firmware where necessary.
There are a lot of good resources at this link below and these resources are being updated regularly.
Arden
- Prabhakar_MSFT
Microsoft
Hello VaishnavK1993, Has your organization attempted installation of certs and encountering errors when applying the updates? Secure Boot Update task logs error events in System event log indicating why update could not be applied. In most cases device may be in known block list
If your organization have not yet initiated update process, Microsoft recommend testing on few similar machines that represent your environment before applying the policy broadly. For devices that have known issues, have been blocked and you will see an error 1802 under TPM-WMI source in System event log indicating update could not be installed due to known issue. For most issues, OEMs may already have firmware updates available. If OEM has new firmware update available, recommended to install the latest available firmware updates to unblock the certificate updates.
- Heather_Poulsen
Community Manager
Welcome to “Secure Boot certificate updates explained” at Microsoft Technical Takeoff. Q&A is open now and throughout the week. Please post any questions or feedback here in the Comments. [Note: If your organization’s policies prevent you from seeing the video on this page, you can also tune in on LinkedIn.]
- SCCM_TerrorCopper Contributor
One more question: do we need to Update the SCCM boot images or will they continue working after June 2026? We use ADK Version 10.1.26100.1 (May 2024) and we are happy without updating to the latest ADK.
- ClientAdminBrass Contributor
We also use ADK Version 10.1.26100.1 (May 2024) and this is enough. Starting with SCCM/MEM 2509 there's a new option on every single boot image called "Use Windows Boot Loader signed with Windows UEFI CA 2023". This is for PXE boots and will only work if you use the SCCM PXE Responder (WDS-less).
But as long as you don't revoke the old 2011 certificates on your devices, you don't need to set that option. If you're sure all your devices have the new 2023 certificates installed, you can then do the switch and consider revoking the old ones.
- SCCM_TerrorCopper Contributor
What exactly makes the clients to have high ConfidenceLevel, so that they receive the SecureBoot Cert. Update with monthly Windows updates?
If a client doesn't receive the new certificates with Windows updates until June, shall we attempt to force the installation with the registry key HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates?What is the official Microsoft's recommendation regarding Firmware Updates: shall we update the client's Firmware prior to installing new Secure Boot Certs or is it irrelevant?
- Prabhakar_MSFT
Microsoft
Thank you for your question. Microsoft is doing Controlled Feature Roll out on Consumer devices grouped by device attributes into a unique device bucket (Caled BucketID). BucketId represents group of devices that behave similarly when certificate updates are applied. If Microsoft observe enough evidence of successes within a bucket, respective device group is marked as High Confidence in the public Confidence Database (BucketConfidenceData.cab). If a device is identified as High Confidence, certificates will be automatically installed as part of monthly Security updates Microsoft release every Patch Tuesday.
For devices that are not visible to Microsoft, Enterprises need to take action. Microsoft recommend testing on few similar machines that represent your environment before applying the policy broadly. For devices that have known issues, have been blocked and you will see an error 1802 under TPM-WMI source in System event log indicating update could not be installed due to known issue. For most issues, OEMs may already have firmware updates available. If OEM has new firmware update available, recommended to install the latest available firmware updates to unblock the certificate updates.
Refer to Understanding Secure Boot Events 1802 and 1803 - Microsoft Support for details about known issues preventing the certificate updates.
- Terry_RutterCopper Contributor
We started our journey down this road in June 2024 when MS made the announcement that the new certs were only being regression tested with UEFI Firmware from March 2024 onward. Older firmware may work, but if it doesn't then "Oh well". Unless it fixed a specific problem or was required, updating BIOS/UEFI F/W wasn't a priority until this forced us to upgrade.
Operationalizing annual UEFI updates was a result of finding that a good number of manufacturer updates will only work in "steps". For instance if the existing version is 1.2.3 but the latest version is 1.30.2 you may have to step to 1.8, then 1.10, then 1.20, etc. Very time consuming.
As of today every device has the new cert deployed (it was in the April 2024 CU Security patch) and installed in the .db file. We have 80% of our environment with the 2011 cert in the .dbx file, booting solely off the 2023 cert. The remaining 20% are in manual remediation due to BIOS versions or Secure Boot being turned off. All new devices have been configured with only the 2023 cert.
The only real hardship is our field folks have to have 2 USB boot devices - 1 with the 2011 cert only and 1 with the 2023 cert.
In testing the process we were surprised - and not in a good way - at the initial failure rate when we forced devices to boot only from the 2023 cert prior to running BIOS version checks, if Secure Boot was enabled, and . Had we waited until MS forced the change it would have overrun our Help Desk with "I can't boot" calls.
- Claude_Boucher_OEMCopper Contributor
Interesting feedback! On my side I was surprised by your experience regarding BIOS versions — I've been able to successfully deploy all the new certificates and the updated boot manager on Lenovo devices with BIOS from 2019 and 2020, without any issues.
Of course, OEM BIOS updates that embed the new certificates are always a good practice — but in my experience they are not strictly required. At least on every Lenovo I've tested, there was no minimum BIOS version needed to get the Microsoft certificates installed properly.
For your 20% in manual remediation, you might want to give https://github.com/claude-boucher/CheckCA2023 a try — it's a PowerShell + XAML utility that helped me a lot to diagnose machines where the process wasn't going smoothly. It visualizes all Secure Boot certificate stores, the relevant registry keys and the Event IDs Microsoft asks us to monitor. Might help identify exactly where things are getting stuck.
Would love to hear your feedback if you get a chance to try it! 😊
- Claude_Boucher_OEMCopper Contributor
Now that the new certificates are landing in DB, the KEK is updating, and the boot manager is being re-signed — the "deployment phase" seems well underway for most of us.
My question is about the timing of the next steps : do the optional ones (old certificate revocation in DBX, SVN update, SBAT, new DBX, ...) have an announced schedule yet? Or are we still waiting for a signal from Microsoft?
On my side, I've been building a PowerShell + XAML utility — initially developed for Lenovo devices, but designed to work on other hardware as well — that lets you visualize all Secure Boot certificate stores, the registry keys and Event IDs that Microsoft asks us to monitor, all without Intune or MDM.
Can't wait to integrate these next steps as soon as they're clarified! 😊
- Prabhakar_MSFT
Microsoft
Thank you for your question. Due to the impact to recovery boot media and other external boot sources such as Network boot, the revocation of old 2011 certificate and SVN is not automatically applied to UEFI firmware. Enterprises need to ensure all boot sources have been updated to latest 2023 signed Boot manager before applying the revocations to UEFI DBX.
- ShaunMarlinCopper Contributor
Thank you for the reply to my previous comment, it really did help. So going back to the testing of the deployment, we have adjusted the key HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates to 0x5944. In doing so we see the key UEFICA2023Status go into InProgress where it has been for the last 2 days. This lead to us looking at Task Scheduler, and finding we are seeing the task failing with EventID's 103 and 202. The operational codes indicate "Run Failure". What should we be looking for when we are seeing these errors?