Event details
It's time for our fourth Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast
Get started with these helpful resources
198 Comments
- SofienAzriCopper Contributor
Hi,
We have already completed the BIOS update roll-out across all PC models in our environment.
In parallel, we are deploying the Secure Boot CA 2023 certificate upgrade using a Microsoft Intune configuration profile. Due to the very slow adoption rate observed during monitoring—both through Intune policy status and Secure Boot compliance reports—we have also introduced a remediation script to support the deployment.
Despite these efforts, the increase in deployed devices remains limited. This behavior may be related to policy application constraints or required system restarts. According to several references, the Secure Boot update process may require up to two device restarts before the changes are fully applied and reported.
Questions:
1- what is the Best way to complete the task, is to go with Registry settings and schedule the task, or with Config profile over Microsoft Intune?
2- Will the May Patch Tuesday update scheduled for May 12 guarantee a resolution of this issue and help increase the deployment and compliance numbers?- mihiBrass Contributor
- Regardless which way you are choosing (Intune, Group Policy, manual), each way will ultimately result in setting the same registry key. So there should not be any "Best way" for triggering the job. Probably the "Best way" is to actually monitor the reasons why adoption rate is not going up (e.g. errors in event log, if any) to determine whether the devices do not get compliant due to hardware incompatibilities or due to a missing restart)
- The May Patch Tuesday will obviously provide one more chance for a restart, but I doubt it will guarantee resolution of anything. In case the devices have a known hardware issue (also present in the latest firmware version) preventing the update running automatically, this will not "magically" make the updates work. But there should be a sufficient amount of error information in the event log to diagnose this and to decide whether any actions other than waiting are needed.
- ArturCzepukojcCopper Contributor
Will the expired Secure Boot certificates affect Intune compliance policy "Secure Boot - Required"? Can devices start failing on it?
- ArturCzepukojcCopper Contributor
Can we expect an answer to that question?
- NaotsuguCopper Contributor
Hi,
Could you please confirm if my understanding of KEK's update logic is correct?
- In a WSUS environment (IT management environment):
(1) Automatic (If High Confidence applies):
When Windows Update (LCU) is installed via WSUS, the OS determines its own hardware.
If it matches the High Confidence Database (and the administrator has not opted out), the OS automatically triggers the Secure Boot update.
(2) Manual (Using AvailableUpdates):
If it does not match High Confidence (or if waiting for automatic determination is not possible), after installing Windows Update (LCU) via WSUS and completing the file placement, the administrator manually sets AvailableUpdates to 0x5944 to forcibly trigger the update.
- For non-WSUS environments (Microsoft managed environments):
(1) Automatic (Basic):
When a regular Windows Update (LCU) is installed, Secure Boot updates are automatically triggered when the machine becomes eligible for the High Confidence Database.
(2) Manual (Exception):
Even in non-WSUS environments, if you absolutely want to apply the update immediately without waiting for automatic application (High Confidence certification), it is technically possible to force a trigger by setting the AvailableUpdates registry to 0x5944 with administrative privileges.
- mihiBrass Contributor
As a very general summary, this is roughly correct.
- This does not only refer to the KEK update, but updates of all the Secure Boot keys. For KEK, there also needs to be a signature by the vendor of your firmware (its Platform Key) submitted to Microsoft so that the KEK can be updated.
- Whether a device is considered managed or not depends not only on whether WSUS is used, but also whether the device is domain-joined and whether telemetry is enabled and actually usable, and maybe other factors
- All the mentioned registry options (both for opting in via Available updates and for opting out) are available on all devices, managed or not
- The main difference between managed and unmanaged devices is that unmanaged devices can also receive their update via Controlled Feature Rollout (if they are lucky/unlucky and telemetry suggests that it should be tried), resulting in potentially being updated before the LCU that sets them to high confidence reaches them. However, there is no way to enforce or trigger whether you will be Chosen a Guinea Pig for Microsoft or not (if you are an unmanaged device)
- In case Microsoft considers your device managed, but you have telemetry enabled and explicitly want your device to be used as a Guinea Pig, you can set MicrosoftUpdateManagedOptIn registry key. This only has an effect if your device is considered managed.
- NaotsuguCopper Contributor
Thank you for your answer, mihi.
I understand it very well now.
- arch1279Copper Contributor
is VM snapshots or checkpoints can restore the VMs OS if it can't boot during or after the secure boot cert update? full VM back up is needed as restoration steps?
- mihiBrass Contributor
Your question boils down to whether a VM snapshot will include a copy of the UEFI variables and/or UEFI NVRAM. I cannot answer this question for all available virtualization solutions, but for those I have been using (Hyper-V, Virt-ualBox, and QEMU/KVM based ones like Proxmox) I can confirm that at least in their latest version, the VM snapshot includes all of this, so it is sufficient to create a VM snapshot to protect against incorrect Secure Boot configuration changes.
That being said, I don't know of any likely scenario where a Secure Boot certificate update can screw your VM so badly that you need to revert to a previous snapshot. In case you use BitLocker in the VM, make sure to have your Recovery Key handy just in case.
(There used to be an older version of Vir-tualBox where not all UEFI variables - like dual-boot configurations - were part of the snapshot, which could cause confusion when restoring snapshots after an OS install - not only related to Secure Boot settings. But I believe this was before Vir-tualBox supported Secure Boot for VMs).
[Ouch, naming of competitor products is not allowed in this community?]
- arch1279Copper Contributor
I am running legacy hyper V machine on Windows server 2012 R2 and guest VMs on server 2016 and 2019. DO i need to install secureboot 2023 cert on both hyper V and VMs? what happen if I dont update the secureboot cert to both ?
- mihiBrass Contributor
I assume all those machines have Secure Boot enabled? If not, there is no option nor need to update the secure boot certs.
If Secure Boot is enabled, not updating them (on both) will have the same effect as on any other (physical or virtual) machine: The bootloader will remain stuck on the June 2026 version and Secure boot blacklist will not get updated. So an attacker who gets admin access on either the host or the guests could install a bootkit on the (host or guest) machine they had access to once there is any public exploit for that bootloader or any other blacklisted bootloader. In any case the system will continue working and will still receive security updates for all other Windows components.
- arch1279Copper Contributor
thanks for the reply , yes its secure boot is enabled on however Hyper-V is still on unsupported OS server 2012 r2. is there way I can manually /offline install the new secureboot certificate without going to Windows update?
- CrisLugoBCopper Contributor
Hey, I came across this Dell Pro 16 Plus, that is missing the UEFICA2023Status registry key. It has the Task Scheduler and all other keys except that one. Should I move forward as normal or is there a scenario where another route is required in this case?
- mihiBrass Contributor
Let me guess, the device came with all the 2023 certificates from the factory already (Or it has been updated before the OS got reinstalled)? In that case it can happen that the key has not been created at all. I cannot tell what exactly causes the key not being created, but everything is fine if the certificates are there.
- CrisLugoBCopper Contributor
I checked to see if Event 1808 existed on the system and it did not. Is there another way to check and confirm if the all the 2023 certificates are already installed in the system?
- gndmnlCopper Contributor
hi,
i work for a public school department. we have a lot of devices (from pretty old to brand new). our resources are limited so we use wds for deployment. is there a manual or procedure? what must we do to ensure that the wds works? how can we integrate the new signed files into the wim's for deployment?
- nitin4492Copper Contributor
We have rolled out a script to set the Secure Boot registry value AvailableUpdates = 0x5944 and trigger the Secure Boot update scheduled task across ~10,000 devices with Secure Boot already enabled.
The script executes successfully; however, a subset of devices prompts users for the BitLocker recovery key after reboot.
We are trying to proactively prevent this scenario for end users.
We reviewed documentation referencing Secure Boot Event ID 1032 as an indicator of possible recovery prompts, but this event is not present on affected devices prior to reboot.
Our questions:
Is there a reliable way to proactively determine whether a device will request a BitLocker recovery key during the next reboot after applying Secure Boot DB updates?
Are there supported methods to detect potential Secure Boot / firmware trust-chain update failures before reboot so they can be remediated automatically?
- mihiBrass Contributor
There is a section about that in the Secure Boot Troubleshooting document:
https://support.microsoft.com/en-us/topic/secure-boot-troubleshooting-guide-5d1bf6b4-7972-455a-a421-0184f1e1ed7d#ID0ELBP-button
For Scenario 1 (bug in firmware implementation), you cannot reliably detect it. If you have identified affected firmware vendors/versions, you can mitigate it by disabling or suspending Bitlocker before applying the Secure Boot updates, restart another time when they have been successfully applied, and re-enable Bitlocker. (Note that Microsoft does not endorse increasing your attack surface by disabling or suspending Bitlocker, you will have to do your own risk assessment on that).
For Scenario 2 (There is a PXE server early in the boot sequence which will most of the time do nothing more than trigger BOOTNEXT, and uses a bootloader signed by the 2011 certificates), you can mitigate it by moving Windows Boot Manager to spot 1 in your boot sequence or temporarily blacklist the MAC addresses of your devices from the PXE server's DHCP configuration so that PXE boot is not attempted or uses a bootloader signed by the 2023 certificate.
But in general, there is no reliable way to predict whether Measure Boot TPM resealing is working on your current firmware or not, otherwise Microsoft would probably add a safeguard lock for that :-)
- Dan AlvaradoCopper Contributor
We have also seen an uptick of Bitlocker recovery in our environment since performing the same steps. Can i expect that devices that have previously had Bitlocker recovery not be affected by whatever is going on with the April update?
- scottcopusCopper Contributor
Have you seen today's admin center notice "Users might be prompted into BitLocker recovery screen on device restart" that mentions "Connected Standby" devices, supposedly fixed in this month's (April 2026) LCU? Small possibility it could be related...
- badger_buckyCopper Contributor
Since Microsoft can only update the active UEFI database does anyone know what the behavior will be on older systems that aren't getting a BIOS update to put the new certs in the default UEFI database? Specifically, let's say you do a "restore defaults" from within the BIOS and the 2011 certs from the default database overwrite the new certs in the active database after the 2011 certs have expired. Will the system still boot?
- mihiBrass Contributor
It does not matter whether the certs have already expired, it only matters if you already got the 2023 bootloader. If the new bootloader is already installed (which started happening for some machines with February 2026 LCU) and you reset to system default, your system will not boot but show a secure boot error. You will then need to boot from a USB key with securebootrecovery.efi which will update the one certificate needed to get the system booting again (Windows 2023 certificate in DB), the rest will be fixed from the booted system.
See "Device fails to boot after resetting Secure Boot" in the Troubleshooting Guide:
https://support.microsoft.com/en-us/topic/secure-boot-troubleshooting-guide-5d1bf6b4-7972-455a-a421-0184f1e1ed7d#bkmk_common_failure_scenarios_and_resolutions
- ksteckCopper Contributor
For those of us still using SCCM and PXE boot for imaging our devices, is there an expected day of release for an updated SCCM compatible ADK as well as documentation/guidance on how to update our Boot and Image WIM's prior to the June 2026 deadline.
- robbinsaCopper Contributor
I'm curious about an updated ADK as well as official guidance on how to address PXE w/ WDS:
"A new checkbox, Use Windows Boot Loader signed with Windows UEFI CA 2023, is available in the Data Source tab of boot image properties. When enabled, it updates the boot image to use the boot loader signed with Windows UEFI CA 2023. The checkbox automates the mitigation steps described in KB5025885.The new functionality only works on WDS-Less PXE-enabled Distribution Points."
- jrbarnesCopper Contributor
Importantly, related to this: is there specifically a way to ensure that newly-imaged and re-imaged computers get deployed with the new 2023 cert in their UEFI DB and applied to their boot manager as part of a CM Task Sequence, particularly if they do not already have the 2023 cert in their UEFI DB?
I might expect to continue using the older 2011 cert on the PXE boot image for some time to accommodate the transition, but want to avoid deploying new endpoints with outdated certs, or needing a supplemental update post-deployment with added restarts to address it.