Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
This event has concluded. Follow https://aka.ms/securebootplaybook for announcements about future Secure Boot AMAs.
Get started with these helpful resources
364 Comments
- kumarshai88hotmailcoCopper Contributor
Can we proceed with the firmware upgrades on the physical Hyper‑V servers with OEM Support before Microsoft releases the fix of event ID 1795 (write protected) on March 10th?
- Pearl-Angeles
Community Manager
Thanks for your participation in this AMA! Panelists covered this topic at 23:48.
- Id_JamieCopper Contributor
I have seen a few devices where everything is ticked after updates got applied , in detection script but only red X is the Default UEFI DB has "Microsoft Option ROM UEFI CA 2023" not ticked do I have issue ? Seeing same on VM ESX 8 with nvram renamed. but everything else green on default and KEK got updated correctly as well.
- mihiCopper Contributor
Did the machine have the old 2011 equivalent of the option rom certificate? If not, it won't get the new one.
Also for a VM you won't need the Option ROM CA, and default db is not updated by the updates at all anyway (only by UEFI vendor).
- HicksterCopper Contributor
I have noticed a registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\ConfidenceLevel
But I can't find any reference to. Is it unrelated, or perhaps a coming feature?- HeyHey16KSteel Contributor
And it's blank 🙃, hope that doesn't mean no confidence...
- mikemagarelliCopper Contributor
Same. I could find no documentation that referenced that key at all.
- AaronCRCopper Contributor
Hello,
When will Intune Windows configuration policy start working? What will succession look like? Still getting 65000 error.
- Bogdan_GuineaSteel Contributor
Hi, i think they fixed that as per 23.02.26 with the last test-deplyment that i done, at least for the 26200.7840 Build i was abble to use it.
Good luck!
- Arden_White
Microsoft
Yes, Bogdan is right. There's a "Known Issue" description of the issue near the bottom of this page:
Microsoft Intune method of Secure Boot for Windows devices with IT-managed updates - Microsoft SupportArden - Microsoft
- Daniele De Angelis
Microsoft
Many Thanks Arden, correct ;)
We need to look in the certificate chain, tnx again
- josephcocoCopper Contributor
On my test machine, I only see event ID 1801 and not 1808, although I've done all of the steps listed on
https://support.microsoft.com/en-us/topic/how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d
It's also showing the 2023 certificate and not the 2011 one. Why would I not be seeing the 1808 event ID? The 1801 one says: "Updated Secure Boot certificates are available on this device but have not yet been applied to the firmware." What other steps am I missing?
- Joerg1Occasional Reader
can you give instruction on the boot medium, that boot with 2011 keys and can upgrade the new boot manager in the case that windows does not start anymore, because the new keys in db are reset to 2011?
- saranrajappaCopper Contributor
2. When the CSP deployed, we see CSP sets policy as
"AvailableUpdatesPolicy=0x00005944(22852)". Will this move 2011 certificate to DBX? and when it will move? Will there be time for enterprise admin to know this and take actions on iPXE and Bootable Media?
3. The "secure boot status" report in Intune has a column "certificate status". What goes behind the scenes to say, "Up to date"? "Up to date" means certificate in UEFI?
Or Certificate in UEFI and booting from the 2023-signed boot manager?
- mihiCopper Contributor
DBX update flag is 0x80, so it is not included in 0x5944. You would need to set to 0x59C4 to push it alongside, or individually set to 0x80 after the other updates have been applied and the value returned to 0x4000/0x0.
- lord_eddard_starkCopper Contributor
Is it accurate to say that CFR is generally enabled for devices managed by Windows Update for Business, but not for devices managed by WSUS?
I don’t think I fully grasp the distinction between LCU vs. CFR in the context of delivering the Secure Boot update. Is there a Microsoft blog post or documentation that explains how these mechanisms differ and how the Secure Boot update is actually rolled out?
- Peter_Linder2015Copper Contributor
Why was the Secure Boot certificate validity set to about 15 years? Why not 30 years? Why not 10 years? Will Secure Boot certificate updates happen every 15 years in the future?