Event details
It's time for our second Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
On the panel: Arden White; Scott Shell; Richard Powell, Kevin Sullivan
This event has concluded. Follow https://aka.ms/securebootplaybook for announcements about future Secure Boot AMAs.
Get started with these helpful resources
409 Comments
Hi there I've noticed a problem with AMD consumer platforms. Confirmed with two different AMD chipsets, SVM (CPU Hyper-V required feature) is disabled by default. But this is required along with Secure Boot to make use of VBS and other subsequent security features, that are to be set in Microsoft Security App (Defender).
- mikemagarelliCopper Contributor
After today's AMA, I think I understand that as long as IT managed systems are configured with this reg key / value - 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates' to '0x5944', that should trigger the system to apply the updated Secure Boot certs as long as the firmware supports the update and the machine has the certs via CU. Can you please verify that my understanding is correct? If it's not correct, what additional requirements am I missing? Additionally, with the above configuration, what does timing look like? Should the certs be applied relatively quickly or is there still a wait period before you should expect the updated certs?
- mihiBrass Contributor
Is correct.
Should be applied relatively quickly (when the scheduled task runs again). Note that the boot manager will be updated only after next reboot (when certificates have been installed properly).
- Pearl-Angeles
Community Manager
Thanks for your participation in today’s AMA! We’ll post a recap of the questions panelists answered during the live AMA, shortly.
- DPelleCopper Contributor
what about the 65000 error in Intune.... there are enough people posting this, why isn't it being covered in this discussion thoroughly?
- xrpfan1337Copper Contributor
Not super important, It will get fixed by another team soon. This AMA was more about the process and technical background.
- Jacktech76Copper Contributor
I'd also like an answer on if this will be fixed. Here's a really good resource on why its happening for anyone that hasn't found it already. Should be the top result if you search it by title: "Policy is rejected by licensing: Error Code 0x82B00006"
https://patchmypc.com/blog/intune-policy-rejected-by-licensing/
- laytonm21Copper Contributor
In my environment, we are not currently consuming all the event logs to look for 1808, but I have a MECM (SCCM) baseline looking for the regkey status of "Updated". For those workstations that show "Updated" does that mean they are good? Nothing else to do?
- DonDottaNonHottaOccasional Reader
Are you guys aware if there are plans to allow the OS to automatically suspend BitLocker protection when a firmware update comes down via Windows Update on devices where Secure Boot is enabled but the PCR 7 binding is not possible?
Firmware updates coming from WU are currently being prevented from installing when Bitlocker Protection is On and the PCRs are set to 0,2,4,11 (generally devices with Secure Boot turned off). The main concern is a subset of devices that leverage OROMS can not bind PCR7 when Secure Boot is enabled and BitLocker is enabled. This causes an SB enabled device to have 0,2,4,11 PCRs preventing them from receiving important firmware updates with updated Default DB 2023 certs. Depending on the client base to suspend bitlocker protection periodically is not a viable solution and doing it automatically via Remediation script would be a security concern. - knmcelhaneyCopper Contributor
If a device receives the new certificate in the active db and is later reimaged, would the device lose the new certificate? I'm unclear how reimaging affects the db/bootmgr since the drive has to be en-encrypted?
- mihiBrass Contributor
active db is stored in your firmware/NVRAM, so should not be touched by anything you can do to your drives.
- HicksterCopper Contributor
Does triggering the update manually via registry key in a corporate environment on sample machines help to develop the confidence buckets?
- mihiBrass Contributor
If you have (full) telemetry enabled and the telemetry is not blocked by the corporate firewall, it will help, regardless which method the update has been pushed.
- jeddunnCopper Contributor
I see a high number of devices in our environment with the following setting in registry. 1 - “Windows UEFI CA 2023” certificate is in the DB. Will the CFR or LCU trigger it to move to 2 - “Windows UEFI CA 2023” certificate is in the DB and the system is starting from the 2023 signed boot manager ?
- kumarshai88hotmailcoCopper Contributor
Is there any potential impact on installed applications following the renewal of Secure Boot certificates? Is there any rollback plan in case of any issues?