Event details
It's time for our third Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast
Get started with these helpful resources
270 Comments
- mihiBrass Contributor
This is odd. The aforementioned bucket hash lists as High Confidence in the 2026-03 version of C:\Windows\System32\SecureBootUpdates\BucketConfidenceData.cab (Generic_OEM_3.json), yet it is missing in the detailed bucked confidence lists published by Microsoft at https://github.com/microsoft/secureboot_objects/tree/main/HighConfidenceBuckets which are, as I understand it, supposed to match the lists shipped in this update.
So for one part, it explains why the automatic LCU tried to apply those updates on your machine.
It does not, however, explain why that hash appeared on that list, despite the machine obviously being unable to cope with the consequences of even just installing one Windows 2023 certificate. And it does not describe why this hash is missing in the detailed listings.
Perhaps Arden_White can shed some light on this?
- mirteloBrass Contributor
I´m still getting Event Error 1795 in TPM-WMI on Hyper-V Gen2 VMs with Inplace Update History. The system firmware returned an "Access denied" error when attempting to update a Secure Boot variable KEK 2023. The signature information for this device is listed here. DeviceAttributes: FirmwareManufacturer:Microsoft Corporation;FirmwareVersion:Hyper-V UEFI Release v4.1;OEMModelNumber:Virtual Machine;OEMManufacturerName:Microsoft Corporation;OSArchitecture:amd64; BucketId: 4e22d051e8c143d2875b9d16ef2241c7ec548985a21e5073126d3c1f9bf53bb2 BucketConfidenceLevel: Under Observation - More Data Needed. For more information, see https://go.microsoft.com/fwlink/?linkid=2169931
I can Workaround the Problem with changing the Secureboot Template. Is this a supported solution for this Problem ? CoPilot tells me no, and says that i had to Recreate the VM.
What consequences might this workaround have for the future?
- mihiBrass Contributor
If your VM has a TPM (or had one in the past) the UI will not allow you to change the Secure Boot template. If you force it to change in another way, it will render your VM unbootable (in the same way that your VM becomse unbootable if you mess with the TPM in another way). Therefore, you'll need to recreate the VM in case it has/had a TPM.
If your VM has no TPM (and never had one in the past), you can change the Secure Boot template twice to get the new certificates.
In other words, if the workaround works for your machine and it is still bootable afterwards, you should not expect any negative consequences later. The only negative consequence of the workaround can be that your VM is unbootable right after performing it, and you need to recreate the VM at that point (and suffer downtime of that VM until you have done so).
- trevorjonesBrass Contributor
I'm surprised that, even after the March LCUs, almost none of my nearly 8,000 workstations are in the high confidence database yet. We run a majority HP laptops with mostly standard supported models from within the last few years, and Windows 11 24H2/25H2 with BIOS reasonably up-to-date for most devices. I would have expected to have seen many more devices attempting to update by now through Windows Update. Why is it taking so long for these devices to start the process? Your advice in the videos seems to lean towards most devices being updated automatically through Windows Update and we would have to manually deal with the remainers. At this point I'm unsure whether to continue waiting for the LCUs to hopefully and eventually update the majority, or get my devices enrolled in CFR already, or not even wait for MS to do this and start updating devices myself. Time is ticking, right?
- jvalle713Copper Contributor
I have the same situation. 20,000 endpoints using standard Dell models purchased within the last 1-4 years and only approximately 800 endpoints are showing the 'Updated' status in the 'UEFICA2023Status' registry entry. We have also pushed out the latest BIOS. Will we see more auto updates in April or do we need to start taking manual action on this? Would love to see a Microsoft response on this.
- Arden_White
Microsoft
Thanks for raising this. What you are seeing is consistent with how the High Confidence rollout is designed to behave early on.
The automatic path is intentionally cautious. Devices only enter the High Confidence database after we have sufficient real‑world servicing and reliability signals for that specific hardware and firmware combination. Early in the rollout, that means coverage grows slowly even on modern, well‑supported systems, especially when BIOS or firmware was updated recently and needs to be re‑observed.
The January, February, and March LCUs primarily established the pipeline and initial confidence data. We expect significantly more devices to become eligible in April and May as additional telemetry is collected and more hardware buckets graduate to high confidence. That expansion is already planned and does not require changes on your side beyond staying current on servicing updates.
For organizations that prefer not to wait, taking a managed approach using the published guidance is a valid option. The key point is that low numbers today do not indicate a problem with your devices, only that we are still building confidence before broad automatic deployment.
We’ll continue to expand coverage carefully and share updates as the rollout accelerates.
- DJ8014ACopper Contributor
Arden_White mihi - I have a more general question as well. If machines are not able to update to the new certificates at all, how will this affect the installation of future Windows feature updates?
On all of my machines (both the Dell machines that seem to be able to get the partial 2023 cert updates and the HP z840 that seem to not be able to get anything related to the 2023 certs), I've been able to upgrade to the latest feature updates using the AllowUpgradesWithUnsupportedTPMOrCPU registry hack. Is there any reason to believe, based on current knowledge, that future feature upgrades might be blocked on these machines as a result of the 2011 cert expiration?- Eric_BlCopper Contributor
I had exactly the same thought. Current answers below are not completely clear on the long term.
Scott and Richard added some contributions in a related question in the video:
https://www.youtube.com/live/ixq4RP33Am4?si=ccMm0X82PHChs40J&t=2303
From my understanding, it seems quite likely that a future Windows 12 or what ever coming next will REQUIRE Secure boot with the Boot manager signed with the 2023 certs only.
This would mean some older machines what were NOT able to update the certs will NOT be able to install such future version of Windows.
Is that correct?It could be seen as another way from Microsoft to get rid of older machines.
But for simple people just ok with their current old machines and not willing to buy anything newer e.g. for environmental concerns, it means the end of a supported version of Windows in their machine. Sure, it will happen some times, sooner or later.
But Microsoft could help those people to stay on their older machines if they could sell them more years of ESU (after oct'26, ESU is said to be for business only, NOT for consumers) or even better to make the LTSC editions of Windows 11 (as the 24h2) officially available for those people!- Arden_White
Microsoft
A few clarifications that may help.
The goal here is to keep all supported devices updated with the newer Secure Boot certificates so they can continue to receive boot‑level security updates over time. In most cases this happens automatically. The determining factor is firmware capability, not device age. Older devices, including devices that are no longer in OEM support, can successfully update the certificates as long as their firmware implementation is able to accept them. The main limitation arises when a device’s firmware has an implementation issue that prevents the certificates from being updated, and there is no firmware update available to address it.
If a device can’t install the 2023 Secure Boot certificates, that does not by itself block current Windows feature updates. Those systems will continue to boot and can continue to receive standard Windows updates. What they won’t receive going forward are new boot‑chain security updates, such as Boot Manager updates or dbx revocations, once the 2011 certificates expire.
For future, unreleased versions of Windows, Microsoft hasn’t published specific requirements. That said, devices that can’t update their Secure Boot trust should expect increasing security and compatibility limitations over time as newer operating systems, firmware, and Secure Boot‑dependent protections assume an updated trust foundation.
This work isn’t about forcing device turnover. It’s about making sure systems that are capable of doing so can continue to receive critical boot‑level security updates and stay protected as the threat landscape evolves.
Arden – Microsoft
- mihiBrass Contributor
I'd say it is likely that some of these unsupported upgrade scenarios will prevent you to install a future Windows update, but I believe it is unlikely that this will happen based on whether your Secure Boot certificates are current or not.
- Arden_White
Microsoft
Yeah, it looks like it was able to update the DB with the certificates. I also would expect that the 2023 signed boot manager will update if it hasn't already. The KEK is what you don't get in this case - probably due to the age. The device will continue to run and get updates. What you won't get is the updates to the Secure Boot DBX when there are security issues in things like boot loaders and other firmware modules.
Kudos to you for keeping it running that long and to Dell for manufacturing something that lasts. I sympathize with you. I'm still using my Lenovo Yoga Pro 2 that is about the same age as your Dell. I can sense that I'm getting close to getting a new laptop. 🙂- DJ8014ACopper Contributor
And yes I believe it did update the signed boot manager. Does that do us any good without the KEK?
- mihiBrass Contributor
The signed boot manager does not require the KEK to be updated, as the 2023 DB updates are signed with the 2011 KEK.
Only the next boot manager certificates (in 2038) will require the 2023 KEK to be present (if the device still works by then).
- DJ8014ACopper Contributor
We won't get updates to the Secure Boot DBX. Does that mean we will get updates to other Secure Boot components, or is it all or nothing?
- mihiBrass Contributor
You will get updates to the boot manager, even without KEK. You won't get the next certificates (in 2038 when the current ones expire) and you won't get any new DBX entries.
- nilisvw312Copper Contributor
How does Microsoft see what is needed for PXE boot with WINPE/MDT/SCCM etc?
After the 2011 certs expire is it correct to assume that the installation of Windows 11 via pxe boot etc is still working? As long as the bios fw has the 2011 (and 2023) certs available?So nothing needs to be changed towards boot images signed binaries unless the device only has 2023 certs in fw?
Also that means that after fresh install of W11 you always need to update the 2023 certs in Windows boot manager to get the security updates?Is this the case till we get a W11 version which is signed with the 2023 certs and requires boot images to have the 2023 signed binaries? So in this case you need to update the pxe/winpe/boot images?
- InterstellarOverdriveCopper Contributor
I asked them the same question. As far as I understand, the old boot images will continue working during PXE Boot, as long as the old certificates (the ones from 2011) are present in the UEFI store. If the old certificates are revoked, we need to create new boot images, possibly using new Windows ADK.
- Jason_Sandys
Microsoft
Correct. And as called out in a few of my other answers (which you may or may not have seen) we have no intent to revoke the old certs as that serves no purpose and would cause widespread issues.
A key point in all of this to keep in mind is that the certs expiring has no immediate impact whatsoever. Nothing signed by these certs becomes invalid or untrusted just because the certs expired. Unless or really until we release an updated boot critical component that requires signing--which must be done with the new certs--nothing changes. When this does finally happen (as I'm sure it will happen at some point (but can't say how soon that will be) that's the time when that new component won't be trusted by devices without the new certs and thus they won't be able to install that new component. Again, components signed by the old certs, whether they be in a full OS instance or a WinPE boot image, are and will still be fully trusted--nothing changes for them.
- TxRedinTNOccasional Reader
How is Windows 10 LTSC, Win10 IOT LTSC, and Windows 11 IOT LTSC affected by the certificates? Will the new 2023 certificates be install on these devices? Win10LTSC and Win10 IOT LTSC should still be getting windows updates without the extended licensing. Thank you.
- txtechsquadCopper Contributor
So our devices have SecureBoot enabled, but we did not receive CA 2023. When will we receive it?
- Pearl-Angeles
Community Manager
Thank you for your participation in today's Ask Microsoft Anything! Below is a recap of the questions the panelists answered live, along with associated timestamps:
Question – What happens if you set the registry settings on a device that is still using Legacy BIOS? Is the update process smart enough to ignore those devices? – answered at 0:46.
Question – Our company does not allow us to use Intune. Are there any helpful tools or scripts to Inventory? – answered at 1:59.- For more info, go to aka.ms/GetSecureBoot
Question – During the February AMA, you en-phased that enterprises should leverage Intune and build their own dashboard to monitor secure boot states. The guide requires Enterprises licenses. As an MSP that manages thousands of devices with Business Premium Plan for multiple customers with Intune and Lighthouse it doesn't make sense. Is there a plan to monitor those states via a compliance policy instead? And also.. regarding the secured boot compliance policy that will happen to devices that will still have an old certificate, will they continue to show as compliant with the 2011 certificate? – answered at 3:24.
Question – Could you confirm that the Secure-Boot-Update scheduled task expects Microsoft's Owner GUID on Microsoft's signatures in Secure Boot? We customize the Secure Boot content and it seems that a different GUID causes the task to break the behavior of GetFirmwareEnvironmentVariableA() (used by BitLocker in other things). Could you also confirm that updating the firmware SVN (4th step of the revocations) only consists in adding SVNs to the DBX? And that for testing purposes, resetting the DBX is enough to cancel the rollback prevention? – answered at 6:03.
Question – "The KEK update (needs to be signed by the OEM because they own the PK) is required before June 2026." It's very possible I'm lost in the sauce, but I remember Scott in the December AMA saying that the various (existing) key/cert updates continued to work past 2026. This ties into the timestamping question you also responded to which I need to re-read.– answered at 9:20.
Question – If I ignore this and do nothing, will devices with (or without) secure boot enabled continue to boot? – answered at 10:38.
Question – What is the timeline of assisted Controlled Feature Update? Are you planning to roll out the Secure Boot Cert. Update to 100% of devices before June 2026? Or should we already prepare the alternative ways to update the devices (registry, GPO or Intune policy)? – answered at 12:05.
Question – Seeing some devices running on Hyper V with the March 2026 updates applied, some Server 2019 servers show updated, but capable = 0 other server 2019 same build same patch level shows updated and capable = 2. is this expected behavior that this status is different between these two VM's? – answered at 14:29
Question – What would be the impact of blanketly applying this policy setting? Enable Secureboot Certificate Updates: – answered at 16:02.
Question – Are these updates Bitlocker aware? Do we need to suspend bitlocker for 2-3 reboots during this process? – answered at 17:12
Question – We've successfully updated some of our devices with the 2023 cert, and tested how PXE boot in SCCM would work. PXE boot worked fine when both 2011 and 2023 certs were enabled, which makes sense, and after revoking the 2011 cert, did not work, since the boot.wim doesn't contain the 2023 cert. A couple of questions:
-Will the boot.wim naturally get the 2023 cert, if we keep SCCM/Windows SDK up-to-date?
-Once we pass June 2026, will devices that didn't successfully get the 2023 cert yet still be able to PXE boot? – answered at 18:25.
Question – How can we get a compliance report if we do not use AutoPatch? – answered at 23:35.
Question – What is the timeframe for the cert to upgrade if we leave the LCU to do the job based on a high confidence level compared to enabling the CFR settings? – answered at 23:51.
Question – How important is it that the system already boots trusting the 2023 cert instead of the 2011 cert? Is it okay for the system to continue booting using the 2011 cert as long as the 2023 KEK and DB certificates install? – answered at 26:48.
Question – I have deployed the secure boot remediation through Intune and I see event ID 1801 that says the certificates are available but not applied and the BucketConfidenceLevel shows Need more data. Do i need to take any action on that? – answered at 29:37.
Question – Looks like there have been reports online of users receiving driver updates that are requiring bitlocker keys to be entered after reboot. Is this expected behavior? If the certs were already installed via policy still get prompted from driver updates? Is there a way to know what driver updates in Intune actually have the drivers that potentially can cause bitlocker keys to be entered? Naming conventions in Intune for drivers are a bit difficult to decipher. – answered at 33:02.
Question – I noticed that some of my clients (around 5% so far) updated only two of three Secure Boot Certificates. Intune Remediation script shows the following output: Microsoft UEFI CA 2023 = False, Microsoft Corporation UEFI CA 2011 = True. Two other certificates are showing "2023" data string. Is it expected that not all the certificates are updated at the same time? – answered at 35:24.
Question – Will Microsoft release an OS upgrade that requires the EFI partition to be signed with the 2023 certificate? If so, is this expected in Windows 11 26H2, and has Microsoft announced anything about this? We want to avoid upgrading devices if it will re-sign the EFI partition before the new certificates are installed. – answered at 38:23.
Question – Can Secure Boot certificates be updated when Secure Boot is disabled? Microsoft’s AvailableUpdates process errors out unless Secure Boot is enabled. If a device won’t boot Windows with Secure Boot on, how can we bring it into compliance? – answered at 42:14.- Follow aka.ms/GetSecureBoot for the latest updates and new tools/guides.
Question – Does Server 2025 automagically comply? Both fresh install & Server 2022 update?– answered at 47:15.
- For more info, go to aka.ms/SecureBootForServer
Question – Will devices that have 2023 cert already require a boot.wim that has 2023 cert once June 2026 has passed? – answered at 49:00.
Question – How long will the 2023 certs last? Will this process need to be repeated when that happens? – answered at 50:47.
Question – I manually updated the registry on a device, set it to 22852, and forced the Scheduled Task to start, waited 30 seconds and forced a reboot, and the server (server 2019 VM in hyperv with the latest march patches) and it restarted several more times on its own before it settled down and showed updated. Not sure if several reboots are going to be required every time, of if me forcing things my running the scheduled task had this effect. – answered at 52:59.
Question – In the March 2026 release notes it says this: “With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.” Could you tell us more about this? - my guess is that you need telmetry on to have this nice feature/support? – answered at 55:27.
Question – How will Windows Update behavior change post-expiration on devices that haven't trusted the 2023 keys? Will they continue to install LCUs normally *except* for boot-critical components? Or fail to take LCUs altogether? Will this be messaged to users/admins somehow (Defender perhaps)? Will this prevent milestone updates (i.e. prevent 25H2 -> 26H2)? – answered at 57:36. - Paul_WoodwardIron Contributor
"Autopatch is coming soon" - how is stuff coming soon?? It's mid March! I would expect this to be ready for customers 6 months ago!
- JustinSECopper Contributor
Right. This whole thing seems like a mess.