Event details
It's time for our third Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast
Get started with these helpful resources
219 Comments
- KENNEDY3KOccasional Reader
any operational impact if not enabled secure boot and not updated CA/KEY 2023 like applying monthly security patches?
- dcdealOccasional Reader
If I ignore this and do nothing, will devices with (or without) secure boot enabled continue to boot?
- Pearl-Angeles
Community Manager
In addition to Prabhakar's response, the panelists covered your question during the live AMA at 10:38.
- Prabhakar_MSFT
Microsoft
Hello dcdeal Devices will continue to boot after certificate expiry. After certificates have expired, devices can no longer apply security updates to Boot manager and Secure Boot. Refer to When Secure Boot certificates expire on Windows devices - Microsoft Support for details regarding impact of expired Secure Boot certificates
- SCCM_TerrorCopper Contributor
What is the timeline of assisted Controlled Feature Update? Are you planning to roll out the Secure Boot Cert. Update to 100% of devices before June 2026? Or should we already prepare the alternative ways to update the devices (registry, GPO or Intune policy)?
- Pearl-Angeles
Community Manager
Your question was answered during the live AMA at 12:05.
- jonathan25Copper Contributor
Any guidance on older Lenovo ThinkStation devices? Specifically P330 Tiny and P350 Tiny. We've updated to the latest BIOS, but they all throw an Access Denied error when attempting to update the KEK. We've discovered that suspending BitLocker, manually entering BIOS, and loading factory default Secure Boot keys resolves the issue, but we don't have the resources to physically put hands on all these devices. Are there more updates in the works that will allow these ThinkStations to update the KEK without manual user intervention?
- Cliff_HughesCopper Contributor
Seeing some devices running on Hyper V with the March 2026 updates applied, some Server 2019 servers show updated, but capable = 0 other server 2019 same build same patch level shows updated and capable = 2. is this expected behavior that this status is different between these two VM's?
- Pearl-Angeles
Community Manager
Thanks for your question! Panelists covered this topic at 14:29.
- Jacob3Occasional Reader
What would be the impact of blanketly applying this policy setting? Enable Secureboot Certificate Updates:
(Enabled) Initiates the deployment of new secure boot certificates and related updates.
- Pearl-Angeles
Community Manager
Your question was answered during the live AMA at 16:02.
- Dan AlvaradoCopper Contributor
We started a while before the playbook came out – using previous instructions on how to update the db and verify the 2023 certificate in the EFI file.
Only recently noticed that this does not update KEK automatically.
Could we in confidence, target out confirmed db\efi file updated devices with the script to update the AvailableUpdates key and the Scheduled Task to complete the update?
On the handful of devices I tried this on, the UEFICA2023Status value changed to Updated after a few moments.
We are not able to enable the share diagnostic data with Microsoft settings to allow MicrosoftUpdateManagedOptin, so we’ll be managing this ourselves.
- mihiBrass Contributor
If you used older AvailableUpdate flags, it may not have included KEK updates, yes.
I would just re-run with the current flags to get the KEK updated as well, as well as any other things not updated yet. The system will automatically skip flags that have already been applied, and they will get set back to zero (except the 0x4000 flag), so that you will end up with 0x4000 or 0x0 at the end.
Or set it to 0x4004 to only update the KEK, if you prefer going that route.
- RevoTechCopper Contributor
Are these updates Bitlocker aware? Do we need to suspend bitlocker for 2-3 reboots during this process?
We've ran into Bitlocker boot loops on a small percentage of Surface Laptop 7 devices. How do we prevent that using registry deployment (AvailableUpdates 0x5944)?- Pearl-Angeles
Community Manager
In addition to the response below, your question was answered during the live AMA at 17:12.
- rparmar50
Microsoft
Yes, these are BitLocker aware, no need to suspend BitLocker.
- e-idyCopper Contributor
What is the proper to detect if a device's secureboot certs updated correctly?
Some devices show different responses across all 3 detection methods that was recommended:
UEFICA2023Status = Enabled
EventViewer Event 1808 = Updated
Intune SecureBoot Report = Successful
Sometimes the 3 above conflict with each other on some devices. A device may have UEFICA2023Status = Enabled but no 1808 event in EventViewer
- Carl BarrettCopper Contributor
Is there a risk we trigger BitLocker recovery for users if we update the secure boot cert? Not seen any cases yet but there does seem to be fear around this aspect. Perhaps we need to be careful in some scenarios only? thanks