Event details
It's time for our third Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast
Get started with these helpful resources
219 Comments
- BrianSmith42Copper Contributor
We've successfully updated some of our devices with the 2023 cert, and tested how PXE boot in SCCM would work. PXE boot worked fine when both 2011 and 2023 certs were enabled, which makes sense, and after revoking the 2011 cert, did not work, since the boot.wim doesn't contain the 2023 cert. A couple of questions:
Will the boot.wim naturally get the 2023 cert, if we keep SCCM/Windows SDK up-to-date?
Once we pass June 2026, will devices that didn't successfully get the 2023 cert yet still be able to PXE boot?
Will the 2011/2023 cert be able to live side-by-side in the boot.wim?- Pearl-Angeles
Community Manager
Thanks for participating in today's AMA! Your questions were covered at 18:25.
- Bryant_KintnerCopper Contributor
How important is it that the system already boots trusting the 2023 cert instead of the 2011 cert? Is it okay for the system to continue booting using the 2011 cert as long as the 2023 KEK and DB certificates install?
- Pearl-Angeles
Community Manager
Your question was answered at 26:48 during the live AMA.
- SujanPrabhuOccasional Reader
how can we get a compliance report if we do not use AutoPatch ?
- Pearl-Angeles
Community Manager
In addition to Ashis's response below, your question was also answered during the live AMA at 23:35.
- Ashis_Chatterjee
Microsoft
Autopatch is one of the ways, and it is not a requirement. You can inventory the devices in your environment using the sample powershell in:
aka.ms/getsecureboot->IT Managed section (on left Nav)
Sample Secure Boot Inventory Data Collection script
Copy and paste this sample script and modify as needed for your environment: The Sample Secure Boot Inventory Data Collection script.
- GiggsieOccasional Reader
For Devices Managed in SCCM. Will these be addressed through the Cumulative updates? Or is there other intervention we should be working towards?
- DJ8014ACopper Contributor
Deleted.
- KENNEDY3KOccasional Reader
if not updated, will not get security update means, is it related secure boot related update or OS related security related patch/update?
- mihiBrass Contributor
All updates that change the boot manager will no longer get applies. Usually these are secure boot related security updates, but maybe also bugfixes for exotic boot scenarios.
Normal kernel-level and user-level security vulnerabilities will be continued to be fixed.
- stephenyoung22Occasional Reader
If an organisation didn't meet the deadline or for example had some devices that didn't power up for a while. What is actually going to happen. It seems a very confusion scenario. I am also seeing ADKs and other ISOs still provided by Microsoft that have not been updated. Rufus is pretty keen to tell you that its not going to keep working.
- mihiBrass Contributor
Systems will still boot and apply the updates when they get powered up next time.
Also, there are no plans (outside of corporate environments that decide themselves to do so) to revoke old 2011 signed bootloaders soon, so your Rufus stick will still work except on those environments, or if you purchase a brand-new device that does not come with 2011 certificates any longer.
- Jacob3Occasional Reader
what happens if I deploy the updated certificates to a device that does not meet the minimum firmware version?
- Ashis_Chatterjee
Microsoft
If the minimum firmware version is not met, quite likely it is old firmware that is not being updated by OEM/ODM and has the old Secure Boot UEFI variable defaults. In this case, if you Toggle Secure Boot ON->OFF->ON, the older 2011 defaults from Firmware will overwrite and the Secure Boot Certificates in OS will need to be re-applied. If you do not Toggle Secure Boot OFF, which is not recommended, and you updated the Certificates, all is good, and you will continue to be secure.
- JustinSECopper Contributor
.
- a82739482785Occasional Reader
Can you clarify how this impacts customers on Microsoft Azure? How are gen1, gen2, and gen2 with trusted launch VMs affected and what remediation actions need to be taken (if any) for each VM type?
- Ashis_Chatterjee
Microsoft
Gen1 are not impacted. Gen2 with Trusted Launch impacted