Event details
It's time for our third Ask Microsoft Anything (AMA) about updating Secure Boot certificates on your Windows devices before they expire in June of 2026. If you've already bookmarked Secure Boot playbook, but need more details or have a specific question, join us to get the answers you need to prepare for this milestone. No question is too big or too small. Update scenarios, inventorying your estate, formulating the right deployment plan for your organization -- we're here to help!
How do I participate?
Registration is not required. Simply select Add to calendar then sign in to the Tech Community and select Attend to receive reminders. Post your questions in advance, or any time during the live broadcast
Get started with these helpful resources
219 Comments
- Arden_White
Microsoft
Yeah, it looks like it was able to update the DB with the certificates. I also would expect that the 2023 signed boot manager will update if it hasn't already. The KEK is what you don't get in this case - probably due to the age. The device will continue to run and get updates. What you won't get is the updates to the Secure Boot DBX when there are security issues in things like boot loaders and other firmware modules.
Kudos to you for keeping it running that long and to Dell for manufacturing something that lasts. I sympathize with you. I'm still using my Lenovo Yoga Pro 2 that is about the same age as your Dell. I can sense that I'm getting close to getting a new laptop. π- DJ8014ACopper Contributor
And yes I believe it did update the signed boot manager. Does that do us any good without the KEK?
- mihiBrass Contributor
The signed boot manager does not require the KEK to be updated, as the 2023 DB updates are signed with the 2011 KEK.
Only the next boot manager certificates (in 2038) will require the 2023 KEK to be present (if the device still works by then).
- DJ8014ACopper Contributor
We won't get updates to the Secure Boot DBX. Does that mean we will get updates to other Secure Boot components, or is it all or nothing?
- mihiBrass Contributor
You will get updates to the boot manager, even without KEK. You won't get the next certificates (in 2038 when the current ones expire) and you won't get any new DBX entries.
- nilisvw312Copper Contributor
How does Microsoft see what is needed for PXE boot with WINPE/MDT/SCCM etc?
After the 2011 certs expire is it correct to assume that the installation of Windows 11 via pxe boot etc is still working? As long as the bios fw has the 2011 (and 2023) certs available?So nothing needs to be changed towards boot images signed binaries unless the device only has 2023 certs in fw?
Also that means that after fresh install of W11 you always need to update the 2023 certs in Windows boot manager to get the security updates?Is this the case till we get a W11 version which is signed with the 2023 certs and requires boot images to have the 2023 signed binaries? So in this case you need to update the pxe/winpe/boot images?
- SCCM_TerrorCopper Contributor
I asked them the same question. As far as I understand, the old boot images will continue working during PXE Boot, as long as the old certificates (the ones from 2011) are present in the UEFI store. If the old certificates are revoked, we need to create new boot images, possibly using new Windows ADK.
- Jason_Sandys
Microsoft
Correct. And as called out in a few of my other answers (which you may or may not have seen) we have no intent to revoke the old certs as that serves no purpose and would cause widespread issues.
A key point in all of this to keep in mind is that the certs expiring has no immediate impact whatsoever. Nothing signed by these certs becomes invalid or untrusted just because the certs expired. Unless or really until we release an updated boot critical component that requires signing--which must be done with the new certs--nothing changes. When this does finally happen (as I'm sure it will happen at some point (but can't say how soon that will be) that's the time when that new component won't be trusted by devices without the new certs and thus they won't be able to install that new component. Again, components signed by the old certs, whether they be in a full OS instance or a WinPE boot image, are and will still be fully trusted--nothing changes for them.
- TxRedinTNOccasional Reader
How is Windows 10 LTSC, Win10 IOT LTSC, and Windows 11 IOT LTSC affected by the certificates? Will the new 2023 certificates be install on these devices? Win10LTSC and Win10 IOT LTSC should still be getting windows updates without the extended licensing. Thank you.
- txtechsquadCopper Contributor
So our devices have SecureBoot enabled, but we did not receive CA 2023. When will we receive it?
- Pearl-Angeles
Community Manager
Thank you for your participation in today's Ask Microsoft Anything! Below is a recap of the questions the panelists answered live, along with associated timestamps:
Question β What happens if you set the registry settings on a device that is still using Legacy BIOS? Is the update process smart enough to ignore those devices? β answered at 0:46.
Question β Our company does not allow us to use Intune. Are there any helpful tools or scripts to Inventory? β answered at 1:59.- For more info, go to aka.ms/GetSecureBoot
Question β During the February AMA, you en-phased that enterprises should leverage Intune and build their own dashboard to monitor secure boot states. The guide requires Enterprises licenses. As an MSP that manages thousands of devices with Business Premium Plan for multiple customers with Intune and Lighthouse it doesn't make sense. Is there a plan to monitor those states via a compliance policy instead? And also.. regarding the secured boot compliance policy that will happen to devices that will still have an old certificate, will they continue to show as compliant with the 2011 certificate? β answered at 3:24.
Question β Could you confirm that the Secure-Boot-Update scheduled task expects Microsoft's Owner GUID on Microsoft's signatures in Secure Boot? We customize the Secure Boot content and it seems that a different GUID causes the task to break the behavior of GetFirmwareEnvironmentVariableA() (used by BitLocker in other things). Could you also confirm that updating the firmware SVN (4th step of the revocations) only consists in adding SVNs to the DBX? And that for testing purposes, resetting the DBX is enough to cancel the rollback prevention? β answered at 6:03.
Question β "The KEK update (needs to be signed by the OEM because they own the PK) is required before June 2026." It's very possible I'm lost in the sauce, but I remember Scott in the December AMA saying that the various (existing) key/cert updates continued to work past 2026. This ties into the timestamping question you also responded to which I need to re-read.β answered at 9:20.
Question β If I ignore this and do nothing, will devices with (or without) secure boot enabled continue to boot? β answered at 10:38.
Question β What is the timeline of assisted Controlled Feature Update? Are you planning to roll out the Secure Boot Cert. Update to 100% of devices before June 2026? Or should we already prepare the alternative ways to update the devices (registry, GPO or Intune policy)? β answered at 12:05.
Question β Seeing some devices running on Hyper V with the March 2026 updates applied, some Server 2019 servers show updated, but capable = 0 other server 2019 same build same patch level shows updated and capable = 2. is this expected behavior that this status is different between these two VM's? β answered at 14:29
Question β What would be the impact of blanketly applying this policy setting? Enable Secureboot Certificate Updates: β answered at 16:02.
Question β Are these updates Bitlocker aware? Do we need to suspend bitlocker for 2-3 reboots during this process? β answered at 17:12
Question β We've successfully updated some of our devices with the 2023 cert, and tested how PXE boot in SCCM would work. PXE boot worked fine when both 2011 and 2023 certs were enabled, which makes sense, and after revoking the 2011 cert, did not work, since the boot.wim doesn't contain the 2023 cert. A couple of questions:
-Will the boot.wim naturally get the 2023 cert, if we keep SCCM/Windows SDK up-to-date?
-Once we pass June 2026, will devices that didn't successfully get the 2023 cert yet still be able to PXE boot? β answered at 18:25.
Question β How can we get a compliance report if we do not use AutoPatch? β answered at 23:35.
Question β What is the timeframe for the cert to upgrade if we leave the LCU to do the job based on a high confidence level compared to enabling the CFR settings? β answered at 23:51.
Question β How important is it that the system already boots trusting the 2023 cert instead of the 2011 cert? Is it okay for the system to continue booting using the 2011 cert as long as the 2023 KEK and DB certificates install? β answered at 26:48.
Question β I have deployed the secure boot remediation through Intune and I see event ID 1801 that says the certificates are available but not applied and the BucketConfidenceLevel shows Need more data. Do i need to take any action on that? β answered at 29:37.
Question β Looks like there have been reports online of users receiving driver updates that are requiring bitlocker keys to be entered after reboot. Is this expected behavior? If the certs were already installed via policy still get prompted from driver updates? Is there a way to know what driver updates in Intune actually have the drivers that potentially can cause bitlocker keys to be entered? Naming conventions in Intune for drivers are a bit difficult to decipher. β answered at 33:02.
Question β I noticed that some of my clients (around 5% so far) updated only two of three Secure Boot Certificates. Intune Remediation script shows the following output: Microsoft UEFI CA 2023 = False, Microsoft Corporation UEFI CA 2011 = True. Two other certificates are showing "2023" data string. Is it expected that not all the certificates are updated at the same time? β answered at 35:24.
Question β Will Microsoft release an OS upgrade that requires the EFI partition to be signed with the 2023 certificate? If so, is this expected in Windows 11 26H2, and has Microsoft announced anything about this? We want to avoid upgrading devices if it will re-sign the EFI partition before the new certificates are installed. β answered at 38:23.
Question β Can Secure Boot certificates be updated when Secure Boot is disabled? Microsoftβs AvailableUpdates process errors out unless Secure Boot is enabled. If a device wonβt boot Windows with Secure Boot on, how can we bring it into compliance? β answered at 42:14.- Follow aka.ms/GetSecureBoot for the latest updates and new tools/guides.
Question β Does Server 2025 automagically comply? Both fresh install & Server 2022 update?β answered at 47:15.
- For more info, go to aka.ms/SecureBootForServer
Question β Will devices that have 2023 cert already require a boot.wim that has 2023 cert once June 2026 has passed? β answered at 49:00.
Question β How long will the 2023 certs last? Will this process need to be repeated when that happens? β answered at 50:47.
Question β I manually updated the registry on a device, set it to 22852, and forced the Scheduled Task to start, waited 30 seconds and forced a reboot, and the server (server 2019 VM in hyperv with the latest march patches) and it restarted several more times on its own before it settled down and showed updated. Not sure if several reboots are going to be required every time, of if me forcing things my running the scheduled task had this effect. β answered at 52:59.
Question β In the March 2026 release notes it says this: βWith this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.β Could you tell us more about this? - my guess is that you need telmetry on to have this nice feature/support? β answered at 55:27.
Question β How will Windows Update behavior change post-expiration on devices that haven't trusted the 2023 keys? Will they continue to install LCUs normally *except* for boot-critical components? Or fail to take LCUs altogether? Will this be messaged to users/admins somehow (Defender perhaps)? Will this prevent milestone updates (i.e. prevent 25H2 -> 26H2)? β answered at 57:36. - Paul_WoodwardIron Contributor
"Autopatch is coming soon" - how is stuff coming soon?? It's mid March! I would expect this to be ready for customers 6 months ago!
- JustinSECopper Contributor
Right. This whole thing seems like a mess.
- Paul_WoodwardIron Contributor
If we don't get all the devices up-to-date before June, will it be possible to get them up-to-date later, or will they be stuck on old Boot Certs.
- Arden_White
Microsoft
Yes, the devices will continue to boot and run. Not updating the certificates will begin to put your devices at risk.
More details here:
- CTKMNCopper Contributor
I respect that you are picking and choosing which questions to answer, but before you shut down, could you answer some of the vSphere-related questions? Inquiring minds want to know :-)
- Cliff_HughesCopper Contributor
On the hyperv question, both the host and the guests were updated with the march CU's, so it resolved the errors with it being read only, but I did not expect it to reboot the computer 4 times in 30 minutes to get the job done, other client testing only one or two reboots were needed, and it was not happening automatically ever 3 or 4 minutes in a row on the device. Also still not seeing an answer for the Capable = 2 versus capable = 0 even though they show updated status otherwise.
- Paul_WoodwardIron Contributor
Been very disappointed by the new Secure Boot reports in Intune. Months late to the party, and you cannot filter or search on the "Certificate Status" field. And many devices show as 'unknown'.
- Jason_Sandys
Microsoft
Hi Paul_Woodwardβ, The easiest way to handle this is to export the report to CSV and use your favorite CSV manipulation tool to achieve this, e.g., PowerShell or Excel.
Alternatively, you can use a Remediation in Intune to supplement the built-in report: Monitoring Secure Boot certificate status with Microsoft Intune remediations - Microsoft Support