Microsoft is quietly making one of the most consequential Windows security shifts in years, and the timing could hardly be more important. As April 2026 Patch Tuesday lands with multiple critical fixes and at least one actively exploited zero-day, Microsoft is also beginning the long-awaited transition away from 2011-era Secure Boot certificates. For millions of PCs, especially older systems and devices still on Windows 10, this is not just another monthly update. It is a warning that the trust model protecting the earliest moments of the boot process is finally changing—and users who miss the transition may find themselves increasingly exposed.
The headline change is simple to state but significant in practice: Microsoft has started surfacing Secure Boot certificate update status inside the Windows Security app. Starting in April 2026, users can check Device security > Secure Boot and see whether their machine has received the new 2023 certificates, whether any action is needed, and whether the device has run into compatibility issues that prevent automatic servicing. The point is not just visibility. It is a new enforcement-and-awareness layer for a security foundation that has remained largely unchanged since Secure Boot was introduced in 2011.
That matters because the old certificates are now nearing expiration. Microsoft says the 2011 certificates begin expiring in June 2026, with some components expiring by October 2026, and the company is already pushing the replacement 2023 certificates through Windows Update for supported devices. In other words, this is a staged migration rather than a single-day flip. The system should keep working if the update is missed, but the device gradually loses the ability to receive new protections for boot-chain threats. That distinction is easy to underestimate and hard to ignore once attackers start targeting the early boot path more aggressively.
The new reporting inside Windows Security is also a hint about Microsoft’s broader strategy. Rather than leaving this as a hidden firmware-level change, the company is making the state visible to everyday users in a clearer, more consumer-friendly way. The interface uses green, yellow, and red badges to indicate status, with text guidance explaining what the colors mean and whether the user needs to take action. That is a notable shift for a feature historically managed by IT teams, OEM tools, and obscure firmware documentation.
At the same time, Microsoft is being explicit about the limits. Some systems, especially older hardware or devices with firmware quirks, may not be eligible for the automated update path. Those devices will not see the same level of protection and may ultimately need OEM assistance, firmware updates, or replacement. That is the real story here: not just that Microsoft is modernizing Secure Boot, but that it is forcing a reckoning with legacy hardware that has quietly coasted for years on assumptions about trust that are now expiring.
That stability is now becoming a liability. Microsoft’s support documents explain that the original Microsoft Secure Boot certificates issued in 2011 are beginning to expire in 2026. The company has been laying the groundwork for a transition to 2023 certificates, which are intended to keep Secure Boot functioning as designed and preserve the ability to deliver future boot-related security protections. The fact that this update is happening so long after Secure Boot’s introduction shows how slowly the deepest layers of platform trust tend to evolve.
The change also arrives at a moment when boot-level threats remain a serious concern. Microsoft notes that once certificates expire, standard Windows updates can still install, but protections for the early boot process are reduced. That includes updates to the Windows Boot Manager, Secure Boot databases, revocation lists, and future fixes for vulnerabilities in the boot chain. The user may not notice anything dramatic on day one, which is precisely why this transition is risky: the degradation is gradual, structural, and easy to miss.
For Microsoft, the challenge is compounded by the diversity of the Windows ecosystem. Consumer laptops, enterprise fleets, Surface devices, custom OEM systems, and virtualized environments all handle firmware updates differently. Some devices get the new certificates automatically through Windows Update, while others need additional OEM firmware support or managed deployment steps. Microsoft has even published separate guidance for IT professionals and organizations, which is a clear sign that the company expects uneven readiness across the installed base.
The practical danger is not that a device instantly stops working. Microsoft says devices should still start and continue to receive ordinary Windows updates even after the certificates expire. The danger is more subtle: once the boot chain can no longer be serviced properly, the machine becomes progressively less protected against future attacks that target startup integrity. That is the kind of security debt that accumulates quietly and then becomes expensive to pay down all at once.
A second important change is the timing. Microsoft says these enhancements are rolling out automatically starting in April 2026, with further improvements such as alerts outside the app and additional guidance beginning in May 2026. That sequence suggests Microsoft is trying to introduce awareness first, then push more visible remediation cues later. It is a classic staged rollout, but it also reflects the company’s caution: it wants to notify users without triggering unnecessary alarm before the certificates actually become urgent.
The update also pairs visibility with a new warning model. The Secure Boot badge can turn green, yellow, or red, and the red status indicates a condition that may require action. Microsoft says a “Requires action” state can appear if a boot security update cannot be delivered to the current boot configuration, especially after a vulnerability affecting the boot process is discovered and the device has not received updated certificates. That is not hypothetical future language; it is the kind of early warning system meant to prevent exactly the sort of mass exposure that would otherwise be discovered too late.
This matters because security tools fail when they are too opaque. If users cannot tell whether action is needed, they defer, and if they defer long enough, the risk becomes invisible until a problem hits. A simple visual indicator may be the most important part of the rollout because it bridges the gap between technical change and user behavior. That is a small design choice with outsized security consequences.
The real problem is that many systems will look healthy until the moment they need a new boot-related security update. Once that happens, a device stuck on old certificates may no longer be able to receive the patch. Microsoft’s support documentation is clear that the machine can keep running, but the protection model is no longer current. That is the definition of a degraded security state: usable, but increasingly unsafe in ways most users cannot see.
This is especially serious for older PCs. Microsoft notes that some devices older than two years are still using the expiring certificates, and not every system can be updated automatically. In practice, older firmware, enterprise lockdowns, and OEM support gaps can all become blockers. Users who assumed “Secure Boot is enabled, so I’m fine” may discover that the existence of Secure Boot is not the same as being on a fully current certificate chain.
That creates a long-tail risk that is easy to underestimate. Attackers do not need every system to fail at once; they only need a subset of unpatched, unprepared machines to build leverage. Once a boot-chain vulnerability is publicly understood, devices without the updated certificates could become especially attractive targets.
That makes the Secure Boot issue more than a firmware housekeeping exercise. For users who have delayed moving to Windows 11, the certificate shift is another reminder that the Windows 10 ecosystem is increasingly maintained by exception rather than by default. The operating system may still run well enough for daily use, but its security posture is becoming more dependent on special handling.
For consumers, that means a choice between upgrading hardware, staying on a managed support path, or accepting more risk. For enterprises, it means inventory discipline, firmware validation, and possibly accelerated refresh cycles. The same technical change lands differently depending on whether the machine is a home laptop, a classroom PC, or a fleet endpoint governed by policy. That split is one of the most important dimensions of the story.
Enterprises face a different problem. They may have compliance obligations, imaging workflows, and firmware restrictions that make the transition operationally messy. Microsoft has separate guidance for IT professionals because some devices cannot accept the update path without additional OEM firmware changes or deliberate rollout controls. In enterprise settings, silence is not safety; it is often just a sign that the monitoring is incomplete.
That creates a predictable but messy outcome. Newer devices from vendors with strong firmware update practices are more likely to transition smoothly, while older or less-supported systems may stall. The result is a two-speed security model, where the newest machines stay current and the oldest ones increasingly sit outside the modern trust boundary. That is not unique to Secure Boot, but it is especially visible here because the certificate chain is so foundational.
The Surface line offers a useful example of how this can work when the vendor is fully engaged. Microsoft says it began updating the UEFI Secure Boot Signature Database on Surface devices starting in 2023 through UEFI firmware delivered by Windows Update. That suggests the company has been preparing for this shift for years on at least some hardware lines. The challenge is scaling that discipline across the broader Windows ecosystem, where OEM quality and lifecycle management vary widely.
This is why Microsoft keeps emphasizing automatic delivery through Windows Update while also warning that some devices will need manufacturer help. The company is trying to preserve the promise of managed security without pretending every machine is equally ready. In practical terms, the computers most likely to need manual attention are also the ones least likely to be easy to replace.
This is a classic Microsoft pattern: a major security transition arrives when attention is already on vulnerability remediation. That is not accidental. Bundling the Secure Boot messaging with Patch Tuesday helps ensure the certificates are not treated as abstract policy housekeeping. It reframes them as part of the same broader defense effort against current threats.
The presence of an exploited zero-day also changes user psychology. People are more likely to take security seriously when there is a fresh reminder that attackers are active now, not just in theory. That creates an opportunity for Microsoft, but it also raises the stakes if the messaging is unclear. A user who hears “update now” may act on Patch Tuesday but still miss the separate Secure Boot status change unless the guidance is explicit.
From a risk standpoint, it also gives Microsoft a runway before June 2026, when the first certificates begin to expire. That runway is essential because firmware updates can fail, be delayed, or require OEM involvement. Waiting until the expiry date would be too late; starting now is the only realistic way to avoid mass confusion later.
That makes the new badge system useful in a very specific way: it transforms hidden risk into visible status. This is the kind of operational transparency that can prevent security debt from piling up unnoticed. It also gives users a way to distinguish between “my PC works” and “my PC is fully current,” which are not the same thing.
A simple checklist can help users react without overcomplicating the issue:
Do not assume a working desktop means the security posture is fine. The point of this transition is that the machine can look normal while becoming progressively less capable of handling future boot-chain threats. That is a subtle but important distinction, and it is exactly why Microsoft is adding in-app status reporting now.
The bigger strategic question is whether this becomes a template for future platform trust changes. Microsoft has spent years moving Windows toward a more managed, more visible, and more update-driven security model, and Secure Boot certificate expiration is the kind of deep-infrastructure event that can either validate that approach or reveal its weaknesses. Either way, the lesson is clear: the most important Windows security changes are increasingly the ones that happen beneath the desktop, in the firmware and trust layers users rarely see.
What to watch next:
Source: ABP News Windows Users Beware: Microsoft Changes Security System After 15 Years
Overview
The headline change is simple to state but significant in practice: Microsoft has started surfacing Secure Boot certificate update status inside the Windows Security app. Starting in April 2026, users can check Device security > Secure Boot and see whether their machine has received the new 2023 certificates, whether any action is needed, and whether the device has run into compatibility issues that prevent automatic servicing. The point is not just visibility. It is a new enforcement-and-awareness layer for a security foundation that has remained largely unchanged since Secure Boot was introduced in 2011.That matters because the old certificates are now nearing expiration. Microsoft says the 2011 certificates begin expiring in June 2026, with some components expiring by October 2026, and the company is already pushing the replacement 2023 certificates through Windows Update for supported devices. In other words, this is a staged migration rather than a single-day flip. The system should keep working if the update is missed, but the device gradually loses the ability to receive new protections for boot-chain threats. That distinction is easy to underestimate and hard to ignore once attackers start targeting the early boot path more aggressively.
The new reporting inside Windows Security is also a hint about Microsoft’s broader strategy. Rather than leaving this as a hidden firmware-level change, the company is making the state visible to everyday users in a clearer, more consumer-friendly way. The interface uses green, yellow, and red badges to indicate status, with text guidance explaining what the colors mean and whether the user needs to take action. That is a notable shift for a feature historically managed by IT teams, OEM tools, and obscure firmware documentation.
At the same time, Microsoft is being explicit about the limits. Some systems, especially older hardware or devices with firmware quirks, may not be eligible for the automated update path. Those devices will not see the same level of protection and may ultimately need OEM assistance, firmware updates, or replacement. That is the real story here: not just that Microsoft is modernizing Secure Boot, but that it is forcing a reckoning with legacy hardware that has quietly coasted for years on assumptions about trust that are now expiring.
Background
Secure Boot is one of those Windows technologies that most users never think about until something goes wrong. It is part of the UEFI firmware stack and is designed to ensure that only trusted software is allowed to run during startup. In practice, that means helping protect the boot chain from tampering, rootkits, and persistent malware that tries to insert itself before Windows fully loads. Microsoft has relied on this architecture for more than a decade, and the trust anchors behind it—its certificates—have been remarkably stable.That stability is now becoming a liability. Microsoft’s support documents explain that the original Microsoft Secure Boot certificates issued in 2011 are beginning to expire in 2026. The company has been laying the groundwork for a transition to 2023 certificates, which are intended to keep Secure Boot functioning as designed and preserve the ability to deliver future boot-related security protections. The fact that this update is happening so long after Secure Boot’s introduction shows how slowly the deepest layers of platform trust tend to evolve.
The change also arrives at a moment when boot-level threats remain a serious concern. Microsoft notes that once certificates expire, standard Windows updates can still install, but protections for the early boot process are reduced. That includes updates to the Windows Boot Manager, Secure Boot databases, revocation lists, and future fixes for vulnerabilities in the boot chain. The user may not notice anything dramatic on day one, which is precisely why this transition is risky: the degradation is gradual, structural, and easy to miss.
For Microsoft, the challenge is compounded by the diversity of the Windows ecosystem. Consumer laptops, enterprise fleets, Surface devices, custom OEM systems, and virtualized environments all handle firmware updates differently. Some devices get the new certificates automatically through Windows Update, while others need additional OEM firmware support or managed deployment steps. Microsoft has even published separate guidance for IT professionals and organizations, which is a clear sign that the company expects uneven readiness across the installed base.
Why Secure Boot matters more than it sounds
Secure Boot is often discussed as a checkbox feature, but it is really a trust anchor for the entire platform. If the boot path can be compromised, attackers can gain a persistence mechanism that survives reinstall attempts and undermines later security controls. That is why certificate expiration is not a cosmetic issue; it affects whether the platform can continue to validate the code that runs before Windows is fully awake.The practical danger is not that a device instantly stops working. Microsoft says devices should still start and continue to receive ordinary Windows updates even after the certificates expire. The danger is more subtle: once the boot chain can no longer be serviced properly, the machine becomes progressively less protected against future attacks that target startup integrity. That is the kind of security debt that accumulates quietly and then becomes expensive to pay down all at once.
What Microsoft changed in April 2026
The most visible update is the new status display in the Windows Security app. Microsoft says the app now shows whether a device has received the Secure Boot certificate update, its current state, and whether user action is required. This information lives under Device security > Secure Boot, making it easier for ordinary users to discover than the older, more technical routes that security administrators often relied on.A second important change is the timing. Microsoft says these enhancements are rolling out automatically starting in April 2026, with further improvements such as alerts outside the app and additional guidance beginning in May 2026. That sequence suggests Microsoft is trying to introduce awareness first, then push more visible remediation cues later. It is a classic staged rollout, but it also reflects the company’s caution: it wants to notify users without triggering unnecessary alarm before the certificates actually become urgent.
The update also pairs visibility with a new warning model. The Secure Boot badge can turn green, yellow, or red, and the red status indicates a condition that may require action. Microsoft says a “Requires action” state can appear if a boot security update cannot be delivered to the current boot configuration, especially after a vulnerability affecting the boot process is discovered and the device has not received updated certificates. That is not hypothetical future language; it is the kind of early warning system meant to prevent exactly the sort of mass exposure that would otherwise be discovered too late.
The visual language of risk
The green-yellow-red approach is more than UI polish. It reflects Microsoft’s effort to translate a low-level firmware issue into a consumer-readable status system. Most users will never inspect certificates directly, but they can understand a warning badge if the message is plain enough.This matters because security tools fail when they are too opaque. If users cannot tell whether action is needed, they defer, and if they defer long enough, the risk becomes invisible until a problem hits. A simple visual indicator may be the most important part of the rollout because it bridges the gap between technical change and user behavior. That is a small design choice with outsized security consequences.
Why the expiry window is dangerous
Microsoft says the 2011 certificates begin expiring in June 2026, and some expiring components can affect the boot trust chain by October 2026. That gives users and organizations a window, but not much of one. A staggered expiry can lull people into thinking they have more time than they really do, especially if a device still appears to boot normally and basic Windows Update behavior remains unchanged.The real problem is that many systems will look healthy until the moment they need a new boot-related security update. Once that happens, a device stuck on old certificates may no longer be able to receive the patch. Microsoft’s support documentation is clear that the machine can keep running, but the protection model is no longer current. That is the definition of a degraded security state: usable, but increasingly unsafe in ways most users cannot see.
This is especially serious for older PCs. Microsoft notes that some devices older than two years are still using the expiring certificates, and not every system can be updated automatically. In practice, older firmware, enterprise lockdowns, and OEM support gaps can all become blockers. Users who assumed “Secure Boot is enabled, so I’m fine” may discover that the existence of Secure Boot is not the same as being on a fully current certificate chain.
What happens if nothing is done
If nothing is done, the machine does not necessarily break immediately. Microsoft says Windows updates continue to install, and the device should still start normally. But the key security functions that protect the early boot process are no longer guaranteed to receive future servicing in the same way.That creates a long-tail risk that is easy to underestimate. Attackers do not need every system to fail at once; they only need a subset of unpatched, unprepared machines to build leverage. Once a boot-chain vulnerability is publicly understood, devices without the updated certificates could become especially attractive targets.
Windows 10 users face a sharper edge
Windows 10 users sit at the uncomfortable intersection of two timelines. On the one hand, Microsoft is pushing the Secure Boot certificate transition across supported devices. On the other hand, Windows 10 support has already ended for many mainstream configurations, which means the path to continued protection is narrower and more conditional. Microsoft’s own update notes point users toward Extended Security Updates if they want continued access to critical and important security fixes.That makes the Secure Boot issue more than a firmware housekeeping exercise. For users who have delayed moving to Windows 11, the certificate shift is another reminder that the Windows 10 ecosystem is increasingly maintained by exception rather than by default. The operating system may still run well enough for daily use, but its security posture is becoming more dependent on special handling.
For consumers, that means a choice between upgrading hardware, staying on a managed support path, or accepting more risk. For enterprises, it means inventory discipline, firmware validation, and possibly accelerated refresh cycles. The same technical change lands differently depending on whether the machine is a home laptop, a classroom PC, or a fleet endpoint governed by policy. That split is one of the most important dimensions of the story.
Consumer impact versus enterprise impact
Consumers will mostly encounter this as a warning, badge, or support prompt in Windows Security. They are less likely to manage Secure Boot certificates directly, which makes Microsoft’s automatic delivery and UI surfacing especially important. The risk is confusion: many people will assume they are safe because the machine still boots and antivirus appears active.Enterprises face a different problem. They may have compliance obligations, imaging workflows, and firmware restrictions that make the transition operationally messy. Microsoft has separate guidance for IT professionals because some devices cannot accept the update path without additional OEM firmware changes or deliberate rollout controls. In enterprise settings, silence is not safety; it is often just a sign that the monitoring is incomplete.
What the update means for hardware and OEMs
The certificate shift is likely to expose an uncomfortable reality: not every PC in the wild can be fully serviced through Windows Update alone. Microsoft acknowledges that some devices have hardware or firmware limitations that block the automated Secure Boot certificate update. In those cases, users may be told to contact the device manufacturer, which means the burden shifts from Microsoft’s software layer to the OEM ecosystem.That creates a predictable but messy outcome. Newer devices from vendors with strong firmware update practices are more likely to transition smoothly, while older or less-supported systems may stall. The result is a two-speed security model, where the newest machines stay current and the oldest ones increasingly sit outside the modern trust boundary. That is not unique to Secure Boot, but it is especially visible here because the certificate chain is so foundational.
The Surface line offers a useful example of how this can work when the vendor is fully engaged. Microsoft says it began updating the UEFI Secure Boot Signature Database on Surface devices starting in 2023 through UEFI firmware delivered by Windows Update. That suggests the company has been preparing for this shift for years on at least some hardware lines. The challenge is scaling that discipline across the broader Windows ecosystem, where OEM quality and lifecycle management vary widely.
The OEM problem in plain English
When firmware support lags, users inherit the gap even if they did everything “right” from a software perspective. A device can be perfectly patched at the Windows layer and still miss the deeper firmware changes required to keep Secure Boot current. That is frustrating, but it is also a reminder that modern PC security is a stack, not a single toggle.This is why Microsoft keeps emphasizing automatic delivery through Windows Update while also warning that some devices will need manufacturer help. The company is trying to preserve the promise of managed security without pretending every machine is equally ready. In practical terms, the computers most likely to need manual attention are also the ones least likely to be easy to replace.
The Patch Tuesday backdrop
The Secure Boot rollout is happening alongside a particularly urgent Patch Tuesday. Microsoft’s April 2026 update cycle includes multiple critical fixes and at least one actively exploited zero-day flaw, which makes the month feel more like a coordinated security checkpoint than a routine patch window. That backdrop matters because it increases the likelihood that users will notice the warnings, even if they do not immediately understand them.This is a classic Microsoft pattern: a major security transition arrives when attention is already on vulnerability remediation. That is not accidental. Bundling the Secure Boot messaging with Patch Tuesday helps ensure the certificates are not treated as abstract policy housekeeping. It reframes them as part of the same broader defense effort against current threats.
The presence of an exploited zero-day also changes user psychology. People are more likely to take security seriously when there is a fresh reminder that attackers are active now, not just in theory. That creates an opportunity for Microsoft, but it also raises the stakes if the messaging is unclear. A user who hears “update now” may act on Patch Tuesday but still miss the separate Secure Boot status change unless the guidance is explicit.
Why timing is strategically smart
From a communication standpoint, April 2026 is a smart moment to begin the Secure Boot status rollout. Users are already conditioned to expect security notices around Patch Tuesday, so the new badge system enters the conversation when attention is highest. That reduces the odds that the transition is overlooked entirely.From a risk standpoint, it also gives Microsoft a runway before June 2026, when the first certificates begin to expire. That runway is essential because firmware updates can fail, be delayed, or require OEM involvement. Waiting until the expiry date would be too late; starting now is the only realistic way to avoid mass confusion later.
How users should think about the warning
Most users do not need to become firmware experts, but they do need to understand the basic logic of the change. If the Windows Security app shows that Secure Boot certificate updates are current, the device is on the right path. If it shows a warning or requires action, the system may still be functional but is not fully protected for future boot-related threats.That makes the new badge system useful in a very specific way: it transforms hidden risk into visible status. This is the kind of operational transparency that can prevent security debt from piling up unnoticed. It also gives users a way to distinguish between “my PC works” and “my PC is fully current,” which are not the same thing.
A simple checklist can help users react without overcomplicating the issue:
- Open Windows Security and check Device security > Secure Boot.
- Look for the status badge and read the guidance attached to it.
- Install pending Windows updates, including any firmware or dynamic update components.
- If the device reports a limitation, contact the OEM or IT administrator.
- For unsupported or end-of-life systems, evaluate upgrade or extended support options.
What not to do
Do not disable Secure Boot just to avoid the warning. Microsoft explicitly says Secure Boot should not be turned off as a workaround for certificate expiration. That would solve the symptom while undermining the entire protection model.Do not assume a working desktop means the security posture is fine. The point of this transition is that the machine can look normal while becoming progressively less capable of handling future boot-chain threats. That is a subtle but important distinction, and it is exactly why Microsoft is adding in-app status reporting now.
Strengths and Opportunities
Microsoft’s move has real strengths, and if it is executed well it can improve visibility, reduce confusion, and harden the Windows platform before the certificate deadline arrives. It also gives the company a chance to normalize firmware-level security updates as part of the everyday Windows maintenance experience rather than an obscure enterprise task. The opportunity is not merely technical; it is also behavioral, because users are more likely to act when risk is visible and explained in plain language.- Better visibility for a hidden security layer.
- Automatic delivery for supported devices through Windows Update.
- Clearer user guidance through the Windows Security app.
- Earlier warning before the June 2026 expiration window.
- Improved compliance potential for enterprise fleets.
- Reduced ambiguity between functional booting and secure boot trust.
- A stronger baseline for future boot-chain protections.
Risks and Concerns
The risks are just as real, especially for older machines, mixed-vendor fleets, and users who do not recognize the importance of Secure Boot status. If the rollout surfaces warnings without clear paths to remediation, people may either ignore them or make unsafe changes, including disabling protections they do not understand. The transition also exposes the long tail of hardware that may no longer be adequately supported by its original manufacturer.- Older devices may not receive the update automatically.
- Firmware limitations may block the new certificate chain.
- User confusion could lead to ignored warnings.
- OEM dependency may slow remediation.
- Windows 10 devices may face steeper support constraints.
- Delayed action could leave boot-chain fixes unavailable later.
- False confidence may persist if users equate booting with safety.
Looking Ahead
The next few months will determine whether this becomes a smooth migration or a support headache. If Microsoft’s automatic delivery works broadly and the Windows Security app communicates clearly, many users may never feel the transition except as a badge that quietly turns green. If not, the June 2026 expiry window could expose a long tail of PCs that are still running but no longer aligned with Microsoft’s security roadmap.The bigger strategic question is whether this becomes a template for future platform trust changes. Microsoft has spent years moving Windows toward a more managed, more visible, and more update-driven security model, and Secure Boot certificate expiration is the kind of deep-infrastructure event that can either validate that approach or reveal its weaknesses. Either way, the lesson is clear: the most important Windows security changes are increasingly the ones that happen beneath the desktop, in the firmware and trust layers users rarely see.
What to watch next:
- Whether more devices begin showing Secure Boot status indicators in Windows Security.
- How quickly Microsoft expands outside-app notifications in May 2026.
- Whether OEMs provide firmware updates for older supported hardware.
- How Windows 10 systems are handled as the June 2026 expiry nears.
- Whether the June-to-October expiration window triggers broader remediation guidance.
Source: ABP News Windows Users Beware: Microsoft Changes Security System After 15 Years
Similar threads
- Featured
- Article
- Replies
- 0
- Views
- 295
- Article
- Replies
- 0
- Views
- 53
- Replies
- 0
- Views
- 68
- Article
- Replies
- 1
- Views
- 232
- Article
- Replies
- 0
- Views
- 445