• Thread Author
Microsoft has quietly begun a platform-level refresh of the cryptographic anchors that protect Windows’ pre‑boot environment, delivering new Secure Boot certificates through Windows Update and coordinated OEM firmware work to head off a calendar‑driven failure when Microsoft’s original UEFI certificates—first issued around 2011—begin to expire in mid‑2026. ([support.microsoft.microsoft.com/en-us/topic/secure-boot-certificate-updates-guidance-for-it-professionals-and-organizations-e2b43f9f-b424-42df-bc6a-8476db65ab2f)

Neon blue shield icon with a 2023 document atop a circuit board, symbolizing firmware security.Background​

UEFI Secure Boot is the firmware‑level mechanism that ensures only trusted, digitally signed code runs before the operating system starts. Its trust model depends on a small set of certificate authorities (CAs) and keys stored in firmware variables: the Platform Key (PK), Key Exchange Keys (KEK), and the signature databases (DB and DBX). Over the last decade Microsoft has supplied a family of UEFI signing certificates used by Windows and many ecosystem partners to sign bootloaders, option ROMs, and other pre‑OS components.
Those Microsoft‑provided certificates were originally issued around 2011 and were always expected to have finite lifetimes. As those 2011‑era keys approach the end of their ing in June 2026 and with related expirations through October 2026—Microsoft and OEM partners have coordinated a phased replacement: a new “2023” family of UEFI/CA certificates will be seeded to firmware and to Windows so that the Secure Boot chain of trust continues uninterrupted.
This article explains what changed, who is affected, how the rollout works, the practical risks of not transitioning, and step‑by‑step guidance for both home users and IT teams to avoid startup or long‑term security problems.

What Microsoft changed — the technical summary​

  • Microsoft published guidance and began distributing replacement Secure Boot certificates (the 2023 CA family) through Windows servicing and coordinated OEM firmware updates so devices don’t lose the ability to receive boot‑level protections after the 2011 certs expire.
  • The replacement set includes distinct certificates to separate concerns: a KEK replacement (Microsoft Corporation KEK 2K CA 2023) to authorize DB/DBX updates; a Windows UEFI CA 2023 to sign Windows boot loader components; and one or two UEFI CA variants for third‑party boot loaders and option ROMs (including a Microsoft Option ROM UEFI CA 2023 where required). This separation allows finer control over what firmware trusts after the transition.
  • Microsoft’s documentation and partner guidance make clear that already‑signed binaries remain valid even after the old CA expires; the risk is with future updates. Devices that do not receive the new CA certificates will continue to boot with existing signed components, but they will new DB/DBX updates or newly signed boot components once the 2011 certs lapse. Over time, that creates a degraded security state.
These are not theoretical or optional changes: the Secure Boot certificate chain underpins Windows’ ability to protect the earliest software that runs on your machine, and a coordinated, tested transition is required to avoiat protection model.

Who is affected​

Windows 11 devices​

Most Windows 11 machines are being prioritized for the certificate refresh and will receive the new certificates automatically via Windows Update in a phased rollout. Microsoft’s messaging explicitly urges Windows 11 users to keep devices updated so the new certificates are delivered before the 2011 roots begin to expire.

Windows 10 devices​

Devices running Windows 10 are only covered if they continue to receive servicing. Systems that have not been upgraded to a supported Windows release and are therefore outside Microsoft’s monthly servicing plane will not automatically receive the certificate refresh. Microsoft has recommended that organizations still on older Windows releases consider enrolling in the Extended Security Updates (ESU) program to keep receiving critical platform deliveries, including this certificate refresh where applicable.

Older firmware, unmanaged and air‑gapped devices​

A material minority of systems may require firmware or BIOS/UEFI updates from OEMs to fully accept and persist the new certificates. This includes:
  • Devices with outdated OEM firmware that cannot accept additional KEK/DB entries,
  • Enterprise or industrial devices that are air‑gapped or otherwise managed offline,
  • Custom‑signed Linux distributions and environments that rely on their own shim/signing flows and therefore may need new shims signed against the 2023 CAs.
Game consoles aren’t directly implicated here, but anti‑cheat systems on Windows PCs that rely on Secure Boot integrity can be affected if the device falls out of the certificate transition. Several anti‑cheat vendors and gaming outlets have already called attention to the change because of those dependencies.

Why the change matters — risks and realistic consequences​

At first glance: devices will still boot. That’s true, but it understates the security consequences.
  • Loss of future boot‑level updates: When a device still contains only the expiring 2011 certificates and those certificates reach their expiry, Microsoft (and OEMs) will no longer be able to sign and deliver new DB, DBX, or boot component updates that the firmware would accept. That means new mitigations for pre‑boot vulnerabilities or new revocations of compromised boot signatures cannot be applied to those machines. Over time, this reduces the effectiveness of Secure Boot as a protective layer.
  • Compatibility and ecosystem friction: Future versions of signed boot components, hypervisors, or anti‑cheat drivers that are signed with new certificates may not be trusted by systems that never received the 2023 CA family. That can cause application or driver failures, blocked updates, or issues with secure scenarios like BitLocker recovery flows that rely on Secure Boot integrity.
  • Operational headaches for IT: For enterprises wiecialized equipment, the problem isn’t instant failure. It’s the accumulation of edge cases—air‑gapped servers, imaging workflows, custom‑signed shims and bootloaders, and firmware‑locked devices—that make remediation costly under time pressure. The recommended mitigation is planning and staged validation now rather than emergency remediation later.
  • False sense of safety: Because machines will continue to start after the expiry, some administrators or home users may ignore the issue. That “it still boots” logic is dangerous: the device’s ability to accept future protections is what is at stake. Microsoft labels this a migration to avoid a degraded security state, and the industry reporting echoes that call.

How the rollout is designed to work​

Microsoft and OEM partners designed a multi‑track, phased approach rather than a blunt, one‑time swap:
  • Seed new certificates to new hardware: OEMs began shipping devices with the 2023 certificates included in firmware long before the expiry window, so newer machines already trust both 2011 and 2023 families where appropriate.
  • Deliver through Windows servicing: For existing devices, Microsoft is delivering the new KEK/DB entries via Windows Update as part of cumulative/security rollups. The OS‑side update writes the new certificates into firmware where allowed, or prepares the system to accept the keys if an OEM firmware update is also required. This staged delivery reduces the blast radius and lets Microsoft gate pnd compatibility signals. (support.microsoft.com
  • Coordinate OEM firmware updates: For machines where the firmware cannot accept an automatic addition of keys or where OEM policy requires vendor involvement, OEMs will ship BIOS/UEFI updates to enroll the new cetors should monitor OEM advisories for those models that need manual firmware updates.
  • Partner guidance for Linux and shims: Distributions and customers that manage their own shims (for example, some RHEL/CentOS/Ubuntu deployments) need to rebuild and re‑sign shims against the new certificates or deploy updated shims provided by distribution vendors to ensure continued compatibility. Red Hat and others have posted guidance aligned with Microsoft’s timetable.
This cautiroach helps avoid mass outages, but it requires coordination; the majority of devices will update automatically, while a minority will require human intervention.

Practical steps for users and administrators​

Below are concrete, actionable steps to make sure your systems complete the migration safely.

For home users with Windows 11 (recommended)​

  • Keep Windows Update enabled and allow the February/March 2026 cumulative updates (or the next available rollups) to install. Windows Update delivers the new certificates to the majority of systems automatically.
  • If you use custom boot configurations, dual‑boot with Linux, or manually enroll keys in firmware, check your firmware Secure Boot configuration after updates and follow vendor guidance before making further changes. Some custom shims may need ment.
  • If you are a gamer, don’t panic—but do keep your system updated. Major anti‑cheat vendors have acknowledged the update and OEMs and Microsoft are coordinating to avoid breaking game integrity checks. Still, machines with out‑of‑date firmware may need vendor updates.

For IT teams and enterprises​

  • Inventory: Identify devices with Secure Boot enabled and record firmware versions andze servers and endpoints that are air‑gapped or have long lifecycles.
  • Pilot: Test the Windows‑delivered certificate update on a small representative set of hardware models and any custning workflows. Validate boot, BitLocker, and recovery scenarios.
  • Firmware patch plan: For models that cannot accept the update via Windows alone, prepare to deploy OEM BIOS/UEFI updates that enroll the new CA family. Coordinate maintenance windows and test recovery processes.
  • ESU and legacy support: If you run older Windows releases, evaluate Extended Security Updates (ESU) enrollment to maintain access to platform deliveries while you migrate or decommission legacy devices. This is especially important for machines that cannot receive firmware updates or are out of the normal servicing channel.
  • Communication: Inform stakeholders—desktop support, security, imaging teams, and vendor contacts—about the timelines. Don’t wait until June 2026 to start action; most organizations will need weeks or months to validate and roll out firmware updates across diverse hardware famio verify whether your machine already has the new certificates
There are a few straightforward checks administrators and power users can run.
  • Windows PowerShell: Query the UEFI Secure Boot variables (DB, KEK) to inspect enrolled certificates. Microsoft and community documentation include sample PowerShell commands to list subject names and thumbprints of enrolled CAs. If you see the new “2023” CA entries listed, the device has already enrolled the replacement certificates.
  • Firmware setup screens: On many OEM machines you can inspect Secure Boot key enrollment from the UEFI setup utility. The presentation varies by vendor but firmware menus commonly display enrolled key aliases.
  • Vendor‑specific toogement: Use your endpoint management tools (SCCM/Intune/others) to query Secure Boot state and firmware versions at scale. Many organizations will aance check to flag non‑compliant hardware before June 2026.
If you are unsure how to interpret the results, capture the subject names and thumbprints and consulyour internal security team.

Troubleshooting: if something goes wrong​

  • Boot facate update are rare, but possible on devices with firmware bugs or custom Secure Boot key state. If a machine won’t boot after an attempted update, use the OEM recovery menu and consult vendor instructions for restoring previous key statEK entries.
  • If BitLocker or device encryption triggers a recovery prompt after a change in Secure Boot keys, recover keys using your normal BitLoc That’s why administrators must ensure BitLocker recovery information is backed up before mass rollouts.
  • For air‑gapped or offline devices, plan for manual firmware update procedures and test those in maintenance windows. Don’t attempt blind mass firmware updates without pilot validation.
  • If you encounter devices that absolutely cannot accept new keys and cannot be upgraded, catalog their risk and consider decommissioning or isolating them from sensitive networks. Leaving such devices running in a production network after the 2011 certs expire increases long‑term exposure.

Strengths of Microsoft’s approach — and where risks remain​

Microsoft’s plan has clear strengths: the vendor began the migration early, published detailed guidance for partners and IT, and leveraged Windows Update for mass distribution while coordinating OEM firmware updates for edge cases. This layered approach signihance of a sudden, industry‑wide outage and gives enterprises time to plan.
However, notable risks remain:
  • Firmware diversity: The PC ecosystem remains extremely fragmented. OEM firmware implementations vary; some vendors may require manual updates or expose firmware limitations that prevent automatic enrollment. That minority of devices could become a persistent operational burden.
  • Timing and communications: The expiry window (June–October 2026) is fixed. That constrains the time available to handle complex imaging workflows, air‑gapped devices, and specialized hardware, and it puts pressure on organizations that ft’s guidance is clear, but execution still rests with thousands of OEM and enterprise engineering teams. (support.microsoft.com)
  • Third‑party ecosystems: Linux distributions, custom shims, and third‑party boot components must be re‑signed or reissued in many cases. While major vendors are coordinating, smaller projects and bespoke software may be overlooked. That increases the chance of compatibility surprises in niche environments.
  • Non‑serviced Windows 10 fleets: Organizations that deferred migrations and aren’t on ESU risk falling outside the automatic delivery path and will need manual remediation—often expensive and slow.

Checklist: A short operational playbook​

  • Inventory all devices with Secure Boot enabled and identify firmware versions and OEM models.
  • Pilot the Windows update that installs 2023 CA certificates on a representative device set. Validate BitLocker, dual‑boot, and anti‑cheat/driver scenarios.
  • Identify models that need OEM BIOS/UEFI updates and schedule firmware deployments.
  • For Linux and custom environments, coordinate with distro vendors for updated shims signed by the 2023 family.
  • Back up BitLocker recovery keys and ensure recovery procedures are tested before broad rollout.
  • Track updates and compliance using endpoint management tools; escalate models that remain unpatched as decommissioning candidates if necessary.

Final assessment and recommendation​

This is one of those operational changes that looks small in a headline but matters because it touches the root of trust on billions of devices. Microsoft’s early, phased approach is the right one: it reduces the likelihood of a mass outage, provides vendor guidance, and gives organizations predictable paths to remediation. The most likely outcome is a smooth transition for the vast majority of users who keep Windows Update enabled and apply OEM firmware updates when offered.
But the minority matters. Unmanaged Windows 10 machines that haven’t enrolled in ESU, specialized industrial equipment, air‑gapped servers, and custom‑shimbed Linux deployments present real operational risk. For those, the safe strategy is proactive inventory, testing, and remediation now—don’t wait for the expiry date to become an emergency.
Keep these simple rules in mind:
  • If you are on Windows 11: make sure Windows Update is enabled and applied.
  • If you run a mixed or enterprise fleet: inventory, pilot, and coordinate OEM firmware updates now.
  • If you run unsupported Windows 10: enroll in ESU or plan migration; otherwise, you could lose critical boot‑level protections after the certificates expire.
The change is manageable—if you treat it like the platform maintenance it is. Start your checks today, verify the new certificates appear on representative devices, and prepare firmware updates for the small set of hardware that needs manual intervention. That measured preparation will keep Secure Boot functioning as designed and spare you the risk of degraded pre‑boot protections when the 2011 certificates lapse in mid‑ to late‑2026.
Conclusion: this is not a security panic moment, but it is a clear maintenance deadline. Take action now and you will likely never notice the change except for the reassurance that your platform’s root of trust remains intact.

Source: Bangkok Post Microsoft issues new security patch before expiry
 

Microsoft has published an operational playbook that tells Windows Server administrators exactly what to do — and when — to replace the Secure Boot certificates that are due to expire starting in June 2026, and the consequences for fleets that don’t act are significant enough that this is now a mandatory item on server patching calendars. ([techcommunity.micrchcommunity.microsoft.com/blog/windows-itpro-blog/secure-boot-playbook-for-certificates-expiring-in-2026/4469235)

Neon-blue holographic display in a server room shows Windows UEFI CA 2023 shield and status.Background​

Secure Boot is a firmware-level trust model implemented in UEFI that prevents unsigned or tampered code from running before the operating system loads. It relies on a small set of cryptographic certificate authorities (CAs) embedded in platform firmware and, in many environments, augmented by operating system servicing. The root Microsoft-issued Secure Boot certificates that have anchored Windows devices since 2011 now reach the end of their planned lifecycle in mid-2026, and Microsoft — together with OEMs and the broader Windows ecosystem — has prepared a coordinated certificate rollover to a 2023 CA family to preserve pre-OS protections.
This is not an arbitrary deadline. Cryptographic certificates have validity windows by design; as algorithms, implementation best practices, and threat models evolve, long-lived keys must be retired and replaced to maintain a strong root of trust. Devices left running the 2011 CAs beyond their expiry will continue to boot in most cases, but they will no longer be protected by Secure Boot updates and won’t be able to receive future early-boot mitigations, revocations, or signed updates — a state Microsoft describes as a degraded security posture.
Microsoft’s public guidance makes two practical distinctions that every administrator must understand right away:
  • Desktop and most client PCs will receive the replacement certificates via Windows seemetry-gated rollout already under way for many devices).
  • Windows Server systems, by contrast, do not automatically receive the new Secure Boot certificates as part of the client-controlled feature rollout; in many server deployments the update must be initiated and tracked by IT administrators.
Those two points determine operational approach: desktops are largely in Microsoft’s automatic update path; servers require deliberate inventory, firmware coordination with OEMs, and an IT-managed deployment plan.

Why this matters for servers (not just a desktop problem)​

Servers are treated differently for good reason. Many are on certified OEM firmware update cadences, run in constrained maintenance windows, live in air-gapped or high-security networks, or host critical services where unexpected firmware changes — including certificate injections — must be validated first. Microsoft’s playbook explicitly states that Windows Server devices that did not ship with the 2023 certificates in firmware or were not updated by the OEM must have the certificates applied through IT-managed processes; otherwise, the server will remain on the 2011 root set and face the June 2026 expiry risk.
In addition:
  • Newer certified server platver 2025 shipments already include the 2023 certificates in firmware. Servers that shipped since late 2024 and most platforms released in 2025 are likely already compliant, reducing the work for many estates — but not all. Administrators must still verify.
  • Virtualized environments and first-generation Hyper-V VMs are explicitly excluded from the server playbook: Azure Local Hosts, Windows PCs, and first-generation Hyper-V VMs are outside the scope. This is a firmware-and-OS servicing problem specific to servers and capable devices, not a blanket platform update.
Administrators need to treat the certificate rollover as an operational event that touches firmware (OEM BIOS/UEFI), OS-level servicing, device management tooling, and recovery media. That means coordinated testing plans, updated recovery images, and a clear communications plan for maintenance windows.

The timeline and technical milestones​

Microsoft’s public timeline and guidance include these key milestones and technical facts:
  • The original Microsoft Secure Boot CAs issued in 2011 begin to expire in late June 2026; additional expirations for related Microsoft production Principal CAs follow through October 2026. These expiries are the reason for the coordinated replacement.
  • Microsoft created a replacement CA family in 2023 (commonly referred to as the “2023 CAs” or “Windows UEFI CA 2023”) and began distributing them via Windows updates and OEM firmware images starting in 2024–2025.
  • While many client devices receive the update automatically through Microsoft’s Controlled Feature Rollout and monthly cumulative updates, Windows Server requires manual initiation unless the server platform firmware already includes the 2023 CAs.
  • Microsoft published registry-key, Intune/Autopatch, Group Policy (GPO), and WinCS API methods for IT-managed deployments, plus a sample inventory script and event IDs to monitor progress. Key signals include Event ID 1808 (successful certificate application) and 1801 (status/error reporting).
These are not theoretical: Microsoft has held Ask‑Microsoft‑Anything (AMA) sessions for technical audiences and recorded those briefings, and the company explicitly recommends that organizations begin inventory and firmware readiness well before June 2026.

The playbook — what Microsoft asks IT to do today​

Microsoft’s step-by-step guidance organizes the work into a sequence IT teams can operationalize. Below is a condensed, practical version of the playbook that you can follow in your server estate.
  • Inventory and baseline
  • Use Microsoft’s sample PowerShell inventory script to collect Secure Boot state, firmware version, UEFI CA status, and recent Secure-Boot-Update event log entries across a representative device sample. This gives you the dataset needed to prioritize platforms that need OEM firmware updates first.
  • Record which servers are running Secure Boot, which have the 2023 CAs already present in firmware, and which vendor/firmware versions are in use. Many newer certified server platforms shipped with the 2023 CAs; older ones may require a firmware update from the OEM.
  • Confirm Secure Boot and existing CA status
  • On a target server, verify Secure Boot is enabled and query the UEFI DB to confirm whether the 2023 CA has been applied. Microsoft documents a PowerShell check that returns True when the new CA is present: run the Get‑SecureBootUEFI DB read and search for the "Windows UEFI CA 2023" string. If it returns False, the device needs an update.
  • Apply OEM firmware updates where required
  • If the 2023 CAs are not present at the firmware level, contact your OEM or deploy vendor firmware updates per vendor guidance. The playbook stresses installing firmware updates before initiating the certificate deployment from Windows, because firmware that does not persist DB updates will block the OS-level update. Test firmware updates in a lab first.
  • Choose your deployment mechanism (one only per device)
  • Microsoft supports several IT-managed methods: registry-key driven deployment, Microsoft Intune, Group Policy, Windows Autopatch, and WinCS APIs. Do not mix IT-initiated methods on the same device because they manipulate the same update bits and can conflict. The registry-key approach remains the canonical, automatable option for many on-prem fleets.
  • Trigger the update and monitor progress
  • Set the AvailableUpdates registry value to the prescribed bitfield (example values are documented by Microsoft) to request the DB update and then monitor UEFICA2023Status and UEFICA2023Error registry values while watching for Event ID 1808 in the System log. Allow 48 hours and at least one restart for changes to fully apply.
  • Validate and update recovery images
  • If you maintain custom server images, update those source images with the 2023 CA prior to provisioning new systems or reimaging. Microsoft warns that custom images are the organization’s responsibility and can block provisioning workflows if they contain old DB state.
  • Troubleshoot common failures
  • If the DB update fails, look for firmware errors indicated in UEFICA2023Error, check Secure‑Boot‑Update task activity, verify that Secure Boot is enabled in firmware, and confirm that required KB/SSU prerequisites are installed. Microsoft documents error mappings and recommends OEM firmware updates when firmware returns non-zero error codes.
This sequence mirrors Microsoft’s published playbook and captures the operational touchpoints every server admin should plan for.

Quick command cheatsheet (actionable checks)​

  • Confirm Secure Boot is enabled:
  • Confirm-SecureBootUEFI or inspect HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot.
  • ChA is in the DB (PowerShell):
  • [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023' — returns True when the CA is present.
  • Read the deployment status registry:
  • Get-ItemProperty 'HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing' | Select-Object UEFICA2023Status — values: NotStarted, InProgress, Updated.
  • Monitor event logs:
  • System event log Event ID 1808 indicates successful application of certificates; Event ID 1801 and other Secure Boot DB/DBX events show status and troubleshooting details.
These commands are the practical primitives your runbooks and automation should invoke to create reliable state reporting and remediation workflows.

Operational risks, gotchas, and compatibility considerations​

This rollout carries meaningful risks if it’s not planned and executed carefully. The playbook highlights several areas where failures or oversights commonly occur:
  • Firmware that refuses DB updates: Some older or OEM‑locked firmwares will not persist new entries to the Secure Boot DB. If the firmware cannot accept the new CA, the OS update can fail or the registry will show an error that maps to firmware failure. The fix in these cases is an OEM firmware update — not an OS fix. Plan for vendor coordination.
  • Recovery media and custom images: Organizations that deploy servers from custom images must inject the 2023 CAs into the images and re-provision test systems. Failure to update images risks provisioning servers ter boot-level updates. Microsoft explicitly calls this out as an organization’s duty.
  • Air-gapped and restricted networks: Devices that can’t phone home for Windows Update or that are not enrolled in a management plane will require manual planning and offline methods. Microsoft’s registry-key and WinCS approaches support IT-initiated offline deployments, but that increases operational complexity.
  • Multiple deployment methods on the same endpoint: Using Intune plus GPO plus registry-key triggers can cause conflicting signals and update failures; Microsoft instructs administrators to pick one method per device and standardize on it.
  • Unsupported Windows versions: Some older Windows 10 builds that are past end-of-support or not enrolled in Extended Security Updates may not receive the assisting updates or may lack required registry key support. Microsoft’s guidance ties the availability of certain registry-driven deployment aids to specific supported build versions. Be explicit about supported OS baseline before you start.
  • Third‑party drivers and bootloaders: While most modern drivers and anti‑cheat integrations will benefit from the refreshed trust anchors, unusual boot paths, self-signed bootloaders, or non‑standard shim implementations can reveal compatibility problems during testing. Test all critical workloads in a staging environment that mirrors production firmware and driver states.
These are not hypothetical edge cases — Microsoft’s own troubleshooting notes and the community threads we reviewed show repeated real-world examples of firmware rejections and image-related serviceability issues. Plan accordingly.

Practical planning checklist for enterprise admins​

  • Assemble a cross-functional team: firmware/OEM contacts, patching owners, security operations, and imaging engineers.
  • Inventory: catus, firmware versions, and UEFICA2023Status across a representative set of servers using Microsoft’s sample script.
  • Prioritize hardware: identify platforms that lack 2023 CAs and coordinate OEM firmware updates in test, then in production windows.
  • Update images: apply the 2023 CA to custom server images and validate provisioning.
  • Choose deployment tooling: pick Intune, GPO, registry-key method, or WinCS and standardize to avoid conflicts.
  • Audit and monitor: implement scheduled checks for Event ID 1808 and UEFICA2023Status to verify successful rollout.
  • Communicate: notify stakeholders about potential reboots and scheduled firmware updates; emphasize recovery plan testing in case a server needs reimaging.

What we verified and where to look for definitive technical references​

To ensure factual accuracy, this article cross-checked Microsoft’s Tech Community playbook and Windows Server team blog posts with official Microsoft support documentation on registry-driven deployment and event monitoring. The Tech Community guidance explains the playbook and the lifecycle rationale; Microsoft Support documents the registry keys (UEFICA2023Status, UEFICA2023Error, AvailableUpdates) and the procedural steps for IT-managed updates; the Windows Server blog reiterates the server-specific requirement for manual initiation on many platforms. These are the authoritative references for operations teams.
We also cross-referenced independent reporting from major technology publications to confirm Microsoft’s messaging about auto-rollout for many client PCs and the public timing of the update waves; those independent reports align with Microsoft’s statements and provide useful contextual examples of how OEMs and consumers are being advised.
If you find specific claims in internal vendor notes or community threads that conflict with the Microsoft documentation, treat Microsoft’s support and Tech Community posts as the canonical operational source and reach out to your OEM contact for firmware-specific clarifications.

Recommended timeline for action (practical schedule)​

  • Now (immediate): run inventory and identify servers lacking 2023 CAs; gather firmware version details and vendor lists.
  • 30–60 days: coordinate OEM firmware updates for high-priority platforms and update your test lab images. Begin limited pilot updates on non-critical servers.
  • 60–120 days: expand pilot to larger production groups, track UEFICA2023Status and Event ID 1808, remediate failures with OEM firmware or image fixes.
  • By April–May 2026: complete broader rollout for servers that require manual intervention so that remaining systems are not operating on the 2011 CAs when June 2026 arrives. This schedule gives time for rework if firmware or image issues are discovered.
This is intentionally conservative — the goal is to avoid last-minute rushes that increase the risk of misapplied firmware updates or untested imaging workflows.

Final assessment — strengths and risks​

Strengths
  • Microsoft has published clear, technical guidance with multiple supported deployment methods (registry, Intune, GPO, WinCS), diagnostic artifacts (registry keys, event IDs), and a sample inventory script to enable fleet-scale management. That level of operational transparency is valuable for enterprise IT.
  • The coordinated industry effort — Microsoft plus major OEMs — substantially reduces the risk of a broad failure at the time of expiry because many newer platforms already include the 2023 CAs in firmware.
Risks
  • The rollout remains a cross-layer dependency problem: if firmware refuses DB updates or an OEM firmware update is delayed, affected servers can’t be brought into compliance through OS updates alone. These are operationally expensive failures that require vendor coordination and, in some cases, physical access or specialized firmware provisioning tools.
  • Air-gapped and heavily regulated environments will need bespoke offline deployment plans, increasing complexity and the potential for human error.
  • Custom imaging and provisioning processes are a weak point: organizations that don’t update source images risk provisioning non‑compliant systems at scale, which is simple to overlook during regular operations.
Given these strengths and risks, the correct posture for any Windows Server estate is rapid inventory, prioritized firmware updates, image remediation, and a staged deployment plan underpinned by clear monitoring and remediation runbooks.

Closing recommendations (practical next steps)​

  • Start by running the Microsoft sample inventory script against a representative server set and create an immediate remediation queue for platforms lacking 2023 CAs.
  • Engage OEM support early for firmware images and confirm persistence behavior for DB updates; don’t assume every firmware will accept the CA update without a vendor-supplied update.
  • Update and re-test all custom images and recovery media well before wide reimaging or provisioning events.
  • Choose and standardize a single IT-managed deployment method per group (registry, Intune, GPO, or WinCS). Automate status reporting using the UEFICA2023Status registry key and Event ID 1808 to provide measurable progress.
  • Treat this as a security and serviceability project: reserve test windows, create rollback and recovery plans, and communicate widely with stakeholders.
The expiry of the 2011 Secure Boot CAs is a scheduled cryptographic lifecycle event made visible by Microsoft’s proactive playbook. For most modern servers the work will be straightforward; for the remainder, the task requires deliberate coordination between IT, OEMs, and imaging teams. Start now — inventories and pilot tests completed this quarter will be the insurance policy that prevents emergency firmware work in June 2026.

Source: heise online Microsoft Guide for Windows Server Secure Boot Certificates
 

Microsoft’s February 24, 2026 Safe OS Dynamic Update notice for Windows 11, version 26H1 surfaces a hard deadline that administrators and power users cannot ignore: the Microsoft Secure Boot certificates issued in 2011 begin expiring in June 2026, and devices that do not receive the replacement 2023 certificates before that window will lose the ability to receive future Secure Boot and boot‑manager security updates—putting boot‑time protection and long‑term patchability at risk. ([support.microsoft.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e)

Blue holographic security icons hover above a circuit board, featuring a Windows shield.Background / Overview​

Secure Boot is the UEFI‑era mechanism that ensures only firmware and pre‑OS components signed by trusted certificate authorities (CAs) are permitted to run during the system start sequence. The trust anchors that Secure Boot relies on—stored in firmware variables known as PK (Platform Key), KEK (Key Exchange Key), DB (allowed signatures), and DBX (revocations)—are themselves certificates that expire and must be rotated. Microsoft’s original Secure Boot certificates (the “2011” family) are scheduled to begin expiring in June 2026, with additional expirations into October 2026 for other boot artifacts. Microsoft and OEM partners have produced a replacement certificate family (the “2023” CAs) and are delivering them through a combination of automatic Windows Update packages and OEM firmware updates.
This is not an academic date on a calendar. Once a device’s active firmware trust anchors are no longer backed by a valid CA that can sign future DB/DBX and boot‑manager updates, Microsoft cannot push new pre‑OS mitigations or revocations to that device. The immediate practical consequence is that affected devices will still boot in most circumstances, but they will be unable to receive new Secure Boot protections—weakening defenses against bootkits, preventing certain future boot‑level mitigations, and complicating scenarios like BitLocker hardening. Microsoft’s public guidance frames this as an urgent, staged activity for home users, enterprises, OEMs and cloud providers alike.

What the Feb 24, 2026 Safe OS Dynamic Update notice says — and what it implies​

The published notice in context​

Microsoft published a Safe OS Dynamic Update entry dated February 24, 2026 fnmunity tracking). That notice reiterates the Secure Boot certificate expiration timeline and indicates the update class (Safe OS / WinRE dynamic updates) that Microsoft is using to refresh pre‑boot components and inject newer signing material where supported. Related Safe OS updates issued around February 2026 insist that administrators treat these patches as image hygiene tasks rather than optional quality tweaks.
Important: I attempted to verify the specific KB5078169 article number noted in the original prompt against Microsoft’s public KB index. At the time of writing the server‑side index did not return an exact match for KB5078169 in web search results; however, the broader set of Microsoft Safe OS dynamic updates and the central Secure Boot certificate guidance are publicly documented and tiple KBs and guidance pages (see Microsoft’s Secure Boot certificate guidance and related KBs). Where a specific KB number could not be located, I have cross‑referenced conceptually identical Microsoft updates and the guidance they refer to. Readers should verify the KB number on Microsoft’s official support site or their WSUS/Update Catalog feed for the authoritative KB meta.

Key operational facts from Microsoft’s guidance​

  • Expiration window: the original Microsoft Secure Boot certificates used since roughly 2011 begin expiring in June 2026, with other related certificates expiring through October 2026. These certificates live in firmware KEK/DB entries and are required to sign future boot‑level updates.
  • Replacement certificates: Microsoft has created a “2023” certificate family (for KEK and DB roles) — for example, Microsoft Corporation KEK 2K CA 2023 and Windows UEFI CA 2023 — to replace the expiring 2011 CAs.
  • Delivery: Microsoft will push the new certificates via Windows Update to “a significant portion” of supported devices; OEMs are expected to ship firmware images containing the new CA family on new devices and, where necessary, publish BIOS/UEFI firmware updates for older systems. For managed fleets, Microsoft published a deployment playbook and automated assists to help IT professionals sequence the rollout safely.
  • Failure modes: Devices that do not receive the 2023 certificates will typically continue to boot, but they will no longer be able to validate or receive future Secure Boot updates and boot‑manager security fixes—effectively freezing the device’s ability to be updated for pre‑OS protections. Over time, this elevates risk and may affect upgrade scenarios.

Why this matters technically (a deeper dive)​

How Secure Boot trust works — and why a CA rotation is sensitive​

Secure Boot verifies the signature chain of pre‑OS code against the firmware’s DB and KEK entries. When Microsoft must revoke a problematic bootloader, block a compromised Option ROM, or update Windows Boot Manager signing, those changes are packaged and signed against the active CA/KEK so firmware can accept them. If the CA used to sign those updates is expired or missing from a device’s firmware, the update verification fails; the device simply can’t accept the new DB/DBX or refreshed boot loader and therefore cannot receive that mitigation. This is not remedied by an OS‑level patch alone—firmware‑level trust anchors must be correct.

The two practical risk classes​

  • Immediate operational risk: poorly staged certificate updates can cause BitLocker recovery prompts, dual‑boot breakage, or firmware interaction issues. Microsoft explicitly recommends test deployments across representative hardware families because firmwares vary in how they process KEK/DB updates.
  • Long‑term security risk: devices that remain on the 2011 CA family after expiration will be unable to receive new DB/DBX revocations and boot manager security fixes. That gap degrades defenses against evolving boot‑level threats such as bootkits and pre‑OS rootkits. Over months and years, affected machines become unpatchable at the pre‑OS level.

Who is affected — and who must act​

Home users and gamers​

  • Most consumer PCs manufactured since 2024 already include the 2023 certificates, but older machines and custom‑built systems may still be on the 2011 set. Gaming anti‑cheat systems that depend on Secure Boot (for example, certain vendor anti‑cheat stacks) could be impacted indirectly if the device cannot receive future Secure Boot protections. For most home users the action item is simple: install Windows updates, check Secure Boot state, and install any firmware updates from your device vendor.

Enterprises and managed fleets​

  • Fleet owners must treat the certificate rotation as a scheduled, mandatory maintenance item—not a routine optional update. Microsoft published a deployment playbook for IT professionals with verification steps, firmware testing guidance and recommended testing sample sizes. In closed WSUS environments the relevant KBs may need to be manually approved and staged; in Intune, custom compliance scripts can be used to report certificate status. Plan for phased rollouts, preflight tests, and runbooked remediation for devices that fail to accept the updates.

Servers, VMs and cloud instances​

  • Hyper‑V and some virtualized environments have historically shown certificate update failures (Event ID 1795) due to welded firmware semantics in virtual firmware implementations. Microsoft has acknowledged VM/Hyper‑V caveats and scheduled targeted updates for Hyper‑V and Azure hosts to mitigate those cases. Cloud operators and on‑prem virtualization owners should prioritize guidance from Microsoft’s VM/Hyper‑V sections and ensure host firmware/VM SKU compatibility.

OEMs and system builders​

  • OEMs must include the 2023 CAs in firmware for new devices and provide UEFI firmware updates for existing models that lack the new certificates. OEM firmware compatibility is arguably the most brittle variable in the entire rotation—hence Microsoft’s repeated emphasis on testing across representative device families.

How to verify if your device already has the 2023 Secure Boot certificates​

Microsoft and community guidance provide practical verification commands and UI checks. Below are reliable checks you can run immediately.

Quick GUI check​

  • Open Start > Settings > Privacy & Security > Windows Security > Device Security and confirm that Secure Boot is shown as On.

PowerShell verification (recommended)​

Run PowerShell as Administrator and use these checks:
  • Ensure Secure Boot is active:
  • Confirm-SecureBootUEFI
  • Returns True if Secure Boot is enabled on the device.
  • Check the DB (Allowed Signature Database) for the presence of the new 2023 CA:
  • [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • If the command returns True, the DB contains the Windows UEFI CA 2023 entry.
  • You can inspect KEK similarly:
  • [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI kek).bytes) -match 'Microsoft Corporation KEK 2K CA 2023'
These PowerShell methods are documented and referenced in Microsoft’s deployment guidance and community writeups as the recommended verification path. If the checks return False, the device has not yet received the updated CA via Windows Update or firmware.

Recommended step‑by‑step actions​

For home users (simple checklist)​

  • Run Windows Update and install all pending updates.
  • Reboot and confirm Secure Boot is enabled (Settings > Device Security).
  • Run the PowerShell checks above to verify presenA 2023*.
  • If checks show missing certificates, visit your OEM support page and install any available UEFI/BIOS firmware updates before June 2026.
  • If your PC is custom‑built or the OEM offers no appropriate firmware update, consider contacting the vendor or scheduling a hardware refresh before critical security deadlines.

For administrators and IT teams (controlled rollout plan)​

  • Inventory and categorize devices by:
  • Manufacturer, model, firmware version, and OS build.
  • Secure Boot status and whether the device is UEFI/legacy.
  • Establish representative test pools (Microsoft recommends a minimum of four representative devices per unique hardware‑firmware profile).
  • Approve and stage the required KBs and dynamic updates in WSUS or your update management tool; consult Microsoft’s Safeguards and Assisted Deployment guidance for blocked or staged updates.
  • Sequence updates:
  • Apply any required servicing stack updates and cumulative updates.
  • Deploy the Safe OS dynamic update (WinRE/WinBoot refresh) that injects the new signing material where applicable.
  • Trigger the scheduled task that processes Secure Boot updates on the client (the Windows scheduler runs a periodic task every 12 hours for this purpose).
  • Monitor system event logs for Event ID 1799 / 1795 entries that indicate DB/KEK update status and failures; implement runbooks to handle failures (firmware rollback, OEM remediation).
  • For VMs: consult Hyper‑V/host compatibility guidance; some VM images or host SKUs require host‑side updates before guest updates will succeed.

For imaging and offline deployment​

  • If you maintain offline images or preprovisioned golden images, update those images by injecting the new WinRE/Safe OS dynamic update, or use the Microsoft Update Catalog to obtain the relevant package and incorporate it into image servicing via DISM. Microsoft’s Safe OS dynamic updates are designed to be included in offline servicing pipelines as needed. Treat WinRE image version verification (the KBs specify expected WinRE version numbers after a successful update) as an acceptance criterion for your golden image builds.

Known pitfalls, troubleshooting, and risks​

Firmware that rejects or mishandles KEK/DB updates​

  • Some firmware implementations will return errors (Event ID 1795) when KBs try to update KEK/DB variables in virtualized environments or on older motherboard firmware. These errors often require OEM firmware updates or specific host/VM SKU fixes. Microsoft has scheduled targeted fixes for Hyper‑V and Azure hosts to address known VM-related failures.

BitLocker recovery prompts and dual‑boot breakage​

  • Changing DB/DBX/KEK can prompt BitLocker to require recovery keys on next boot because pre‑OS code appears materially different to the platform. Best practice: suspend BitLocker before performing firmware or KEK/DB updates on managed systems, and document a recovery process. Test dual‑boot scenarios where third‑party bootloaders are involved—some setups may require adding specific CA entries that selectively trust option ROMs without trusting third‑party boot loaders.

Devices that never receive OEM firmware fixes​

  • Some older systems will not receive a firmware update from OEMs. For those devices, if Windows Update is also unable to inject the 2023 CA (because of firmware write protections or design), consider hardware replacement or controlled isolation until a remediation path is available.

WSUS/enterprise procurement traps​

  • In WSUS‑managed networks, the Secure Boot certificate updates often show up as KBs that must be explicitly approved. Failing to approve relevant KBs (or applying them out of sequence with servicing stack updates/SSUs) will leave devices unprepared. Microsoft’s deployment playbook emphasizes the need to stage SSUs and install in the proper order.

Verification and audit: recommended telemetry and monitoring​

  • Use management tooling (Intune, SCCM, WSUS) to report Confirm‑SecureBootUEFI results and the presence of the “Windows UEFI CA 2023” string extracted from DB/KEK.
  • Monitor Event Log IDs 1795 and 1799 (DB/KEK update errors and success events).
  • Build an automated compliance script (PowerShell) that runs the DB/KEK checks and reports devices that are not yet updated for remediation.
  • Maintain a firmware inventory and patch backlog prioritized by risk (e.g., internet‑facing laptops and servers first).
Microsoft’s official guidance includes a deployment playbook and automated assists; administrators should use these resources to validate their telemetry approach and remediation steps.

Cross‑checks, external reporting and why independent verification mattered for this article​

Multiple Microsoft KBs and support pages published throughout 2025 and 2026 reiterate the Secure Boot certificate expiration timeline and the need to apply 2023 certificates prior to June–October 2026. I cross‑checked the expiry dates and deployment guidance against Microsoft’s central Secure Boot certificate article and the detailed IT deployment playbook (both Microsoft assets), and verified practical verification commands and user guidance against community writeups and technical how‑tos. Independent coverage from reputable outlets confirms the same timeline and operational guidance: the Windows Secure Boot certificate rotation is real, imminent, and being delivered through both Windows Update and firmware channels.
A note on the specific KB number provided with the prompt (KB5078169): while the documentation and dynamic updates in Microsoft’s public KB cluster clearly document Safe OS dynamic updates and Secure Boot CA rotation, I could not find an exact, searchable web index entry for KB5078169 at the time of drafting this article. Closely related KBs (for example, the Feb 10 and Feb 24 Safe OS dynamic updates that refresh WinRE and boot manager signing for various builds) are documented and have the same operational guidance about certificate expiration; those KBs explicitly instruct administrators to treat the updates as mandatory image hygiene and include expected WinRE image version numbers for verification. If you have a direct KB link or the Microsoft Update Catalog entry, validate the KB number in your WSUS or Update Catalog instance; if it’s missing, use the KBs and central guidance described here as your authoritative rollout plan.

Practical timeline and final checklist (what to do in the next 30/60/90 days)​

  • Next 30 days (immediate)
  • Run the PowerShell verification scripts on a representative sample of devices and collect results.
  • Ensure automatic Windows Update is enabled on non‑managed machines and that management services (WSUS, Intune) are prepared to approve KBs.
  • Identify devices missing OEM firmware updates and flag for vendor support or mitigation.
  • Next 60 days (test and stage)
  • Build test rings across each OEM/firmware family and validate the dynamic update sequence (SSU → cumulative → Safe OS dynamic update).
  • Test BitLocker suspensions/resume, dual‑boot scenarios, and VM/Hyper‑V guests for Event ID 1795 failures during updates.
  • Next 90 days (wide deployment)
  • Approve and deploy the updates fleet‑wide in staged waves.
  • Monitor event logs and compliance telemetry; remediate any devices that fail with OEM firmware updates or require hardware replacement.

Conclusion​

The Secure Boot certificate rotation that begins in June 2026 is one of those operational events that looks small on paper—“a certificate update”—but carries systemic consequences for platform security and updateability if mishandled. Microsoft’s Safe OS dynamic updates, which include WinRE and boot‑manager refreshes, are the mechanism to deliver the necessary 2023 certificates to most Windows devices; OEM firmware updates remain critical for older or firmware‑locked systems. Administrators should treat these updates as mandatory image hygiene, test them across representative hardware, sequence them correctly in WSUS/Intune, and have runbooks ready for BitLocker, VM, and firmware failures. If your environment still uses legacy processes for update approvals or offline imaging without these dynamic updates, begin planning immediate remediation—the calendar is not forgiving.
For home users: keep Windows Update current and check Secure Boot via settings and the PowerShell checks above. For IT teams: inventory, test, stage, and monitor. And if you rely on a published KB number for your rollout scripts, double‑check that KB in the Microsoft Update Catalog or your enterprise update feed; the Secure Boot certificate guidance and associated Safe OS dynamic updates are authoritative even if an individual KB number sometimes appears out of sync in public search indexes.

Source: Microsoft Support KB5078169: Safe OS Dynamic Update for Windows 11, version 26H1: February 24, 2026 - Microsoft Support
 

Microsoft released a targeted Setup Dynamic Update for Windows 11 (KB5079271) on February 24, 2026, and — alongside that quietly published package — reiterated an urgent, calendar-driven warning: the Microsoft Secure Boot certificates issued in 2011 begin expiring in June 2026, and organizations and device owners must prepare now to avoid degraded boot‑time security and potential disruption. (support.microsoft.com)

Windows 11 interface with a glowing Secure Boot shield and upgrade icons on circuitry.Background / Overview​

Microsoft’s Dynamic Updates are narrow, surgical packages that refresh the small set of binaries that run during Windows Setup, feature upgrades, and recovery scenarios. They are deliberately short, delivered automatically through Windows Update and the Microsoft Update Catalog, and intended to be applied to images and running systems to harden setup and pre‑OS behaviors without requiring a full cumulative update. KB5079271 is the February 24, 2026 Setup Dynamic Update for Windows 11, versions 24H2 and 25H2, and it replaces a previously published DU (KB5074110). The package updates Setup runtime binaries and related components used during feature upgrades and certain recovery flows. (support.microsoft.com)
Why this DU matters now: Microsoft is pushing updated Secure Boot signing material to devices as part of a cross‑industry coordination to replace long‑running 2011 certificates with 2023 certificate authorities (CAs). Those 2011 certificates begin to expire in June 2026 (with other related expiries through October 2026). Without the 2023 CAs present in a device’s firmware DB and KEK, future boot‑level updates — including security mitigations that touch the boot manager or WinRE — will be impossible to apply, leaving devices in a progressively degraded security state. Microsoft’s documentation and recent cumulative updates make this explicit.

What KB5079271 actually changes​

Primary purpose​

  • KB5079271 updates the Windows Setup runtime and small pre‑OS utilities that are invoked during feature upgrades, media‑based installs, and recovery operations. This is a classic setup dynamic update: small, precisely targeted, and intended to reduce upgrade failures and harden pre‑boot code paths. (support.microsoft.com)

Notable details verified in the package​

  • The Microsoft KB page explicitly states the update is available through Windows Update, Microsoft Update Catalog, and will sync via WSUS when configured correctly; administrators can also use the standalone catalog package for image servicing. (support.microsoft.com)
  • The article shows the update replaces KB5074110 and includes file version listings (example: SetupPlatform.* and various appraiser/AcRes dlls with versions and dates). This confirms that the DU refreshes the specific setup-file set used during upgrades. (support.microsoft.com)
  • Microsoft also attached a direct caution about Secure Boot certificate expiry to the KB text — signalling the operational tie between these Setup/SafeOS DUs and the platform roll‑forward of boot‑time signing material. (support.microsoft.com)
Community and operations teams have noted similar DU releases across late 2025 and early 2026 and emphasized that these packages are part of a phased, operational rollout that touches pre‑boot components and the Windows Recovery Environment (WinRE). That context is important for imaging teams and those who create offline WinRE or custom install media.

Why Secure Boot certificates matter (and what’s changing)​

The technical point, plainly​

  • UEFI Secure Boot enforces a firmware‑anchored chain of trust during the boot process. That trust is based on certificates stored in firmware variables: Platform Key (PK), Key Exchange Key (KEK), and the Allowed Signature Database (DB) and Revoked DB (DBX). Microsoft historically supplied several CA certificates used to sign bootloaders and boot‑time updates; those CA certificates had 15‑year lifetimes and were issued in 2011. When those CA certificates expire, devices that still carry only the 2011 CAs will no longer be able to trust newly issued signatures signed with the 2023 keys — and crucially, Microsoft and third parties cannot deliver new signed boot components to those devices.

Timeline and the key dates​

  • Microsoft’s guidance states the 2011 certificates begin expiring in June 2026 (some certificates in that family have expiries that continue into October 2026). The vendor response is to roll in Microsoft KEK CA 2023, Windows UEFI CA 2023, and Microsoft Option ROM CA 2023 where appropriate to split bootloader signing from option ROM signing. Devices that receive the 2023 CAs will continue to accept new signed boot components; those that do not will be unable to receive new Secure Boot updates after expiry.

Operational impact — who is affected and how badly​

Short answer​

  • Most modern Windows 11 devices that have stayed updated will receive the new CAs automatically and see no immediate outage. However, some classes of devices — older PCs, servers with locked firmware or requiring vendor BIOS updates, closed WSUS environments, custom images used in cloud or VDI, and certain IoT or legacy systems — may require manual action (firmware updates, image servicing, or targeted certificate injection) to receive the new 2023 certificates.

What fails, exactly?​

  • Devices that do not receive the new 2023 CAs will still boot immediately after the 2011 certs expire, but they will no longer be able to receive new Secure Boot security updates for boot components, including fixes to Windows Boot Manager and future mitigations that require new signed binaries. Over time, this exposes devices to unpatchable boot‑level vulnerabilities and can also break scenarios that depend on pre‑boot trust, such as BitLocker attestation hardening, certain anti‑cheat trust chains for PC games, and signed third‑party bootloaders or option ROMs.

Real‑world examples and vendor notes​

  • Hardware vendors are preparing BIOS/UEFI updates for systems that require a firmware-side injection of the new CAs. Some vendors will distribute BIOS updates through their standard update channels; others may require manual steps. Microsoft’s guidance and community threads underscore that in controlled or isolated enterprise environments, IT must plan for manual deployment and verification.

Microsoft’s rollout approach — phased, targeted, and telemetry‑aware​

Microsoft is not blindly pushing the new CAs to every device at once. Instead, the rollout leverages Windows Update targeting signals and staged device qualification checks to ensure that updates are applied safely on devices that show sufficient “successful update signals.” In practice, this means:
  • Devices are targeted for the Secure Boot updates (a setting is placed on the device).
  • A scheduled task on the device runs and steps through the update/installation checks before injecting new keys into firmware.
  • Windows Update only applies new boot manager binaries when the device already includes the Windows UEFI CA 2023 certificate in DB, to avoid leaving systems with mismatched signing states.
This cautious rollout reduces the risk of widespread boot failures but increases the operational need for verification and monitoring in large fleets and specialized deployments.

Practical, prioritized checklist for IT teams (what to do — now)​

Below is a prioritized playbook you can act on immediately. Apply these steps in sequence and document results.
  • Inventory and triage your estate
  • Identify systems with Secure Boot enabled and record firmware versions, OEM, and model. Use Intune, SCCM, or your inventory tool to export a list.
  • Check custom images, Azure/Windows 365 images, VHDs, and recovery media for embedded WinRE images that may need refresh. Microsoft has separate guidance for cloud‑hosted images and Windows 365/Cloud PC images.
  • Verify Secure Boot status and certificate presence on sample devices
  • Quick GUI check: Start > Settings > Privacy & Security > Windows Security > Device security → Secure boot (should say On).
  • Command line for quick verification: run Confirm‑SecureBootUEFI (returns True if Secure Boot is enabled).
  • To check which Secure Boot CA is present in DB, use PowerShell on a test device:
  • Run (elevated): [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • If the command returns True the 2023 CA is present; False indicates the device still has the 2011 CA. Multiple reputable guides and the community recommend this check.
  • Enable and monitor Microsoft’s automatic targeting where possible
  • For managed fleets with Windows Update allowed, ensure devices are receiving cumulative and quality updates; Microsoft will deliver updated CAs automatically to many devices over Windows Update once a device qualifies for the rollout. Document your targeting and monitor Windows Update events and the Secure Boot scheduled task behavior described in Microsoft guidance.
  • For closed networks and WSUS environments: plan a manual rollout
  • Approve the relevant KBs in WSUS (or distribute the catalog packages) to ensure systems are eligible to receive the certificates.
  • Microsoft’s guidance includes scripted and manual import options for environments that cannot use Microsoft’s automatic flow. Test the manual process on a small subset before wide deployment.
  • Coordinate firmware (OEM) updates
  • Identify OEM models that require UEFI/BIOS updates to allow certificate injection. For those devices, schedule firmware updates and test renewals on non‑production hardware.
  • Keep rollback/recovery plans ready: create Secure Boot recovery media and make sure technicians can restore a machine to a known‑good Secure Boot DB state if a firmware update fails.
  • Refresh images & WinRE
  • Rebuild and re‑capture Golden images and update WinRE images so they include the new UEFI CA where required. Dynamic Updates like KB5079271 that refresh Setup or WinRE components should be applied to the image and validated. (support.microsoft.com)
  • Test block‑level scenarios
  • Validate BitLocker workflows, virtualization hosts, dual‑boot scenarios, and anti‑cheat software in test labs. Anti‑cheat vendors rely on Secure Boot trust and may require the new CA chain to be present for anti‑tampering features.
  • Monitor and log
  • Watch Event Logs and the specific Windows Update/servicing events Microsoft mentions for Secure Boot certificate updates. Microsoft’s guidance describes targeting events and scheduled tasks that run every 12 hours to check and apply the updates; capture those logs centrally for auditing.

For smaller shops and power users: what to check on your PC​

  • Ensure Windows Update is enabled and fully patched. Microsoft will automatically deliver the 2023 CAs to many up‑to‑date Windows 11 systems.
  • Run Confirm‑SecureBootUEFI to make sure Secure Boot is On. If it’s off, decide whether you need to enable it — enabling can require firmware configuration and can break certain dual‑boot setups.
  • Run the PowerShell test to detect the presence of the 2023 CA:
  • Open PowerShell as administrator and run:
  • [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • True means the new CA is present; False means you likely still have the 2011 CA and should follow the steps above. Use OEM firmware updates if needed.

Server, cloud, and image‑based special cases​

  • Windows Server and Linux boot chains hosted in cloud or in custom images need careful handling. Microsoft published dedicated playbooks and Windows Server resources to prepare servers for the Secure Boot certificate updates; cloud images used by Windows 365/Cloud PC must be updated before provisioning to avoid stuck or unprotected Cloud PCs. IT teams should consult the specific Microsoft server playbooks and Windows 365 guidance and treat image refresh as a high priority.

Risk analysis — strengths and weak points of the plan​

Strengths​

  • Microsoft’s phased, telemetry‑aware rollout reduces the risk of a mass reboot/brick scenario by only injecting keys on devices that have demonstrated update readiness.
  • Automatic delivery through Windows Update simplifies remediation for the majority of consumer and enterprise devices that keep updates enabled.
  • The split of signing roles (boot loader vs option ROM) in the new certificate family gives finer control and reduces the blast radius for third‑party option ROM trust decisions.

Weaknesses and operational risks​

  • Firmware dependencies: Some OEM firmware implementations do not support automated key injection, or they implement Secure Boot key management idiosyncratically. These devices will require firmware updates and vendor coordination, which can be slow for large fleets or EOL hardware.
  • Closed environments and WSUS: Organizations that rely solely on WSUS or disconnected networks must manually manage rollout and verification. Failure to do so risks leaving devices unpatchable for boot vulnerabilities after the 2011 CAs expire.
  • Recovery complexity: In rare cases, admins who reset DB/DBX or toggle Secure Boot during the transition may encounter Secure Boot violations that require recovery media and extra steps to resolve. Microsoft’s KBs explicitly warn about this. (support.microsoft.com)

Troubleshooting and recovery: what to prepare​

  • Create Secure Boot recovery media for at‑risk devices before performing mass firmware or DB changes.
  • Keep a small, validated lab for validating firmware updates, WinRE images, and dynamic updates (including KB5079271) before applying them broadly.
  • If you see a Secure Boot violation after addressing certificates, the recommended steps typically include restoring the DB to a known good state or recreating Secure Boot recovery media; some cases will require OEM firmware rollback or support engagement. Microsoft’s KBs and Tech Community threads document these known‑issue patterns and remediation playbooks. (support.microsoft.com)

Practical example: a minimal verification script (test-only)​

  • On a test device (elevated PowerShell):
  • Confirm Secure Boot is enabled:
  • Confirm‑SecureBootUEFI
  • Check for the Windows UEFI CA 2023 certificate:
  • [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • If False, check Windows Update history and servicing logs; run the Secure Boot scheduled task if documented (Microsoft’s guidance describes a scheduled task that detects targeted devices).
  • If the device is in WSUS/closed net, prepare to import the Microsoft‑published packages per vendor guidance.
(These steps are widely circulated in community playbooks and Microsoft documentation; test in an isolated lab before automation.)

Final assessment and recommended timeline​

  • Immediate (this week): Inventory devices, validate Secure Boot on a sample set, and identify firmware update candidates.
  • Short term (2–4 weeks): Test KB5079271 and relevant Safe OS dynamic updates (WinRE DU) in lab images; test certificate presence and boot flows post‑update. If you use WSUS or custom images, stage and approve the update packages to ensure device eligibility.
  • Before June 2026: Ensure the bulk of your fleet — and any production servers, Cloud PC images, or custom WinRE images — have the new 2023 CA in their Secure Boot DB or are scheduled for OEM firmware updates that will accomplish the same. This aligns with Microsoft’s expiry window and their public call to action. (support.microsoft.com)

Conclusion​

KB5079271 is not a headline feature release — it is an operationally significant setup dynamic update published on February 24, 2026 — but it arrives at a strategic moment because Microsoft is coordinating a generational replacement of Secure Boot certificates before the 2011 CA expiries begin in June 2026. For most organizations and consumers that keep Windows updated, Microsoft’s phased rollout will manage the transition automatically; for large enterprises, managed fleets, and environments with firmware or image constraints, the work required is nontrivial and must be scheduled and tested now.
Act decisively: inventory, verify via PowerShell or management tools, test DU and firmware updates, refresh images and WinRE, and prepare recovery media. Doing this work early turns a difficult calendar event into a manageable maintenance project rather than a crisis on the first business day after the expiry window opens. (support.microsoft.com)

Source: Microsoft Support KB5079271: Setup Dynamic Update for Windows 11, version 24H2 and 25H2: February 24, 2026 - Microsoft Support
 

If your PC is more than a couple of years old and you rely on UEFI Secure Boot, there’s an urgent maintenance item you cannot ignore: the Microsoft Secure Boot certificates issued around 2011 begin expiring in mid‑2026. Microsoft and major OEMs have prepared a replacement family (“2023 CA”), and Windows can apply those new certificates automatically for many devices—but not every PC will receive them before the deadline. This feature‑level certificate rotation affects the very first code your PC runs, and it has real security, compatibility, and recovery implications. This article explains what’s changing, why it matters, and how you can safely verify and, if needed, apply the Windows UEFI CA 2023 certificates yourself today.

Futuristic BIOS/UEFI scene with glowing secure-boot certificates (Windows and Microsoft CA 2023).Background / Overview​

UEFI Secure Boot uses small, firmware‑kept lists of public certificates to decide whether early boot components (bootloaders, shims, option ROMs) are allowed to run. Those lists are called the DB (Allowed Signature Database) and DBX (Disallowed/Revoked Signature Database), and firmware also maintains KEK/PK keys that control who can change those lists. When Microsoft and OEMs sign a boot component, firmware checks signatures against those certificates before letting code run.
The certificates Microsoft issued in 2011—the Microsoft Corporation KEK CA 2011 family and several “UEFI CA 2011” certificates—are long‑lived, but they are scheduled to begin expiring in June 2026 (with related expiries stretching into October 2026). If a device still depends on those expiring 2011 certificates and does not transition to Microsoft’s 2023 certificates before expiry, Microsoft cannot deliver new boot‑level fixes to that device; over time that results in a “degraded security state” because revocations and boot manager updates can no longer be trusted or installed. Microsoft has published guidance and an IT playbook describing the timeline and the mitigation options. ([support.microsoft.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e)
Why Microsoft is doing this now is straightforward: cryptographic anchors age, signing practices change, and a certificate renewal is required to keep delivering fixes and new trusted boot artifacts for the decades ahead. The replacement family is referred to in Microsoft docs as the 2023 CA certificates (for example, “Windows UEFI CA 2023”, “Microsoft UEFI CA 2023”, and “Microsoft Corporation KEK 2K CA 2023”).

Why this matters now​

  • Security: Without an updated CA enrolled in firmware, Microsoft cannot sign and deliver future boot‑level mitigations or add new revocations to DBX. That reduces the ability to respond to bootkit/UEFI attacks discovered after certificate expiry. ESET and other researchers have shown real-world bootkit threats (BlackLotus and related exploits) that target boot‑time logic; keeping the platform’s trust anchors current is a primary defense.
  • Compatibility: New OEM drivers, third‑party UEFI components, and updated boot managers signed using the 2023 CA will not be trusted by firmware that has only the old CA. Over time that can break new recovery media, OS installers, or anti‑cheat and platform security features that require an up‑to‑date Secure Boot chain. Vendor advisories from HP, Dell, Lenovo, and Red Hat all warn about compatibility and recommend firmware updates and validation before broad rollouts.
  • Recovery and BitLocker: Changes to Secure Boot and firmware keys (especially when the firmware’s “default” keys differ from OS‑applied values) can trigger BitLocker recovery. If you do not have BitLocker recovery keys saved, you may be locked out until the key is recovered. Microsoft and OEM guidance therefore emphasizes backing up recovery keys and creating updated recovery media before changing Secure Boot keys.
  • Production/Enterprise risk: Managed fleets using WSUS/air‑gapped update models or blocking telemetry might not receive Microsoft’s automatic family rollout. Microsoft published an operational playbook and registry‑trigger options for IT to control, test, and roll out these changes centrally.

How to check whether your PC already has the 2023 certificates​

Before you do anything, confirm whether your PC already trusts the 2023 certificate family. Microsoft and multiple OEMs provide the same PowerShell test; run PowerShell as Administrator and execute:
  • Open Start, type powershell, right‑click and choose Run as administrator.
  • Run this command exactly as shown:
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
If the command returns True, the Windows UEFI CA 2023 certificate is present in the DB and you do not need to force a change. If it returns False, your device has not yet enrolled the new 2023 DB entry and you may want to proceed with preparation and—if appropriate—the update steps below. This verification step is the authoritative check Microsoft recommends.
Notes and caveats:
  • The cmdlet Get‑SecureBootUEFI is part of Windows’ SecureBoot PowerShell support; it must be run elevated on a UEFI device with Secure Boot enabled. If your system is BIOS/legacy or Secure Boot is disabled, the cmdlet may error out.
  • Some OEMs already included the 2023 CAs in the firmware defaults for systems shipped in 2024 and later; newer hardware often requires no action. Always check before changing system settings.

Two update approaches: let Microsoft handle it, or opt to update now​

Microsoft is deploying the 2023 certificates in a staged, telemetry‑gated rollout for most devices via Windows Update. For many users that will be the safest route: apply normal Windows Updates, ensure your firmware is up to date, and wait for Microsoft’s automatic enrollment. OEMs are coordinating firmware updates so that factory defaults match the new CA where appropriate.
However, there are good reasons to opt in now:
  • Your device is offline or managed and won’t receive the staged rollout in time.
  • You need the security protections now because you care about boot‑level mitigations (e.g., to reduce exposure to BlackLotus‑style threats).
  • You want to control when to create recovery drives and verify BitLocker keys before the change.
If you opt to update now, follow the verified steps below exactly, and prepare by backing up keys and firmware.

Step‑by‑step: how to deploy Microsoft’s Windows UEFI CA 2023 certificates now​

This section describes the two commonly used ways to apply the 2023 certificates: a focused DB update (less intrusive) and the full, recommended sequence that enrolls all required certificates and the new boot manager. Pick the one that matches your risk tolerance and testing plan.
Important pre‑checks (do these before changing anything)
  • Confirm Secure Boot is enabled in firmware (System Information → Secure Boot State = On).
  • Back up your files; create a full system image if possible.
  • Save your BitLocker recovery key(s) to a safe location (Microsoft account, AD, MDM, or printed).
  • Update UEFI/BIOS firmware from the OEM to the vendor‑recommended minimum for the 2023 CA transition.
  • Disable Fast Startup in Windows (shutdown hibernation can prevent the update from taking effect).
  • Ensure you have the relevant Windows updates installed (February 2024 cumulative update and later; see Microsoft KBs).
Option A — Deploy just the DB certificate (less riskful)
  • Open an elevated Command Prompt and run:
    reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x40 /f
  • Trigger the scheduled task that processes Secure Boot updates:
    Start‑ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure‑Boot‑Update" (run in an elevated PowerShell window)
  • Reboot the PC once (some systems may need two reboots).
  • Verify the DB update:
    [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) ‑match 'Windows UEFI CA 2023'
    A True result means the DB now contains the Windows UEFI CA 2023 certificate. Microsoft documents 0x40 as the DB update flag. Use this path if you only want to add the DB entry first and hold off on the boot manager update for validation.
Option B — Full deployment (adds DB, KEK, and installs the new boot manager signed by PCA 2023)
This is the complete sequence Microsoft documents for IT and home power users who want the full mitigation applied now.
  • Open an elevated PowerShell prompt.
  • Set the AvailableUpdates registry value to the full bitmask:
    reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f
  • The 0x5944 value is documented by Microsoft as the “full” bitmask that triggers all relevant certificate/boot manager steps. For fleets, Microsoft recommends using 0x5944 when you want every device to include all replacements.
  • Start the scheduled task to process the registry flag immediately:
    Start‑ScheduledTask ‑TaskName "\Microsoft\Windows\PI\Secure‑Boot‑Update"
  • This task runs automatically about every 12 hours; the Start‑ScheduledTask invocation just forces it now. You may notice a short pause in responsiveness while the task runs.
  • Reboot the PC twice (Microsoft and OEM guidance emphasize performing a second restart to complete variable writes and allow firmware to persist changes).
  • Verify success:
    [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) ‑match 'Windows UEFI CA 2023'
    Also check KEK/PK entries if desired:
    [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI KEK).bytes) ‑match 'Microsoft Corporation KEK 2K CA 2023'
  • Observe the AvailableUpdates progression and status keys:
  • Microsoft explains that AvailableUpdates will change as bits are processed (common progression: 0x5944 → 0x4100 → 0x4000 when complete).
  • You can monitor the servicing keys under:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
    Keys: UEFICA2023Status (NotStarted / InProgress / Updated) and UEFICA2023Error for error codes.
If the commands return True and the status keys show Updated, your device has the new 2023 certificates and the new Windows boot manager (if you applied the full 0x5944 workflow).

Troubleshooting: if the update fails or returns False​

If your verification command still returns False after following the steps and reboots, check these common causes and fixes:
  • Missing servicing update or KB: Ensure the device has the required Windows updates (some KBs published earlier added the logic to apply the DB; the exact KB depends on edition and build). Devices managed via WSUS or other controlled channels may not yet have the needed package; Microsoft’s KBs list the required updates. If you used WSUS, ensure the relevant updates were approved.
  • Firmware does not allow DB/KEK writes: Some older or locked firmware refuses or reverts OS‑side attempts to write DB/KEK variables. Check for an OEM BIOS/UEFI update that adds support for 2023 CA entries. Vendors (Dell, HP, Lenovo) provide model‑specific guidance and BIOS minimum versions. If firmware blocks writes, you will need an OEM BIOS update or vendor support.
  • BitLocker recovery: If BitLocker enters recovery after firmware change, supply the stored recovery key. If you do not have it, follow OEM recovery and Microsoft guidance; do not attempt to toggle Secure Boot keys without the recovery key in hand.
  • Event logs and status: Inspect Event Viewer under Applications and Services Logs → Microsoft → Windows → Secure‑Boot‑Update for detailed error codes. Also inspect the UEFICA2023Error registry key for non‑zero error codes. These logs and registry entries are Microsoft’s recommended starting points for diagnosing failures.
  • WSUS/managed update lag: If your environment uses WSUS or blocks telemetry, automatic rollout buckets may not target your devices. Microsoft’s guidance recommends setting the registry keys manually in such managed cases after testing.
  • Virtualized environments: If you run VMs, ensure the virtual firmware (OVMF/vBIOS) or hypervisor exposes the new certificate set; long‑running guests may require host‑level updates or regeneration of images.
If a device becomes unbootable after change, consult your OEM’s recovery instructions (BIOS recovery, CMOS reset, or vendor firmware reflash) and Microsoft’s recovery guidance. In enterprise contexts, escalate to OEM support and follow the vendor’s documented recovery playbook.

Special considerations: BitLocker, Linux, gaming, and servers​

  • BitLocker: Always capture recovery keys before changing Secure Boot keys or installing BIOS updates. Many organizations store keys in Active Directory or Azure AD; home users should link keys to Microsoft accounts or export them to a safe location. Failure to do so can require a full reimage to regain access.
  • Linux/Dual‑boot: Many mainstream Linux distros rely on a signed shim that chains to Microsoft’s signing infrastructure. If firmware lacks the 2023 CA entries (and a new shim is signed with a 2023 CA), Linux boot chains may be affected until firmware or shim updates are applied. Red Hat and other Linux vendors are publishing guidance and updated shims where necessary; test dual‑boot setups before rolling out widely.
  • Anti‑cheat and gaming: Anti‑cheat drivers and enforcement relying on secure boot/tpm state can break if a device lacks the latest trusted boot anchors while the anti‑cheat is updated and bound to a newer signing chain. Gamers who use older motherboards or block updates should be cautious—OEM firmware updates and the Microsoft rollout aim to avoid mass breakage, but edge cases exist.
  • Servers and cloud: Microsoft published an explicit playbook for server admins. For cloud and hypervisor environments, ensure the platform includes the new CA in virtual firmware images; otherwise, hosts and VMs may experience mismatch issues. For managed datacenter fleets, Microsoft recommends a staged pilot and close telemetry monitoring.

Enterprise rollouts: options and best practices​

For IT administrators planning a fleet deployment, Microsoft documents multiple controls:
  • Use AvailableUpdates = 0x5944 to trigger the full rollout, or 0x40 to apply only the DB update first for validation.
  • Use Group Policy, Intune/MDM, or the Windows Configuration System (WinCS) to centrally set the registry flags; do not mix control planes per device.
  • Pilot on representative hardware per model/firmware version; watch UEFICA2023Status and UEFICA2023Error, and monitor event logs.
  • Coordinate with OEMs for firmware updates and minimum BIOS versions to ensure firmware supports persisted DB/KEK changes.
  • Provide communications and staged instructions for users to back up BitLocker keys and recovery media before rollouts.

Risks, tradeoffs, and what Microsoft’s rollout means in practice​

Strengths of Microsoft’s approach:
  • A coordinated, staged rollout reduces the chance of widespread regressions and lets Microsoft and OEMs gate enrollment to “high confidence” device buckets first.
  • Microsoft supplies explicit verification steps, registries, and event logs for teams to control and audit the transition.
Remaining risks and caveats:
  • Firmware variability is the single largest unknown. Not all vendor firmware behaves identically when OS‑side code writes UEFI DB/KEK variables; older platforms may refuse or revert entries. OEM firmware updates or vendor assistance will be required in some cases.
  • BitLocker and recovery media: If you do not preserve recovery keys and you run into an unexpected firmware or DB/KEK state, recovery can be time‑consuming and in some cases require reimaging.
  • Unverifiable claims: Some online guides state the 2023 certificates will remain valid until a specific distant year (for example, “2038”); Microsoft’s public documentation does not confirm that exact claim. Treat any lifespan number beyond Microsoft’s published expirations as unverified unless Microsoft provides a certificate validity date in its official materials. Always rely on Microsoft and OEM documentation for expiry or timeline questions.
  • Irreversibility: Some steps, especially when DBX revocations are applied or the boot manager is updated and signed by PCA2023, are effectively permanent for the firmware state; rollbacks are non‑trivial. Pilot and validate before broad deployment.

Quick checklist (do this before and during an update)​

  • Back up your data and capture BitLocker recovery key(s).
  • Update OEM firmware (BIOS/UEFI) to the vendor‑recommended release for 2023 CA support.
  • Install the required Windows updates (February 2024 cumulative and later; KB guidance per Microsoft).
  • Verify current state:
  • Secure Boot is On (msinfo32).
  • PowerShell test: [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) ‑match 'Windows UEFI CA 2023'
  • Decide scope:
  • 0x40 for DB update only (safer pilot).
  • 0x5944 for full enrollment and boot manager update.
  • If you trigger updates manually:
  • Set AvailableUpdates registry value.
  • Run Start‑ScheduledTask "\Microsoft\Windows\PI\Secure‑Boot‑Update".
  • Reboot twice.
  • Re‑verify with PowerShell.
  • Monitor registry keys UEFICA2023Status and UEFICA2023Error and Event Viewer logs for Secure‑Boot‑Update.
  • If errors occur, consult vendor firmware guidance and Microsoft event logs before proceeding with additional remediation.
Microsoft and OEM advisories are explicit: test, back up recovery assets, and proceed carefully. If you manage many endpoints, run small model‑based pilots and escalate OEM tickets where firmware issues arise.

Conclusion​

The Secure Boot certificate rotation is not a speculative change—it’s a scheduled, ecosystem‑level renewal that starts to matter in June 2026. For most modern, regularly patched Windows 11 machines, the transition will be transparent and automatic. For older, managed, air‑gapped, or firmware‑limited devices, there is a window of risk and operational work ahead.
You should verify today whether your device already contains the Windows UEFI CA 2023 entries (the PowerShell check above is the simplest verification). If it doesn’t and you cannot wait for Microsoft’s phased rollout—and you have validated OEM firmware compatibility and saved BitLocker recovery keys—you can follow Microsoft’s documented registry and scheduled‑task steps to apply the DB and KEK updates now. If you prefer maximum safety, apply the DB entry first (0x40), validate boot and recovery workflows, then apply the full update (0x5944) when you are confident.
Treat this change like any high‑impact platform maintenance: test on identical hardware, back up recovery assets, coordinate with OEM firmware updates, and use Microsoft’s event logs and registry status keys to confirm success. The cost of doing nothing is progressive erosion of pre‑boot security and compatibility; the cost of doing the update without preparation is potential recovery work. With proper planning, you can make the transition safely and keep your system ready for future boot‑level defenses.

Source: Make Tech Easier Your Windows Secure Boot Certificates are Expiring Soon: Here's How to Update to the Latest - Make Tech Easier
 

Microsoft is executing a coordinated, ecosystem-wide refresh of the Secure Boot certificate anchors that have protected Windows pre‑boot integrity since 2011 — a change with exact operational deadlines and real consequences for consumers, enterprises, servers, and specialized devices if it is not planned for and executed correctly. ([support.microsoft.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e)

Neon blue circuit diagram showing KEK 2011, Windows UEFI CA 2023, and Option ROM UEFI CA 2023 on a motherboard.Background: why Secure Boot certificates matter​

UEFI Secure Boot is the firmware-level gatekeeper that ensures only cryptographically signed, trusted code runs during the earliest stages of a PC’s startup. The mechanism depends on a small set of certificate authorities (CAs) and keys stored in firmware: the Key Exchange Keys (KEK), the Allowed Signature Database (DB), and the Disallowed Signature Database (DBX). These elements let firmware and platform owners verify signatures on bootloaders, option ROMs, and other EFI binaries before the operating system loads.
Certificates are not eternal. Microsoft’s original UEFI certificates issued around 2011 are reaching the end of their designed life in 2026. When those old certificates expire, devices that have not received replacements will still boot, but they will enter a progressively degraded security state: they will not be able to receive new pre‑boot protections, revocation updates, or future mitigations for newly discovered boot‑time vulnerabilities. In plain terms: the platform’s ability to be patched at the earliest stages of boot will be curtailed unless the new certificates are installed and persisted in firmware.
Microsoft has created a replacement family of CAs (the “2023 CA” family) to maintain continuity of trust. The reassignment is not a single certificate swap; it’s a multi-component rotation that includes splitting some roles (for example separating bootloader signing from Option ROM signing) and updating OS-side logic so the new certificates can be enrolled and persisted in firmware where possible.

What Microsoft is doing now​

  • Microsoft published authoritative guidance and a multi‑page operational playbook to explain the risk, the technical changes, and the actions required by device owners and administrators.
  • The company is delivering replacement certificates via a mix of Windows servicing (quality updates and targeted dynamic updates) and coordinated OEM firmware updates. Windows Update is being used to reach a large swath of devices automatically, but not all devices will update at the same pace or at all without firmware vendor cooperation.
  • Microsoft’s targeted Setup/Dynamic Update (released February 24, 2026) and cumulative preview packages include the OS-side components and device targeting logic needed to enroll new certificates on eligible devices. Administrators are advised to apply relevant dynamic update packages to prepare devices for feature updates and certificate enrollment.
Key Microsoft guidance emphasizes that the rollout is phased and telemetry‑gated: only devices that show sufficient successful update signals and firmware readiness will receive the on‑device certificate injection automatically. This cautious approach seeks to avoid wide-scale firmware compatibility problems while still reaching most modern PCs by the deadlines.

Timeline: concrete, non-negotiable dates​

Microsoft sets two concrete expiration windows for the legacy certificates:
  • Many of the 2011-era Microsoft UEFI/KEK certificates begin expiring in June 2026. Devices that have not migrated to the 2023 CA family by then will stop receiving new pre‑boot protections even though normal OS updates may continue.
  • A final Production PCA used to sign the Windows Boot Manager remains valid through October 2026, after which additional elements of the old signing chain will no longer be available for new boot-related signing.
Microsoft’s recent Setup Dynamic Update KB5079271 (published February 24, 2026) reiterates the June 2026 milestone and points administrators to the “Windows Secure Boot certificate expiration and CA updates” guidance for actions. The revision and the dynamic update availability are immediate operational inputs for IT teams.

Who is affected — scope and friction points​

Most modern Windows 11 devices and new systems produced since 2024 already include the 2023 certificates in firmware and will be unaffected beyond routine updates. But significant classes of systems could require attention:
  • Unmanaged or out-of-support Windows 10 devices that are not enrolled in Extended Security Updates (ESU) — these may not automatically receive the OS-side enrollment logic without ESU or an OEM firmware push. Microsoft has been explicit that Windows 10 users who are off the supported servicing path have a materially higher risk of entering a degraded security state.
  • Servers, virtualized hosts, and specialized hardware (medical devices, ATMs, industrial endpoints, IoT) — many of these systems run tightly controlled firmware and update cadences; they require explicit planning and vendor coordination to ensure certificate persistence. Microsoft published a separate server playbook to help administrators with this work.
  • Air‑gapped, offline, or manually maintained devices — these will require out‑of‑band intervention, either from OEM firmware updates or manual certificate enrollment by administrators.
  • Custom or locked firmware where OEMs restricted modifications — some OEM firmwares may not accept or persist the new KEK/DB changes without a vendor-supplied firmware update. This remains one of the trickiest cases for fleet managers.
  • Dual‑boot, Linux shim, and custom boot chains — platforms that rely on shim and other third-party signers will need attention to ensure the new Microsoft UEFI CAs are present and that distributions’ shim packages remain trusted. The community and submitter guidance highlights that submitters should expect to sign with the new 2023 certificates while retaining legacy signatures for compatibility.
The Windows ecosystem — OEMs, IHVs, and ISVs — has been coordinated, but diversity of hardware and firmware versions means no single approach fits all devices. Community reporting and forum threads show that the move is being treated as an urgent but delicate operational campaign.

How the certificate change actually works (technical detail)​

To understand the operational impact, it helps to break down the roles of the different certificate stores and keys:
  • KEK (Key Exchange Key): authorizes changes to the platform’s DB and DBX. The KEK is central because a valid KEK lets an authority update which binaries are allowed or revoked. Microsoft’s KEK 2011 will be replaced by Microsoft Corporation KEK 2K CA 2023. If a system’s KEK is not updated, the OS can no longer plant or manage DB/DBX changes signed by the new CA.
  • DB (Allowed Signatures): contains the CAs and signed entries that firmware uses to validate allowed boot components. Microsoft is introducing multiple DB certificates — including a Windows UEFI CA 2023 for signing the Windows boot loader and a distinct Option ROM UEFI CA 2023 for Option ROMs — to provide finer-grained control.
  • DBX (Disallowed Signatures): stores revocations. Without the updated chain, devices won’t be able to receive future DBX updates to revoke compromised or vulnerable pre‑boot binaries.
Two important operational realities:
  • Expiration of a CA does not retroactively invalidate binaries already signed with that CA — such signed binaries remain trusted on devices that still have the old CA present in their firmware. The security problem is future‑looking: the platform’s ability to accept new signed updates, mitigations, aired once the old CA expires.
  • Microsoft will not dual‑sign new submissions indefinitely. Submitters (OEMs, IHVs, ISVs) should expect to adopt the 2023 signing chain and test accordingly — the community guidance for submitters explains that dual signing will not be the long‑term approach. This makes the transition timeline operationally relevant for code-signers as well.

Rollout mechanics — telemetry gating, device targeting, and Windows updates​

Microsoft is intentionally cautious: the certificate injection to firmware is performed only on devices that demonstrate the necessary update telemetry and firmware behavior. That reduces the risk of mass bricking or firmware incompatibilities, but it also means administrators cannot assume all machines will be updated on the same schedule. Microsoft’s preview and cumulative packages add device targeting improvements to increase coverage progressively and safely.
Important operational notes from Microsoft’s update descriptions:
  • Quality updates and preview releases now include “high confidence device targeting data” to widen enrollment while still respecting the controlled rollout policy.
  • The Setup/Dynamic Update (KB5079271 and others) is explicitly referenced as a way to prepare Windows 11 images and feature update paths to accept certificates. This is especially relevant for administrators building and deploying image-based updates or handling offline servicing.
Community reporting and forum threads confirm that Microsoft and OEMs are coordinating phased deliveries and that telemetry-driven gating has been central to the effort to avoid device-level regressions.

Practical steps for IT administrators — a playbook​

Every IT team should treat this as a prioritized maintenance project. The following sequence is a practical, tested playbook you can adapt for your environment:
  • Inventory and classify your fleet by OS version, firmware date, OEM, and hardware model. Prioritize devices that are Windows 10, servers, or specialized appliances.
  • Identify devices that are unmanaged, offline, or designated for extended lifecycle support; these require bespoke plans.
  • Confirm Secure Boot is enabled where required; gather TPM/BitLocker policies and ensure recovery keys are accessible.
  • Test the Microsoft Setup Dynamic Update and KB packages in a lab: apply KB5079271 / KB5077241 and verify certificate enrollment behavior on representative hardware.
  • Coordinate firmware updates with OEMs for models that need vendor-signed firmware to accept KEK/DB changes. Log exact firmware versions and release notes.
  • Update recovery media and images: rebuild PE/recovery ISOs with updated Windows setup packages so future reinstalls will include enrollment logic.
  • Schedule a staged deployment: pilot on small cohorts, monitor enrollment telemetry, then expand. Use WSUS/SCCM/Intune targeting where available.
  • For devices that cannot be updated, build a compensating control plan (segmentation, strict monitoring) and track remediation timelines.
  • Communicate to end users and helpdesk staff: recovery key procedures, possible BitLocker prompts after firmware changes, and expected timelines.
This is not theoretical — Microsoft has published a server-centric playbook and public guidance to help administrators perform these exact steps. Ignoring the process risks devices losing pre‑boot updateability in June–October 2026.

Consumer and enthusiast considerations​

Home users and gamers mostly will see little disruption if they keep Windows Update enabled and install firmware updates when OEMs provide them. However, there are corner cases:
  • Anti‑cheat systems used by modern games often rely on Secure Boot and platform attestation. Some press reports note these dependencies and emphasize why prompt enrollment matters for gamers. Keep anti‑cheat drivers and Windows updates current to avoid false positives or blocked game launches.
  • Dual‑booters and Linux users should check whether the distribution’s shim is signed by a CA that remains trusted after certificate rotation. Distribution maintainers are coordinating signings, and guidance for submitters indicates dual-signed packages will be a transitional reality. Still, test recovery ISOs and boot scenarios before broad changes.
  • Recovery media created years aenroll the new certificates on re‑imaged systems; rebuild recovery media with updated Windows setup components if you rely on USB recovery drives.

Likely benefits and the central strengths of Microsoft’s approach​

  • The phased, telemetry‑gated rollout minimizes the risk of widespread firmware regressions and allows Microsoft and OEMs to detect and remediate compatibility problems before a broad push. That careful stance is the right balance for a platform-level change where bricking or persistent boot failures would be catastrophic at scale.
  • Providing dedicated server playbooks, dynamic update packages, and explicit administrator guidance reduces ambiguity for enterprise deployments and gives IT teams concrete steps and artifacts to test with.
  • The finer-grained certificate separation (e.g., Option ROM CA vs UEFI app CA) actually improves trust management by giving OEMs and platform owners more control over specific kinds of pre‑OS code.

Risks, gaps, and where things can go wrong​

  • Firmware diversity is the elephant in the room. Some OEMs or legacy firmware may not accept new keys or persist changes to NVRAM consistently. Those devices will need vendor firmware updates that may never arrive for very old or bespoke hardware.
  • Windows 10 devices off mainstream servicing (i.e., not on ESU) face a tangible risk of being unable to automatically enroll the new certificates. Microsoft’s public messaging has made this a practical reason to migrate or enroll in ESU where needed.
  • Operational complexity in large fleets is real: image management, staged deployment, and firmware coordination are labor‑intensive, and organizations that haven’t already institutionalized firmware update lifecycles will struggle. Forum evidence shows administrators are treating this as an immediate project with elevated priority.
  • Edge cases — virtualization, OEM locking, and custom boot managers — may require per-device testing and vendor engagement. These are not solved by a single Windows Update.
Where Microsoft or third parties make claims that cannot be independently verified for every OEM model (for example, precise enrollment success rates across all hardware configurations), treat those as subject to real-world variability and confirm behavior in representative hardware labs before wide deployment. Forum reporting and community telemetry are useful complements but cannot substitute for vendor-level verification.

Troubleshooting highlights and useful checks​

  • Verify whether a device already contains the 2023 CA family in firmware with a PowerShell check or by inspecting UEFI variables. Microsoft’s guidance includes PowerShell examples and steps for administrators to confirm certificate presence.
  • After an enrollment attempt, confirm DB/DBX updates are accepted and persisted across a cold reboot. If an update appears to “stick” only until reboot, the firmware does not persist NVRAM changes and requires OEM firmware remediation.
  • If BitLocker asks for a recovery key after a firmware change, follow established recovery procedures. Communicate to users ahead of scheduled updates to avoid helpdesk overload.
  • For systems that cannot receive updates, document compensating controls: network isolation, heightened endpoint detection, scheduled hardware refresh, or targeted replacement plans.

What to tell executives and procurement​

  • This is an actionable, calendar‑bound platform maintenance item with a real deadline: June 2026 (many 2011 certs) and October 2026 (final PCA). Treat it like a critical security patch that requires firmware validation, not just a routine software update.
  • The cost of inaction is not immediate device failure, but a shrinking ability to protect and patch the pre‑OS environment — a high-value attacker target. Prioritize devices by risk, remediation complexity, and business impact.
  • Include firmware lifecycle and vendor coordination as a standing item in procurement and asset management processes going forward; this event exposes how firmware neglect compounds risk across long device lifetimes.

Final assessment and call to action​

Microsoft’s Secure Boot certificate rotation is both necessary and prudently conservative: the company is balancing the imperative of preserving pre‑boot security with the practical needs of firmware compatibility and device diversity. The public guidance, dynamic updates, and OEM coordination form a reasonable operational path to keep the platform secure — but the success of the campaign depends on real work from administrators, OEMs, and device owners.
If you manage or own Windows devices, take these immediate steps today:
  • Audit your estate and identify Windows 10 systems, servers, and specialized hardware.
  • Pilot the Microsoft Setup/Dynamic Update packages (February 24, 2026 releases) on a representative set of devices.
  • Open firmware update discussions with vendors for models that need firmware-side enrollment.
  • Rebuild recovery media and images so future reinstalls include the enrollment logic.
This is one of those rare platform maintenance items that has a calendar and a consequence. Plan, test, and act now — and document every step. The alternative is not sudden failure, but the slow atrophy of pre‑boot defenses that attackers will happily exploit.
Conclusion: the certificate rotation is fixable, auditable, and manageable — provided organizations treat it as a prioritized lifecycle project with firmware, imaging, and update processes coordinated across IT, OEM partners, and security teams.

Source: Microsoft Support Updates and announcements - Microsoft Support
 

Microsoft has issued a clear operational warning: the Secure Boot certificates that have anchored Windows’ pre‑boot trust since about 2011 are reaching the end of their planned lifetimes, and IT teams must act now to ensure fleets — especially servers, air‑gapped systems, and Windows 10 devices — receive replacement certificates before expirations begin in June 2026. This is not an abstract housekeeping note: Microsoft and major OEMs are executing a coordinated “certificate rollover” that combines Windows servicing, firmware updates, and explicit server playbooks to prevent a calendar‑driven degradation of Secure Boot protections.

A technician monitors a blue-glowing Secure Boot Trust Chain diagram in a server room.Background​

UEFI Secure Boot is a firmware‑level mechanism that verifies the digital signatures of the very first binaries a PC runs — boot managers, shim loaders, option ROMs, and related components. Its effectiveness depends on a small set of cryptographic anchors (certificate authorities, or CAs) stored in UEFI variables. Those Microsoft‑issued CAs from the Windows 8 era were intentionally long‑lived, but their designed lifespan is coming to an end: the 2011 CAs begin to expire in mid‑2026 and will be replaced by a new family of certificates Microsoft created in 2023.
Microsoft has published multiple operating notices and dynamic update packages to make this transition manageable for most consumer and business devices, and it has published a separate, more prescriptive playbook for Windows Server administrators who must take manual steps in many environments. The guidance stresses inventory, testing, OEM firmware readiness, and staged rollouts — all with a clear deadline urgency.

What exactly is expiring (and when)?​

Microsoft’s public guidance names three long‑running Microsoft certificates deployed into UEFI Secure Boot: the Microsoft Corporation KEK CA 2011, the Microsoft UEFI CA 2011, and the Microsoft Windows Production PCA 2011. Those certificates are scheduled to begin expiring in a staggered window starting in late June 2026 and continuing through October 2026. To preserve Secure Boot’s updateability and future mitigations, Microsoft has issued a replacement “2023 CA” family and is distributing it via Windows updates and OEM firmware packages.
Key dates reported by Microsoft and OEMs include:
  • Several 2011 CAs begin expiring in June 2026 (specific platforms and certificates vary).
  • A final production PCA in the family follows later in October 2026, creating a multi‑stage deadline profile administrators must respect.
OEM guidance (for example HP and ASUS) provides concrete mappings for which 2011 certificate expires when and the corresponding 2023 replacement certificates, including how they are stored in UEFI variables such as KEK, db, and dbDefault. These vendor writeups are particularly useful for administrators planning firmware updates and emergency rollouts.

Why this matters to IT: practical consequences​

If a device reaches the certificate expiration date without the new 2023 family installed and persisted in firmware, it will typically still boot and operate normally, but with important loss of future protections:
  • The device will no longer receive new Secure Boot or Boot Manager security updates that rely on the now‑expired signing certificates. Over time, that means newly discovered boot‑level vulnerabilities cannot be fixed on that device.
  • Windows features and third‑party tooling that rely on Secure Boot trust — anti‑cheat protections, BitLocker hardening, certain security attestation flows, and third‑party pre‑OS drivers — may be impacted or prevented from receiving future enhancements.
  • Servers, cloud images, and specialized endpoints (air‑gapped machines, OT/embedded devices) require additional attention because they may not get automatic Windows Update pushes and often remain on older firmware. Microsoft’s server playbook explicitly calls out manual steps for Windows Server hosts.
Put simply: this is not an immediate “stop working” cliff, but a strategic risk to long‑term platform security and patchability that will increase over time unless certificates are rotated before expiration.

Microsoft’s rollout model — what to expect​

Microsoft and partners are taking a mixed approach to distribution:
  • Windows client devices that participate in standard Windows Update and have compatible firmware will mostly get the 2023 CA certificates automatically through dynamic updates and setup packages. These updates are being staged and telemetry‑gated to reduce risk.
  • Windows Server environments do not benefit from the same automatic Controlled Feature Rollout behavior; Microsoft’s server guidance requires administrators to inventory, test, and manually initiate certificate updates where necessary. The company has published a step‑by‑step server playbook and a “Prepare your servers” blog post for this reason.
  • OEM firmware updates remain essential for older machines whose UEFI firmware either cannot accept the new certificates automatically or needs a firmware update to persist them correctly. Many major OEMs (HP, ASUS and others) have already published support matrices and BIOS/UEFI updates for affected models.
  • Some cloud and managed offerings (for example Windows 365 Cloud PCs) have their own guidance and operational steps because custom images and provisioning pipelines must be updated to include the 2023 certificates prior to the expiry window.

Inventory and verification — the first priority​

Any successful certificate rollover at scale begins with accurate inventory. Microsoft’s guidance and the server playbook provide concrete checks administrators should run immediately.
Recommended inventory tasks:
  • Verify which systems are Secure Boot‑enabled and whether they already contain the 2023 certificates. Use available PowerShell inventory snippets or check the UEFI registry keys the playbook references. Microsoft documents sample inventory commands and explains the UEFICA2023Status registry key that will show an “updated” state once updates are applied.
  • Identify devices that are offline, air‑gapped, firmware‑outdated, or running unsupported OS builds (for example, Windows 10 systems not on ESU). These are the highest‑risk assets.
  • Build a pilot group representing the hardware diversity of the fleet (old models, new models, laptops/desktops/servers) and confirm that both Windows‑side updates and firmware updates behave as expected. Pilot close to production workloads but with rollback capability.
These steps are operational, low‑complexity, and high‑value; skipping them invites surprises during a time‑critical rollover.

Step‑by‑step checklist for IT teams​

Below is a practical sequence IT teams can follow this week and into the months ahead. Treat this as operational playbook, not optional reading.
  • Inventory and prioritize
  • Run the Microsoft sample PowerShell inventory to find the current UEFI CA status for every Secure Boot‑capable device. Tag assets lacking the 2023 certificates.
  • Prioritize servers, cloud images, and devices with limited update windows or that are offline.
  • Patch and firmware readiness
  • Apply the latest cumulative updates and servicing stack updates to Windows hosts so they can receive and install the dynamic updates Microsoft is delivering.
  • Check OEM firmware advisories for your hardware models; apply BIOS/UEFI updates where vendors recommend them before attempting the certificate update.
  • Pilot and validate
  • Select a small number of representative devices; perform the full end‑to‑end flow: firmware update (if required) → Windows dynamic update → reboot → verify UEFICA2023Status = “updated”.
  • Validate recovery paths: updated recovery media, acceptance of third‑party drivers, BitLocker key behavior, and any hypervisor compatibility where relevant.
  • Schedule mass deployment
  • Use your existing update channels (Windows Update, WSUS, MECM, or vendor management tools) to push the updates. For servers, follow Microsoft’s explicit playbook and manual procedures.
  • Post‑deployment verification and monitoring
  • Report UEFICA2023Status across the estate and watch for any devices that fail to reach “updated.”
  • For any failed devices, open OEM support tickets and consider a firmware reflash or manual certificate enrollment per vendor guidance.

Special considerations: Windows Server, Cloud, and Unsupported Windows 10​

  • Windows Server: Microsoft’s server blog and playbook are explicit — servers often require manual intervention and cannot rely solely on automatic client updates. Administrators should treat server certificate updates as a scheduled maintenance item and test carefully.
  • Cloud / Windows 365: Provisioning images and Cloud PC templates must be updated to include the 2023 certificates prior to provisioning; otherwise newly provisioned Cloud PCs may be out of compliance with Secure Boot protections. Microsoft published Cloud‑PC specific guidance for administrators.
  • Windows 10 and ESU: Many Windows 10 systems are already outside mainstream support. Microsoft has indicated that devices not on supported servicing channels or enrolled in Extended Security Updates may not receive all of the automatic certificate rollouts, so migration or ESU enrollment is a practical requirement for many environments.

Risks, gotchas, and what can go wrong​

This certificate rollover has a few non‑trivial risks IT teams should not underestimate:
  • Firmware that cannot persist the new certificates: Some older UEFI implementations mishandle updates to KEK or db variables or reset them during firmware resets, which can leave devices in the old state even after Windows applied a dynamic update. OEM firmware updates are often required to make the change persistent.
  • Incomplete inventory: Air‑gapped servers, isolated OT devices, or VMs that emulate legacy firmware can be missed in standard telemetry, creating pockets of devices that silently lose access to future boot‑level mitigations. The server playbook stresses comprehensive inventory because these gaps are the primary operational failure mode.
  • Fragile recovery media: If you rely on recovery USB sticks or OS images that were created prior to the 2023 certificates, those artifacts may not be recognized as “trusted” by updated Secure Boot configurations, complicating on‑site repairs. Recreate updated recovery media after the pilot phase.
  • Third‑party dependencies: Anti‑cheat tools and specialized bootloaders may be signed by non‑Microsoft CAs. OEMs’ guidance shows some 2023 CA certificates related to third‑party signing are not enabled by default on certain secured devices; enabling them is a policy decision that can widen or narrow the attack surface. Test vendor‑supplied pre‑OS tooling carefully.
Where possible, mitigate these risks with pilot testing, vendor coordination, and staged rollouts that allow you to revert quickly.

Technical verification: what to check after an update​

After you apply the certificate updates, confirm these states:
  • UEFICA2023Status (or equivalent registry/PowerShell output) equals “updated.” This is Microsoft’s canonical flag for success.
  • KEK, db, and dbx UEFI variables contain the expected 2023 certificates (vendors will provide exact GUIDs and thumbprints for verification).
  • Boot behavior, BitLocker, and device attestation flows remain functional under the new certificate set. Confirm device recovery procedures still work and that updated recovery media is accepted by affected firmware.
If any of these checks fail, treat the device as high‑priority for firmware remediation.

Vendor coordination: OEMs and platform partners​

Microsoft’s approach depends heavily on OEM cooperation. HP, ASUS and other large manufaclists of affected platforms, firmware versions, and recommended BIOS updates. Those OEM advisories are essential because they explain which models will accept certificate changes automatically and which will require a firmware update or manual intervention. IT teams should create vendor‑specific deployment tracks in their operational plans.
OEM guidance also contains useful security settings implications. For example, some secured‑core PC settings do not enable certain third‑party CA keys by default; enabling them is an operational choice that must balance compatibility and threat surface concerns. Validate vendor‑recommended defaults against your organization’s policy before mass‑enabling new CA entries.

Communication and change management — what to tell stakeholders​

Treat this as a cross‑team program: security, server ops, endpoint management, firmware admins, and procurement must coordinate.
  • Security teams need to understand that an unupdated device will be in a progressively degraded state for boot‑level protections after the 2011 roots expire. Use this to prioritize high‑risk assets.
  • Server and data‑center teams must schedule maintenance windows; Microsoft’s server playbook is explicit that servers often require manual operations.
  • Endpoint management should plan phased deployments, pilot testing, and verification before wide rollout. Document rollback steps in case firmware or driver incompatibilities appear.
Clear, timely communication avoids the worst operational surprises — an old server unexpectedly unable to receive future boot‑level patches is far better handled when the owner has been pre‑warned.

Strengths of Microsoft’s approach — and where it falls short​

What Microsoft does well:
  • Clear deadlines and coordinated tooling. Microsoft has published KBs, dynamic update packages, server playbooks, and community AMAs that collectively provide actionable guidance. That level of transparency and operational material is an important strength.
  • Ecosystem coordination. The company has worked with OEMs and cloud providers to preconfigure many new devices with 2023 certificates and to provide firmware updates for older devices. Those partnerships materially reduce the risk surface.
Where shortcomings could cause pain:
  • Scale of manual work for servers and specialized systems. Microsoft admits server deployments may require manual intervention; in large data centers and regulated environments this imposes scheduling and testing burdens.
  • Reliance on OEM firmware support. For out‑of‑support hardware, OEMs may not provide firmware updates, leaving organizations with hard choices — upgrade, retire, or accept degraded boot security. That reality exposes organizations with long‑tail hardware to commercial risk.

Practical recommendations (short checklist for the next 30 days)​

  • Run the Microsoft inventory scripts now and classify devices by risk tier.
  • Patch devices to the latest servicing stack and cumulative updates to ensure they can receive dynamic updates.
  • Apply vendor firmware updates for high‑priority hardware and pilot the certificate change on a small, representative set.
  • Rebuild updated recovery media and include certificate verification in endpoint health checks.
  • For servers and cloud images, follow Microsoft’s server playbook and Windows 365 guidance to avoid provisioning images that lack the 2023 certificates.

Final assessment: urgency without panic​

This Secure Boot certificate rollover is urgent but manageable. Microsoft’s multi‑pronged approach — updates via Windows servicing, vendor firmware cooperation, and focused server playbooks — reduces the likelihood of systemic failures if IT teams treat the guidance as a mandatory maintenance program, not optional reading. The primary operational hazards are older firmware that cannot persist new keys, overlooked air‑gapped systems, and the manual remediation burden in server environments. Start inventory now, pilot early, and coordinate with OEM partners to keep your fleet in a supported, updateable Secure Boot posture.
For administrators who want a concise trigger: if your UEFICA2023Status is not “updated,” you are in the zone that requires action. Prioritize those systems today and treat the June–October 2026 window as immovable for any devices still on the 2011 roots.

Conclusion
The Secure Boot certificate refresh is a textbook example of infrastructure lifecycle management intersecting with security policy. It tests firmware hygiene, vendor relationships, and operational discipline. With Microsoft’s guidance, OEM advisories, and the server playbook in hand, proactive IT teams can complete the rollover without major disruption — but only if they treat the task as a scheduled, non‑optional maintenance event with authoritative timelines and measurable verification.

Source: Redmondmag.com Microsoft Urges IT Teams to Prepare for Secure Boot Certificate Updates -- Redmondmag.com
 

Microsoft's original Secure Boot certificates—the cryptographic anchors that validate everything that runs before Windows—are entering a hard operational deadline that will force Windows Server administrators to act now: certificates issued around 2011 begin expiring in June 2026, and servers that don't receive the replacement 2023 certificate family will move into a degraded boot‑time security state and risk serviceability, recovery, and compliance problems if they aren't updated before the deadline.

A person updates firmware on a laptop as a secure-boot shield and security icons float in a blue data-center scene.Background / Overview​

UEFI Secure Boot is the firmware‑level trust model that prevents unsigned or tampered code from running in the earliest phases of startup. It relies on a small set of certificate authorities (CAs) stored in firmware and managed through UEFI variables—commonly referenced as PK (Platform Key), KEK (Key Exchange Key), DB (Allowed Signatures), and DBX (Revoked Signatures). Microsoft and OEMs provision Microsoft‑signed CAs into many PC and server firmwares so Windows boot components, boot managers, and approved third‑party shims can be validated at boot.
Those original Microsoft CAs were issued around 2011 and, like any certificate, were given finite lifetimes. Microsoft has built a replacement family (the Microsoft UEFI/KEK/Windows UEFI CA 2023 set) and is coordinating deliveries via Windows servicing and OEM firmware updates, but the rollout differs between client PCs and servers. Crucially, many Windows Server installations will not get the new certificates through Microsoft's automated Controlled Feature Rollout (CFR) pathway and therefore require administrative action to enroll the 2023 certificates into firmware before June 2026.
Why this matters now: devices that remain on the 2011 CAs after expiry will still boot in most cases, but they will no longer be able to receive new Secure Boot and boot‑manager protections, revocation updates, or mitigations for newly discovered boot‑level vulnerabilities. Over time that degrades the effectiveness of Secure Boot and can cause practical operational problems for backups, failover, recovery media, and virtualization scenarios where trust chains must match across images and hosts.

Microsoft, OEMs and the coordinated transition​

Microsoft has framed the work as a generational refresh: the 2011‑era certificates are being replaced by a 2023 certificate family that splits some signing responsibilities (for example, separating option ROM signing from third‑party bootloader signing) to allow finer control of trust. The update is a multi‑party effort:
  • Microsoft will deliver OS‑side pieces via Windows servicing where possible and has published a server‑focused playbook and KB notices to guide administrators.
  • OEMs are updating firmware for platforms where the UEFI implementation must be adjusted to accept and persist the new certificates.
  • Cloud providers and virtualization platform vendors are issuing guidance for their environments (including Windows 365 and Azure Local scenarios) so hosted images and local hosts remain consistent.
For Windows client devices Microsoft can rely on CFR and telemetry to push the 2023 certificates broadly, but Windows Server instances are explicitly excluded from CFR in many cases. That forces manual enrollment methods, or using the new server‑targeted assists and tools Microsoft has documented for IT‑managed environments.

What Windows Server admins must know right now​

This is not optional housekeeping. For servers in scope, Microsoft’s guidance makes these points explicit:
  • The 2011 Microsoft Secure Boot CAs begin expiring in June 2026 (with an additional Windows boot‑signing PCA expiring later in 2026).
  • Windows Server fleets must be inventoried and updated proactively because they will not automatically receive the 2023 CA family via CFR the way many client PCs do.
  • There are several supported enrollment methods: registry/GPO triggers for Windows‑driven updates, Windows Configuration System (WinCS) APIs, manual OEM firmware enrollment, and Intune/Remediations for managed fleets.
  • Event IDs and registry keys exist to monitor progress (for example, the UEFICA2023Status and UEFICA2023Error registry keys, and System event IDs such as 1808 and 1801 signaling success or partial failure).
These specifics are the basis for the operational playbook below.

Immediate operational checklist (what to do in the next 30–60 days)​

Follow a disciplined, test‑first rollout. The steps below are prescriptive and ordered—treat them like a short project plan.
  • Inventory: Identify all servers that are Secure Boot‑enabled and that will be in scope for the update.
  • Use PowerShell and management tools to capture Secure Boot state and existing certificate status.
  • Record firmware versions, OEM model, virtualization host/hypervisor details, and whether servers are air‑gapped.
  • Prioritize: Select a small representative pilot group of low‑impact servers (non‑production or dev/test) that reflect the different hardware generations and virtualization configurations in your environment.
  • Check for OEM firmware updates: For each platform, confirm whether the OEM has published firmware that includes or supports the 2023 certificates. If the OEM provides firmware that enrolls or persists the new CA automatically, plan to apply firmware updates before certificate enrollment.
  • Plan your enrollment method:
  • For domain‑joined servers: Group Policy (Enable Secure Boot certificate deployment) or registry keys.
  • For Intune‑managed servers: use the published detection/remediation scripts and remediations path.
  • For isolated or air‑gapped boxes: plan manual firmware enrollment or coordinate with OEM procedures.
  • Pilot: Apply the chosen method to your pilot group, monitor Event Logs and registry keys, validate boot and recovery operations, and test restores using updated recovery media.
  • Full rollout: Expand in waves, instrument monitoring and alerts, and maintain a remediation backlog for devices that report errors.
  • Rebuild and refresh recovery artifacts: Confirm that recovery images, backup VMs, and rescue ISOs contain the updated boot manager and certificates—recreate golden images where needed.
  • Document and record: For compliance and audit, snapshot current certificate status and maintain change records for each server updated.

How to inventory and verify Secure Boot certificate status​

Start with these practical techniques—mix manual checks and management tooling for scale.
  • Quick GUI check (single server): Windows Security > Device Security > Secure boot shows whether Secure Boot is on.
  • PowerShell (single server or scripts): run Confirm-SecureBootUEFI from an elevated PowerShell prompt to check whether Secure Boot is enabled. Use Get‑SecureBootPolicy or the Get‑SecureBootUEFI helpers that Microsoft documents to interrogate the firmware keys when available.
  • Registry checks (scriptable, recommended for servers): the Secure Boot servicing registry keys live under:
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
  • Look specifically for UEFICA2023Status (values such as NotStarted, InProgress, Updated) and UEFICA2023Error for failure diagnostics.
  • Centralized inventory: Microsoft Intune Remediations, SCCM/ConfigMgr, or your RMM agent can run detection scripts and collect UEFICA2023Status and event logs across a fleet. Use the detection script Microsoft published (or create an equivalent) to gather JSON output for reporting.
  • OEM/firmware interface: For some vendors you can inspect the UEFI certificate stores via vendor management interfaces (for example, Redfish or OEM utilities). Where available, these APIs can verify that the new 2023 CA is present in KEK/DB.
Note: Confirm‑SecureBootUEFI will show presence of Secure Boot but not necessarily which CA version is enrolled—use the registry and event logs, or vendor tools, to confirm 2023 CA enrollment.

Supported deployment methods for Windows Server​

Microsoft documents several supported paths—pick the one that best fits your management framework and operational constraints.
  • Group Policy or registry key method (recommended for many on‑prem server farms): set the Group Policy “Enable Secure Boot certificate deployment” to Enabled (or write the corresponding AvailableUpdates registry value). This triggers Windows to push the 2023 CA and the updated Windows boot manager into firmware.
  • Windows Configuration System (WinCS) APIs: available on modern Windows Server platforms to perform queries and enrollment programmatically (useful for scripted, high‑confidence deployments).
  • Manual OEM firmware enrollment: some older platforms or air‑gapped servers must be updated by applying OEM firmware that includes the 2023 CA or by using vendor‑specific UEFI enrollment tools.
  • Intune Remediations: for cloud‑managed fleets, use Microsoft’s detection and remediation scripts to monitor and report device state and drive updates where possible.
  • Start a new VM from the latest version or rebuild images: in virtualized environments, the simplest path for some workloads is to deploy new VMs that already include the 2023 CA or to update the hypervisor/host so guest VMs inherit the appropriate firmware handling.
Operational tip: avoid mixing methods on the same target device—pick one enrollment method per machine to prevent state confusion.

Key Event IDs and registry signals to monitor​

Instrument your monitoring and SIEM to flag these signals during rollout:
  • Event ID 1808 (Windows System log): indicates Secure Boot certificates and the new boot manager were applied successfully.
  • Event ID 1801: indicates partial or full failure to apply updated certificates—investigate immediate OEM/firmware requirements or registry flags.
  • Event ID 1795: reported in some environments as an error during handing off certificates to firmware; check OEM support and known issues for the platform.
  • Registry key UEFICA2023Status: should progress to "Updated" after successful deployment.
  • Registry key UEFICA2023Error: presence indicates there was an error; capture the value and correlate with Event Logs.

Risks, worst‑case scenarios, and why you can’t postpone​

Updating Secure Boot certificates is a low‑level change and skipping it invites the following hazards:
  • Degraded security posture: after expiry, devices will no longer receive updates for the boot manager or Secure Boot databases, reducing ability to defend against new boot‑level exploits and rootkits.
  • Recovery and restore failures: backup images, recovery VMs, or failover nodes that boot with mismatched trust anchors may not validate boot components—this can prevent restores, block cluster nodes from joining quorum, or cause failover automation to fail.
  • Cluster and high availability impacts: if cluster nodes are updated unevenly (some with 2011, some with 2023), quorum checks, live migration, or disaster recovery rehearsals may fail or produce unpredictable behavior.
  • Compliance and audit exposure: many regulatory baselines and internal hardening checklists require current cryptographic anchors; running expired CAs can be interpreted as control drift and produce audit findings.
  • Air‑gapped and long‑lived appliances: systems that don’t receive firmware updates regularly are at higher risk; manual planning and OEM coordination are essential.
  • Virtualization and nested environments: some hypervisors and generation‑1 VM types don’t support Secure Boot or the update paths—review virtualization guidance for your hypervisor vendor and create procedures for guest image regeneration.
All of the above are not hypothetical: Microsoft, OEMs, and Linux distributors have published operational guidance and confirmed that uncoordinated or incomplete rollouts have caused both security and operational headaches in early pilots.

Practical troubleshooting and remediation playbook​

If a server reports errors during enrollment, follow this triage flow:
  • Check Event Logs (System) for Event ID 1801/1795/1808 and capture the full event text.
  • Inspect UEFICA2023Error registry key for numeric error codes and correlate with Microsoft remediation guidance.
  • Verify firmware version and OEM advisories—many failures stem from firmware that cannot accept the new KEK/DB mutation without an OEM hotfix.
  • If firmware is not supported or OEM support has ended, evaluate replacement hardware or plan compensating controls (for example, remove sensitive VMs from that host and document risk to compliance owners).
  • If the VM or host cannot be updated, ensure recovery images are refreshed and that rescue media used for restores include the original (still‑trusted) boot manager and any required shims—test restores in an isolated environment.
  • For cluster issues: perform a staged node update (one node at a time), validate cluster failover and quorum, and avoid simultaneous reboot waves.
Critical note: always test certificate updates against your recovery media, backup images, and VM templates. A common, avoidable failure is to update host trust anchors while restoring an older VM image that contains a bootloader signed only by the older CA. Make sure restoration scenarios are validated.

Checklist: server‑specific actions to finish before June 2026​

  • [ ] Run fleet inventory for Secure Boot status and UEFICA2023 registry keys.
  • [ ] Identify and catalog servers that must be updated manually (air‑gapped, unsupported OS, older firmware).
  • [ ] Obtain OEM firmware updates and vendor guidance for each affected hardware model.
  • [ ] Select deployment method (GPO, WinCS, Intune, manual) and prepare pilot scripts/policies.
  • [ ] Pilot on representative servers and validate:
  • Successful Event ID 1808 entries
  • UEFICA2023Status = Updated
  • Recovery and restore operations succeed
  • Cluster nodes rejoin and services recover as expected
  • [ ] Rebuild and refresh golden images and recovery ISOs to include the updated boot manager and certificates.
  • [ ] Roll out in controlled waves, monitoring Event Logs and registry telemetry for errors.
  • [ ] Maintain an exceptions register with risk acceptance and compensating controls for devices that cannot be updated.

Special considerations: virtualization, cloud, and dual‑boot Linux systems​

  • Virtualization hosts and guests: Generation‑1 VMs don't support Secure Boot; Generation‑2 VMs do. Hypervisors and cloud hosts may have their own enrollment path—coordinate with hypervisor vendors and cloud providers. In managed desktop/cloud offerings like Windows 365, administrators must ensure custom images are updated to the 2023 CA before provisioning.
  • Linux and shim: Linux distributions use shim and require new shims signed with the 2023 CA to accept updated kernels or shim updates. Red Hat and other Linux vendors have published their own guidance and timelines—test mixed OS environments carefully.
  • Anti‑cheat and DRM systems: Some anti‑cheat or vendor‑signed drivers interact with Secure Boot expectations. Ensure those vendors have released compatible binaries signed under the 2023 CA and test gaming or DRM‑protected workloads if you host such workloads in enterprise labs.

Recommended timeline and governance​

Because the first expiry window starts in June 2026, adopt an aggressive schedule:
  • Week 1–2: Inventory and pilot planning.
  • Week 3–6: OEM firmware application and pilot rollout across representative hardware and virtual platforms.
  • Week 7–12: Phased rollout across production servers, with daily monitoring and incident response readiness.
  • Ongoing: Periodic audits and revalidation of recovery media, and monthly checks of event log telemetry until all devices show UEFICA2023Status = Updated.
Governance: add Secure Boot certificate rotation to patch and firmware change calendars, track progress by hardware class and application owner, and require sign‑offs from platform engineers before mass rollout. Treat this change like a configuration‑management project with rollback and recovery playbooks.

What to communicate to stakeholders​

  • To executives: this is a planned lifecycle event with real security and operational risk if ignored—compliance and recoverability depend on action now.
  • To application owners: expect short reboots and validation windows; some older VMs or appliances may require image rebuilds.
  • To auditors/security/compliance teams: provide an inventory of Secure Boot status and a timeline of remediation steps; capture Event IDs and registry evidence as proof of remediation.

Final recommendations and closing analysis​

This Secure Boot certificate rotation is not an abstract cryptographic detail—it is an operationally significant change that affects the pre‑OS trust anchor for Windows Server installations. Microsoft and OEMs have publicly documented deployment paths and monitoring signals, and several independent vendors (OS vendors, hardware OEMs) have issued aligned guidance. The safest approach for administrators is to inventory, pilot, and then roll out certificate updates now—before certificates begin expiring in June 2026.
Key takeaways for admins:
  • Treat this as a mandatory maintenance item, not optional security theater.
  • Prioritize servers that are air‑gapped, have older firmware, or host critical cluster/DR roles.
  • Use the documented registry/GPO/WinCS/Intune paths for Windows Server rather than assuming the client‑focused CFR will take care of your servers.
  • Test restore and failover scenarios with updated images—restores are the biggest real‑world risk if trust chains mismatch.
  • Keep tight coordination with OEM support for firmware updates; document exceptions and compensating controls for unsupported hardware.
If you start the inventory and pilot this week you give your organization weeks, not days, to remediate, test, and close the loop. Delaying increases the chance of a degraded security posture and introduces measurable operational risk during disaster recovery and high‑availability events—risks that are entirely avoidable with timely, methodical action.

Source: Petri IT Knowledgebase Expired Secure Boot Certificates Put Windows Server at Risk
 

Microsoft has notified the Windows ecosystem of a far-reaching, time‑bound change: the Secure Boot certificates that Microsoft issued around 2011 will begin expiring in mid‑2026, and a coordinated replacement (the 2023 certificate family) is being delivered now to prevent a calendar‑driven degradation of boot‑time trust. ([support.microsoft.microsoft.com/en-us/topic/windows-secure-boot-certificate-expiration-and-ca-updates-7ff40d33-95dc-4c3c-8725-a9b95457578e)

Secure boot shield on a BIOS/UEFI chip amid firmware update and certificates.Background / Overview​

UEFI Secure Boot is a firmware‑level integrity gate that checks the digital signatures of the very first code a PC runs—bootloaders, shim binaries, option ROMs and other EFI applications—before the operating system loads. The mechanism depends on a small set of cryptographic authorities stored in firmware variables (KEK, DB and DBX). When those authorities (certificates) expire, the platform can still boot, but it loses the ability to accept new, signed pre‑boot updates and revocations that keep the early boot chain resilient against evolving threats.
Microsoft’s operational guidance makes the timeline explicit: several Microsoft certificates issued in 2011 expire beginning in June 2026, with a final production PCA certificate follow‑on in October 2026. To preserve continuity Microsoft created a replacement family of certificates (the “2023 CA” set) and is rolling those into eligible devices via Windows servicing and coordinated OEM firmware packages.
This is not hypothetical maintenance: if a device is left on the older 2011 anchors after expiration it will continue to boot, but it will not be able to receive new Secure Boot protections, DB/DBX revocation lists, or mitigations for newly discovered pre‑OS vulnerabilities—a progressive loss of early‑boot security posture that matters to corporate fleets, servers, Cloud PCs and many modern features that depend on trusted boot.

What Microsoft announced and the timeline​

Key dates and certificates​

  • June 2026 — Several Microsoft 2011 certificates (notably Microsoft Corporation KEK CA 2011 and Microsoft Corporation UEFI CA 2011) begin to expire; Microsoft warns that affected devices must have the 2023 certificates enrolled before that window to continue receiving new boot‑time protections.
  • October 2026 — A remaining production PCA certificate used to sign Windows Boot Manager and similar artifacts is set to expire; this final expiration completes the calendar‑driven transition.
Microsoft published consolidated guidance and a step‑by‑step rollout plan that explains where each expiring certificate lives (KEK or DB), what its purpose is, and which 2023 replacement certificate should be enrolled to preserve specific trust relationships. The company has also shipped the 2023 certificates in cumulative updates dating back to 2025 and is coordinating firmware updates with OEMs.

What the 2023 family is intended to do​

The replacement certificates do two things:
  • Replace aging cryptographic anchors so that future boot components and updates can be signed with contemporary keys.
  • Allow finer control over trust (for example, separating option ROM signing from third‑party bootloader signing to limit attack surface).

Who is affected​

Windows client and server versions​

Microsoft’s guidance lists a broad set of targets that will be eligible or require attention, including Windows 10 (including some LTSC/ESU SKUs), Windows 11 across supported branches, and several Windows Server releases. Specific KBs and dynamic updates call out the Secure Boot certificate expiration in their release notes.
Notably, Microsoft’s advisory covers systems running Windows 10 from version 1607 onward (this includes many corporate and industrial devices that still operate older Windows 10 builds), and some Windows 10 machines will only continue to receive the required certificate updates if they remain enrolled in Extended Security Updates (ESU) or are otherwise receiving Microsoft servicing.

Enterprise, managed, and special‑purpose devices​

  • Managed fleets: Enterprises that use Microsoft Update for Business, Intune, WSUS or other centralized patching will be expected to track device readiness and OEM firmware availability. Microsoft’s rollout uses telemetry and phased confidence gates—devices that show healthy update telemetry are more likely to be enrolled automatically. But Microsoft is clear that the update is an assist; customers remain responsible for fleet readiness and OEM firmware compatibility.
  • Air‑gapped or isolated devices: Systems without connectivity (or those that block diagnostic telemetry) will not be automatically updated and require manual intervention—firmware flashes or explicit certificate enrollment through vendor tools.
  • Cloud and virtualized environments: Cloud PC and Windows 365 images with Secure Boot enabled must be updated; Microsoft published targeted guidance for Windows 365 administrators because Cloud PCs and their custom images must carry the 2023 certificates before provisioning.

Linux and third‑party bootloaders​

The change is not Windows‑only in effect: many Linux distributions rely on the Microsoft UEFI CA (through shim) to enable Secure Boot on consumer hardware. Distributions and vendors (Red Hat, Canonical, community projects) must re‑sign or ship updated shims and ensure their packages are signed by certificates trusted by the updated DB/KEK. Red Hat and other vendors have explicit guidance and shim updates planned. If a Linux shim is re‑signed with the new keys, systems that don’t have the new certificates in firmware may fail to accept updates to the shim or other boot‑time components later.

How Microsoft and OEMs are delivering updates​

Windows servicing model and telemetry‑gated rollout​

Microsoft is using multiple delivery mechanisms:
  • Windows Update / Dynamic Setup Updates: The company has included the 2023 certificates in several cumulative updates and targeted Setup Dynamic Update packages (for example, KB5079271), which surface during OS setup or as part of normal servicing for in‑support client builds. Microsoft’s setup/dynamic updates explicitly call out Secure Boot certificate updates and the June 2026 expiration.
  • Controlled Feature Rollouts (CFR) and phased confidence gates: To minimize the risk of mass failures, certificate enrollment is staged—Microsoft targets devices that have shown healthy update telemetry and firmware readiness. Devices that do not share telemetry or are blocked by local policies may not be auto‑enrolled. Administrators must treat Microsoft’s automatic enrollment as a convenience, not a guarantee.
  • OEM firmware updates: Many systems require a firmware (BIOS/UEFI) component to accept and persist the new certificates. OEMs such as ASUS have published FAQs and posted firmware packages to ensure their devices can accept the new 2023 CA family. If firmware is too old or locked, manual firmware updates or vendor tools will be needed.

Why both OS and firmware matter​

Secure Boot trust anchors live in firmware variables. Windows can write new certificates into UEFI variables on many modern systems, but that capability depends on firmware behavior, secure update support and the presence of appropriate management interfaces. If firmware refuses to persist new DB/KEK entries (for instance because it lacks the necessary OEM hooks), the Windows‑side update cannot complete the migration—and the device remains on the expiring 2011 anchors. This is why Microsoft urges administrators to apply available OEM firmware updates before certificate enrollment.

Risks and potential operational impacts​

What an expired certificate actually means in practice​

  • Devices that still carry 2011 certificates will continue to boot, but they will no longer be eligible to receive new Secure Boot signature updates, new DB/DBX revocations, or enhanced Windows Boot Manager mitigations. Over time this reduces the system’s ability to defend against newly discovered boot‑level attacks and to accept legitimate updates to pre‑OS components.
  • Dependent features may be affected. Microsoft notes that some scenarios—including BitLocker hardening, certain anti‑cheat and DRM protections, or third‑party security agents that validate Secure Boot state—could behave differently or lose protections if the Secure Boot anchors are stale. The degree of impact depends on local configuration and additional layers of security; enterprise‑managed systems with more restrictive policies may see stricter outcomes.
  • The worst‑case operational impact is not an immediate mass‑bricking event, but an erosion of serviceability and security that increases risk over time and complicates the ability to remediate firmware‑level vulnerabilities.

Real‑world examples and vendor confirmations​

Hardware vendors (for instance ASUS) and distribution maintainers (for Linux) have already advised customers and posted firmware or shim updates to avoid compatibility problems once new keys are in use. Red Hat and others are explicit: existing, signed binaries will continue to run after June 2026, but future updates to shim or other signed boot components will require the new signing certificates to be present on hardware.

Practical, prioritized checklist for home users and IT teams​

Below are actionable steps to avoid surprises and keep devices in a supported, secure state.
  • Inventory and measure readiness
  • Identify devices with Secure Boot enabled and record firmware versions and update channels.
  • Use built‑in tools to confirm current certificate state: run msinfo32 to check Secure Boot status and use PowerShell commands like Confirm‑SecureBootUEFI and Get‑SecureBootPolicy to inspect enrolled certificates.
  • Confirm update paths
  • For managed fleets, ensure devices are eligible for Microsoft’s phased updates (they are sharing diagnostic telemetry and not blocked by local firewall rules).
  • If you rely on Windows Update automation, verify that the devices have successfully received recent cumulative updates that include the 2023 certificates. Microsoft’s Dynamic Update KBs enumerate the packages.
  • Apply OEM firmware updates before certificate enrollment
  • Check OEM support pages for BIOS/UEFI updates that enable or fix Secure Boot certificate enrollment. If OEM firmware is unavailable or devices are end‑of‑life, plan remediation (hardware refresh, vendor assistance, or controlled risk acceptance).
  • Prepare recovery and test images
  • Update recovery media and test bootflows with the 2023 certificates in a lab environment. If you run dual‑boot or custom bootloaders, validate the full build chain now; avoid a last‑minute discovery that a custom shim or third‑party driver will not be accepted after the certificate rollover.
  • For Windows 10 systems beyond mainstream support
  • If you are on Windows 10 and cannot migrate immediately, ensure ESU enrollment or that you have a vendor‑supported LTSC SKU in place—otherwise Windows Update may not deliver the certificate updates after end‑of‑support dates. Microsoft’s guidance specifically points to ESU for organisations that remain on Windows 10.
  • For air‑gapped and special‑purpose devices
  • Produce signed update packages and vendor firmware images to manually enroll the 2023 certificates. This requires vendor cooperation and careful testing.
  • Update images for Cloud and virtualization services
  • If you manage Cloud PCs, Windows 365 images or virtual appliances that rely on Secure Boot, follow Microsoft’s Windows 365 guidance to ensure images are updated and reprovisioning does not inherit stale certificate sets.

Technical checks and commands you should know​

  • msinfo32 — quick status of Secure Boot in the System Summary page (shows whether Secure Boot is On/Off).
  • Confirm‑SecureBootUEFI (PowerShell) — returns a simple confirmation whether Secure Boot is enabled and functional.
  • Get‑SecureBootPolicy (PowerShell) — exposes the enrolled policy and can help you inspect which certificate versions the firmware currently trusts.
  • Check installed update KBs — look for cumulative updates and targeted Dynamic Update packages (for example, KB5079271 was used for Windows 11 Setup Dynamic Update in Feb 2026 and explicitly mentions Secure Boot certificate updates).

Where this change could trip you up (pitfalls and edge cases)​

  • Assuming “it still boots” means you are safe — this is the most common trap. Devices that boot after June 2026 but still carry 2011 anchors will not get future protections for boot code; that’s a slow‑burn security risk, not a sudden failure.
  • Relying on automatic enrollment without validating firmware support — automatic updates are staged and conditional; firmware that does not have required hooks may prevent enrollment. Test and verify.
  • Ignoring Linux and third‑party signing chains — distributions that use shim must be re‑signed or provide updates compatible with the 2023 CA family; workstation and server teams that dual‑boot must coordinate OS vendor updates with firmware enrollment.
  • Custom images and Golden Master images — if you deploy clones or images (for VDI, Cloud PC, or hardware provisioning), ensure those images were created after a certificate enrollment so they don’t bake in stale trust assumptions. Microsoft and Windows 365 guidance calls this out explicitly.

Vendor and distribution reaction: what OEMs and Linux maintainers are doing​

Major OEMs are coordinating firmware packages and publishing FAQs that echo Microsoft’s timeline, urging customers to apply firmware updates before certificate enrollment begins in earnest. ASUS and others have already posted guidance and firmware updates targeted at the Secure Boot certificate transition.
Linux vendors are updating shim packages and planning re‑signing workflows. Red Hat, for example, has published clear steps for RHEL environments and timing around when their shims will be published and signed with the new certificates—an important detail for enterprises that run mixed OS fleets.
These coordinated vendor actions are evidence that this is an ecosystem problem, not just a Windows update: firmware, OS vendors, distribution maintainers and enterprise provisioning systems must all cooperate to avoid blind spots.

Critical analysis: strengths, gaps and risk calculus​

Strengths of Microsoft’s approach​

  • Proactive timeline and public guidance — Microsoft published detailed guidance and phased rollout behavior months ahead of the first expirations, giving administr for planning. Microsoft also surfaced the necessary KB and Setup Dynamic Update packages and emphasized OEM coordination.
  • Phased, telemetry‑gated enrollment — the confidence‑based approach reduces blast radius, allowing Microsoft to enroll devices that show healthy update telemetry first and observe for compatibility issues. That reduces risk for widely diverse hardware.
  • Ecosystem engagement — OEMs and Linux vendors are actively working on firmware and shim updates; the coordination lowers the chance of broad incompatibility.

Gaps and operational risks​

  • Dependency on firmware readiness — the Windows‑side update can do only so much: if firmware is old, locked, or simply incompatible, administrators will face manual firmware work or OEM support tickets. For large, heterogenous fleets this is non‑trivial.
  • Complexity for long‑lived and air‑gapped systems — industrial controllers, medical devices, ATMs and other long‑life systems often run older firmware and are disconnected for security reasons; these systems will be particularly expensive to remediate. The cost of replacing or re‑imaging a certified medical device or an embedded controller can be orders of magnitude higher than typical desktop servicing.
  • Operational confusion across OS boundaries — mixed OS shops, dual‑boot users and third‑party boot‑time agents may see inconsistent behavior if only a subset of images or devices are updated. Proper testing and a clear inventory are mandatory.

Mitigation priorities​

  • Prioritize firmware updates and test images in a lab that mirrors production.
  • Treat automatic Windows Update enrollment as a supplement—document and validate every step.
  • For devices that cannot be updated, prepare a mitigation plan (network isolation, compensating controls, or hardware replacement budget).

Quick reference table (what to do now)​

  • If you are a home user with a modern PC: confirm Secure Boot is enabled and allow Windows Update to install recent cumulative updates; check msinfo32 and the Windows Update history to verify recent firmware and setup dynamic updates.
  • If you manage an enterprise fleet: run an inventory for Secure Boot enabled devices, confirm firmware versions, coordinate OEM updates, schedule lab validation for Golden Images, and use Microsoft’s published checklists and playbooks for servers and managed endpoints.
  • If you run Linux or dual‑boot: check your distribution’s shim plan and ensure updated shim packages are available and tested on target devices. Red Hat and other vendors have published distribution‑specific guidance.
  • If you operate air‑gapped systems or legacy appliances: contact hardware vendors to plan manual enrollment or replacement. Document devices that cannot be updated and apply alternative controls.

Final assessment and recommended timeline​

This transition is manageable for most modern consumer devices if owners and IT teams act now: apply OEM firmware updates, allow Microsoft’s phased certificate enrollment to proceed, and validate images and recovery media. For complex fleets and long‑lived devices, start remediation planning immediately—inventory, firmware tests, and a clear fallback plan should be in place well before June 2026. Microsoft’s own dynamic updates and KB notices (such as the Setup Dynamic Update KB5079271) explicitly tie the remediation window to those dates and must be treated as operational deadlines.
Microsoft and partner guidance together provide a clear path forward, but execution will be the heavy lift. Treat this as a platform‑level maintenance event, not a routine patch: poor planning now will create risk and complicated remediation later. For administrators and enthusiasts alike, the immediate questions are simple and actionable—inventory, firmware, test, enroll—and must be completed ahead of the June 2026 deadline to preserve full Secure Boot protections.

Microsoft’s advance warning and the cross‑vendor coordination are salutary; the real test will be whether organizations with heterogeneous hardware, long upgrade cycles, and air‑gapped deployment models can complete the work before the calendar forces serviceability constraints. The technical reality is straightforward: the certificates sign the very code that secures boot, and cryptographic anchors that lapse without replacement leave a platform less able to adapt to future threats. The clock is ticking—plan, test, apply, and verify.

Source: avandatimes.com Microsoft to Deprecate 2011 Secure Boot Certificates for Windows Systems Starting June 2026 - AvandaTimes
 

Back
Top