Applies To
Windows 10 Windows 10, version 1607, all editions Win 10 Ent LTSC 2019 Win 10 IoT Ent LTSC 2019 Windows 10 IoT Core LTSC Windows 10 Enterprise LTSC 2021 Windows 10 IoT Enterprise LTSC 2021 Windows 10, version 22H2, all editions Windows 11 Home and Pro, version 21H2 Windows 11 Enterprise Multi-Session, version 21H2 Windows 11 Enterprise and Education, version 21H2 Windows 11 IoT Enterprise, version 21H2 Windows 11 Home and Pro, version 22H2 Windows 11 Enterprise Multi-Session, version 22H2 Windows 11 Enterprise and Education, version 22H2 Windows 11 IoT Enterprise, version 22H2 Windows 11 SE, version 23H2 Windows 11 Home and Pro, version 23H2 Windows 11 Enterprise and Education, version 23H2 Windows 11 Enterprise Multi-Session, version 23H2 Windows 11 SE, version 24H2 Windows 11 Enterprise and Education, version 24H2 Windows 11 Enterprise Multi-Session, version 24H2 Windows 11 Home and Pro, version 24H2 Windows 11 IoT Enterprise, version 24H2 Windows Server 2012 ESU Windows Server 2012 R2 ESU Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows Server 2025

Original publish date: June 26, 2025

KB ID: 5062713

This article has guidance for:

  • Organizations that have their own IT department managing Windows devices and updates.

Note If you are an individual who owns a personal Windows device, please go to the article Windows devices for home users, businesses, and schools with Microsoft-managed updates.

Overview

The configuration of certificates provided by Microsoft as part of the Secure Boot infrastructure has remained the same since Windows 8. These certificates are stored in the Signature Database (DB) and Key Enrollment Key (KEK) (also known as Key Exchange Key) variables in the firmware. Microsoft has provided the same three certificates across the original equipment manufacturer (OEM) ecosystem to include in the device's firmware. These certificates support Secure Boot in Windows and are also used by third-party operating systems (OS), which include the following Microsoft-provided certificates​​​​​​​:

  • Microsoft Corporation KEK CA 2011

  • Microsoft Windows Production PCA 2011

  • Microsoft Corporation UEFI CA 2011

Important All three Microsoft-provided certificates are set to expire beginning in June 2026. So, in collaboration with our ecosystem partners, Microsoft is rolling out new certificates that will help ensure Secure Boot security and continuity for the future. Once these 2011 certificates expire, security updates for boot components will no longer be possible, compromising boot security and putting affected Windows devices at risk. To maintain Secure Boot functionality, all Windows devices must be updated to use the 2023 certificates before the 2011 certificates expire.

Note This article refers to “certificates” and “CA” (Certificate Authority) interchangeably. ​​​​​​

Windows Secure Boot certificates expiring in 2026

Windows devices manufactured since 2012 may have expiring versions of certificates which must be updated.

Terminology

  • KEK: Key Enrollment Key

  • CA: Certificate Authority

  • DB: Secure Boot Signature Database

  • DBX: Secure Boot Revoked Signature Database

Expiring Certificate

Expiration date

New Certificate

Storing location

Purpose

Microsoft Corporation KEK CA 2011

June 2026

Microsoft Corporation KEK CA 2023

Stored in KEK

Signs updates to DB and DBX.

Microsoft Windows Production PCA 2011

Oct 2026

Windows UEFI CA 2023

Stored in DB

Used for signing the   Windows boot loader.

Microsoft UEFI CA 2011*

June 2026

Microsoft UEFI CA 2023

Stored in DB

Signs third-party boot loaders and EFI applications.

Microsoft UEFI CA 2011*

June 2026

Microsoft Option ROM CA 2023

Stored in DB

Signs third-party option ROMs

*During renewal of the Microsoft Corporation UEFI CA 2011 certificate, two certificates separate boot loader signing from option ROM signing. This allows finer control over system trust. For example, systems that need to trust option ROMs can add the Microsoft Option ROM UEFI CA 2023 without adding trust for third-party boot loaders.

Microsoft has issued updated certificates to ensure continuity of Secure Boot protection on Windows devices. Microsoft will manage the update process for these new certificates on a significant portion of Windows devices and will offer detailed guidance for organizations that manages their own device’s updates.​​​​​​​​​​​​​​

Scope for Enterprise and IT professional managed systems 

This article is targeted at organizations that do not share diagnostic data with Microsoft and have dedicated IT professionals who manage updates to their environment. Currently, there is insufficient information for Microsoft to fully support rolling out the Secure Boot certificates on these devices, especially those with diagnostic data disabled. 

Enterprises and IT professionals have the choice to get such systems to be Microsoft-managed systems, in which case Microsoft updates the Secure Boot certificates. However, we realize that this is not a feasible option for a variety of devices such as air-gapped devices in government, manufacturing, and so forth. 

Please see the following section for the options in this category.

What solutions can Enterprise or IT professional managed devices expect?

Option 1: Automated updates (Only for Microsoft Update managed systems) 

By choosing this option, your devices will automatically receive the latest Secure Boot updates, helping keep your devices safe and secure. To enable this, you will need to participate in and allow Microsoft to collect Universal Telemetry Client (UTC) diagnostic data from your devices. This step ensures your devices are enrolled in the Microsoft managed program and will receive all updates seamlessly as part of our standard rollout. 

Rollout Strategy 

For Windows devices that rely on Microsoft to apply the Secure Boot certificate updates to their device's, we utilize a very meticulous rollout strategy. We group systems with similar hardware and firmware profiles (based on Windows diagnostic data and OEM feedback), then gradually release updates to each group. Throughout this process, we closely monitor diagnostic feedback to ensure that everything runs smoothly. If any issues are detected in a group, we pause and address them before resuming rollout to that group. 

Call to action

To be included in the Microsoft managed deployment, we suggest enabling Windows diagnostic data. With this, we can identify and target eligible devices for Secure Boot certificate updates.

Why does diagnostic data matter?

The Microsoft managed rollout strategy relies heavily on the diagnostic data we receive from the systems as we have included data signals that inform us of the state of the devices in reaction to installing the new Secure Boot certificates. This way, we can quickly identify issues in our rollout and proactively pause rollout to devices with similar hardware configurations to minimize the impact of the issue. 

Enabling diagnostic data ensures your devices are visible. It will move your devices into the Microsoft managed stream for automated targeting and delivery of these updates. 

Notes

  • Organizations that prefer not to enable diagnostic data will remain in full control and will receive future tools and guidance to manage the update process independently.

  • For the solutions highlighted here, you have the ultimate responsibility to monitor the progress of the updates to all devices in your environment and may have to use more than one solution to achieve full adoption. ​​​​​

To participate in the Microsoft managed rollout, please follow these steps:

  1. Follow the Configure Windows diagnostic data in your organization and set the data setting to allow required diagnostic data. In other words, do not set to Disabled and do not set turn off diagnostic data. Any setting that provides more than required diagnostic data will also work.Enable Diagnostic Data

  2. Choose to participate in Microsoft managed updates for Secure Boot by setting the following registry key:

    Registry location

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot

    Key name

    MicrosoftUpdateManagedOptIn

    Key type

    DWORD

    DWORD value

    • 0 or key does not exist

    • 0x5944 – Secure Boot opt-in

    Comments

    We recommend setting this key to 0x5944 to indicate that all certificates should be updated in a manner that preserves the security profile of the existing device and updates the boot manager to the one signed by the Windows UEFI CA 2023 certificate.

    Note This registry key will be enabled in a future update.

Note Support for the Microsoft managed rollout is only available for Windows 11 and Windows 10 client versions. After October 14, 2025, Windows 10, version 22H2 with extended security updates (ESU) will be included.

Option 2: Customer-Managed Self-service or partially automated solutions

​​​​​​​Microsoft is evaluating guidance for partially automated solutions to assist enterprise and IT professional managed systems. Please note that these are self-service options that an enterprise or IT professionals can choose to apply as per their specific situation and usage model.

As Microsoft has limited visibility (or diagnostic data) for Enterprise and IT professional managed devices overall, the assists available from Microsoft are limited. The implementation is left to customers and their partners such as Independent Software Vendors (ISVs), Microsoft Active Protection Partners (MAPP), other Cryptographic Scanners and Security partners and OEMs.

Important: 

  • Applying Secure Boot Certificate updates can cause Boot failures, Bit locker Recovery, or even bricked devices in certain cases. 

  • This awareness is needed especially for old systems which may be out of OEM Support. For example: Running into Firmware issues/bugs that are not fixed by OEM will need to be replaced or Secure Boot turned Off leading to the device no longer receiving security updates after Secure Boot certificate expiry starting June 2026. 

Recommended methodology

  1. Check with OEM for your device on any Secure Boot related updates or guidances. For example: Some OEMs are publishing the minimum firmware/BIOS versions that support the updated 2023 Secure Boot Certificates. Follow OEM recommendation and apply any updates

  2. Get a list of devices that have Secure Boot turned ON. No action is needed for devices with Secure Boot turned OFF.

  3. Classify your Enterprise devices which do not share diagnostic data with Microsoft by:

    • OEMModelBaseBoard  

    • FirmwareMfg  

    • FirmwareVersion  

    • OEMName  

    • OSArch  

    • OEMSubModel  

    • OEMModel  

    • BaseBoardMfg  

    • FirmwareManufacturer  

    • OEMModelSystemFamily  

    • OEMBaseBoardManufacturer  

    • OEM  

    • BaseBoardManufacturer

  4. For each Unique category in Step 3, Validate Secure Boot Key update rollout (one of the steps further below) on a “few” devices [“few” would be a decision based on each customer. We recommend 4-10 devices at least]. After successful validation, the devices can be marked as GREEN/SAFE buckets for rollout at scale to other similar devices under Enterprise/IT management 

  5. Customer can choose one of the following methods or a combination to apply updated Certificates. 

How can I tell if the new CAs are in the UEFI DB?

  1. Download and install the UEFIv2​​​​​​​ PowerShell module.

  2. Run the following commands in an elevated PowerShell window:

    Set-ExecutionPolicy -ExecutionPolicy RemoteSigned  

    Import-Module UEFIv2  

    Run (Get-UEFISecureBootCerts DB).signature

  3. Look for the thumbprint or Subject CN.

Methods to apply Secure Boot Certificate on SAFE devices

As noted previously in the "Recommended methodology" section, the Secure Boot Certificate updates should be applied only to SAFE/GREEN bucket devices after adequate testing/validation on a handful of devices.

Description of the following methods.

Method 1: Registry key-based Secure Boot key rolling updates. This method provices a way to test how Windows responds after the 2023 DB updates have been applied to a device,

Method 2: Group Policy Object (GPO) for Secure Boot Key. This method provides an easy-to-use Group Policy setting that domain administrators can enable to deploy the Secure Boot updates across domain-joined Windows clients and servers. 

Method 3: Secure Boot API/CLI Interface using Windows Configuration System (WinCS). This may be used to enable SecureBoot keys.

Method 4: To manually apply the Secure Boot DB updates, see the Manual DB/KEK update steps section.

This method provides a way to test how Windows responds after the 2023 DB updates have been applied to a device,

CA Reg key values

Registry location

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot\AvailableUpdates ​

Certificate values

#define SERVICING_UPDATE_KEK                 0x0004      ​ 

#define SERVICING_UPDATE_DB_2024             0x0040 ​ 

#define SERVICING_UPDATE_INVOKE_BFSVC_AI     0x0100 ​ 

#define SERVICING_UPDATE_3P_OROM_DB          0x0800 ​ 

#define SERVICING_UPDATE_3P_UEFI_DB          0x1000

#define CHECK_3P2011_BEFORE_3POROM_UEFICA    0x4000 

Test steps

Run each of the following commands separately from an elevated PowerShell prompt:

reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f​ 

Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"​ 

You can find the results by observing the event logs as described in Secure Boot DB and DBX variable update events.

Notes

  • Restarts are sometimes required during this process.

  • SERVICING_UPDATE_INVOKE_BFSVC_AI updates the boot manager to the 2023 signed version, which changes the boot manager on the EFI partition.

More details about the registry key-based Secure Boot updates

The policy logic is built around three registry values stored in the following secure boot servicing registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing

Note All the following registry subkeys are used to trigger the update and to record the update status.

Registry value

Type

Description & usage

AvailableUpdates

REG_DWORD (bitmask)

Update trigger flags. Controls which Secure Boot update actions to perform on the device. Setting the appropriate bitfield here initiates the deployment of new secure boot certificates and related updates. For enterprise deployment, this should be set to 0x5944 (hex) – a value that enables all relevant updates (adding the new 2023 Microsoft UEFI CA keys, updating the KEK, and installing the new boot manager) for all customers.  (This value effectively opts the device into the Secure Boot “key roll” deployment. When non-zero (i.e. 0x5944), the system’s scheduled task will apply the specified updates; if zero or not set, no Secure Boot key update is performed.) 

Note: As the bits are processed, they are cleared. Managing this with Group Policy and a CSP will need to account for this. 

UEFICA2023Status

REG_SZ (string)

Deployment status indicator. Reflects the current state of the Secure Boot key update on the device. It will be set to one of three text values: “NotStarted”, “InProgress”, or “Updated”, indicating that the update has not yet run, is actively in progress, or has completed successfully.    Initially the status is “NotStarted”. It changes to “InProgress” once the update begins, and finally to “Updated” when all new keys and the new boot manager have been deployed.)

UEFICA2023Error

REG_DWORD (code)

Error code (if any). This value remains 0 on success. If the update process encounters a fault, UEFICA2023Error is set to a non-zero error code corresponding to the first error encountered. An error here implies the Secure Boot update did not fully succeed and may require investigation or remediation on that device.   (For example, if updating the DB (database of trusted signatures) failed due to a firmware issue, this registry might show an error code that can be mapped to an event log or documented error ID for Secure Boot servicing.)

HighConfidenceOptOut

REG_DWORD

For enterprises that want to opt out of high confidence buckets that will automatically be applied as part of the LCU. They can set this key to a non-zero value to opt-out of the high confidence buckets.

MicrosoftUpdateManagedOptIn

REG_DWORD

For enterprises that want to opt-in to CFR servicing (Microsoft Managed). In addition to setting this key, customers will need to allow the sending of “Optional Diagnostic Data”.

How these keys work together

The IT admin (via GPO or CSP) configures AvailableUpdates = 0x5944, which signals Windows to execute the Secure Boot key roll process on the device. As the process runs, the system updates UEFICA2023Status from "NotStarted" to "InProgress", and finally to "Updated" upon success. As each bit in 0x5944 is processed successfully, it is cleared. If any step fails, an error code is recorded in UEFICA2023Error (and the status may remain "InProgress" or a partially updated state). This mechanism gives administrators a clear way to trigger and track the rollout per device.

Note: These registry values are introduced specifically for this feature (they do not exist on older systems until the supporting update is installed). The names UEFICA2023Status and UEFICA2023Error were defined in the design to capture the status of adding the “Windows UEFI CA 2023” certificates. They appear in the above registry path once the system is updated to a build that supports Secure Boot key rolling. 

Affected platforms

Secure Boot is supported in Windows starting with the Windows Server 2012 code base and Group Policy support exists in all versions of Windows that support Secure Boot. Therefore, Group Policy support will be provided on all supported versions of Windows that supports Secure Boot. 

This table further breaks down the support based on registry key.

Key

Windows versions supported

AvailableUpdates/AvailableUpdatesPolicy, UEFICA2023Status, UEFICA2023Error 

All versions of Windows that support Secure Boot (Windows Server 2012 and later Windows versions).

HighConfidenceOptOut

All versions of Windows that support Secure Boot (Windows Server 2012 and later Windows versions).

Note: While the confidence data is gathered on Windows 10, versions 21H2 and 22H2 and later versions of Windows, it can be applied to devices running on earlier versions of Windows.  

MicrosoftUpdateManagedOptIn

Windows 10, versions 21H2 and 22H2

Windows 11, versions 22H2 and 23H2

Windows 11, version 24H2 and Windows Server 2025

Our SBAI/TpmTasks implements a new routine to ingest the schema and make the determination of a Device’s bucket ID. It also needs to emit events to represent a Device’s bucket id on every boot session.  

These new events will require that the Device Bucket Confidence data is present on the system. The data will be included with the cumulative updates and will be available online for up-to-date downloads. 

Secure Boot error events

Error events have a critical reporting function to inform about Secure Boot Status and progress.  For information about the error events, see Secure Boot DB and DBX variable update events. The error events are being updated with additional event for Secure Boot.

Error events

Secure Boot will emit events on each boot. The events emitted will depend on the state of the system.  

Machine Metadata Event

Error events will include machine metadata such as architecture, firmware version, etc. to give customers details on the device. This metadata will give IT administrators data to help them understand which devices have expiring certificates and the characteristics of their devices.  

This event will be emitted on all devices that do not have the necessary updated certificates. The necessary certificates are:

  • the PCA2023

  • the third-party UEFI CA and third-party Option ROM CA if the third-party 2011 CA is present

  • the KEK.

The standard attributes for the generic bucket are: 

  • OEMName_Uncleaned

  • OEMModel

  • OEMSubModel

  • OEMModelSystemFamily

  • OEMModelBaseBoard

  • BaseBoardManufacturer

  • FirmwareManufacturer

  • FirmwareVersion

Event ID: 1801

Event log

System

Event source

TPM-WMI

Event ID

1801

Level

Error

Event message text

Secure Boot CA/keys need to be updated. This device’s signature information is included here. <Include standard attributes – the ones we use when an OEM has not defined>

BucketIid+ Confidence Rating Event

This event will be emitted in conjunction with the Machine Meta Data event when the device doesn’t have the necessary updated certificates as described above. Each error event will include a BucketId and a confidence rating. The confidence rating can be one of the following.

Confidence

Description

High Confidence (Green) 

High confidence that all necessary certificates can be deployed successfully.

Needs More Data (Yellow) 

In the bucket list but not enough data. May have high confidence in some certificates deploying and less confidence in other certificates.

Unknown (Purple) 

Not in bucket list - never seen

Paused (Red)

Some certificates may be deployed with high confidence, but an issue has been detected that requires follow-up by Microsoft or the device manufacturer. This category can include Skipped, Known Issues, and Investigating.

If there isn’t a bucket id for the device, then the event should indicate “Unknown” as the state and not include a device signature. 

Event ID: 1802

Event log

System

Event source

TPM-WMI

Event ID

1802

Level

Error

Event message text

Secure Boot CA/keys need to be updated. This device signature information is included here.%nDeviceAttributes: %1%nBucketId: %2%nBucketConfidenceLevel: %3%nHResult: %4  

Device signature: b1a7c2e5f6d8a9c0e3f2b4a1c7e8d9f0b2a3c4e5f6d7a8b9c0e1f2a3b4c5d6e7, Confidence Value: Currently Needs More Data (or Unknown, High Confidence, Paused)  

See https://aka.ms/GetSecureBoot for details  

Information events

Machine Up to Date Event

An information event will indicate that the machine is up to date, and no action is needed.

Event ID: 1803

Event log

System

Event source

TPM-WMI

Event ID

1803

Level

Information

Event message text

This device has updated Secure Boot CA/keys. %nDeviceAttributes: %1%nBucketId: %2%nBucketConfidenceLevel: %3%nHResult: %4

Warning events

Secure Boot Defaults Need Updating Event

Warning event that will indicate that the device’s firmware Secure Boot default settings are not up to date. This occurs when the device is booting from a PCA2023 signed boot manager and the DBDefaults in the firmware do not include the PCA2023 certificate. 

Event ID: 1804

Event log

System

Event source

TPM-WMI

Event ID

1804

Level

Warning

Error message text

This device has been updated to the Windows boot manager signed by the “Windows UEFI CA 2023”, but the Secure Boot DBDefaults in the firmware do not include the “Windows UEFI CA 2023” certificate. Resetting the Secure Boot settings in the firmware to the defaults might prevent the device from booting.  

See https://aka.ms/GetSecureBoot for details.  

Additional Component Changes for Secure Boot

TPMTasks changes

Modify TPMTasks to determine if the state of the device either has the updated Secure Boot Certificates or does not. Currently it can make that determination but only if our CFR selects a machine for update. We want that determination and subsequent logging to happen in every boot session regardless of the CFR. If the Secure Boot Certificates are not fully up to date, then emit the two error events described above and if the Certificates are up to date, then emit the Information event. The Secure Boot Certificates that will be checked are: 

  • Windows UEFI CA 2023

  • Microsoft UEFI CA 2023 and Microsoft Option ROM CA 2023 – if the Microsoft UEFI CA 2011 is present, then these two CA must be present. If the Microsoft UEFI CA 2011 is not present, then no check is necessary.

  • Microsoft Corporation KEK CA 2023

Machine Metadata Event

This event will gather the machine meta-data and issue an event.  

  • BucketId + Confidence Rating Event  

This event will use the meta-data of the machine to find the corresponding entry in the database of machines (bucket entry) and will format and emit an event with this data along with any confidence information regarding the bucket. ​​​​​​​

High Confident Device Assist 

For devices in high confidence buckets, the Secure Boot certificates and 2023 signed boot manager will automatically be applied.  

The update will be triggered at the same time as the two error events are generated, and the BucketId + Confidence Rating event includes a high-confidence rating.  

For customers that want to opt-out, a new registry key will be available as follows:  

Registry location

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot

Key name

HighConfidenceOptOut

Key type

DWORD

DWORD value

0 or key does not exist – High-confidence assist enabled.   

1 – High-confidence assist is disabled  

Anything else – Undefined  

Manual DB/KEK update steps

For instructions on how to manually apply the Secure Boot DB updates, see Updating Microsoft Secure Boot keys.  Additionally, for details on Microsoft recommended Secure Boot object configuration, see Microsoft Secure Boot objects GitHub Repo as it is the official spot for all Secure Boot object content. 

Change date

Change description

September 2025

  • Added options and methods for Microsoft-managed and customer-managed solutions.

July 8, 2025

  • Replaced the QR code and survey link with new ones.

July 2, 2025

  • Corrected the DWORD value descriptions in the registry key information in Step 2 in the "Option 1: Fully automated (only for Microsoft managed devices)" section. Original text:

    0 or key does not exist – Windows diagnostic data disabled.

    0x5944 – Windows diagnostic data is enabled Corrected text:

    0 or key does not exist

    0x5944 – Secure Boot Opt-In

  • Added a note in the Comments of the registry key information in Step 2 in the "Option 1: Fully automated (only for Microsoft managed devices)" section. Note added:Note This registry key will be enabled in a future update.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.