Windows devices with IT-managed updates
Applies To
Original publish date: June 26, 2025
KB ID: 5062713
This article has guidance for:
Note If you are an individual who owns a personal Windows device, please go to the article Windows devices for home users, businesses, and schools with Microsoft-managed updates. |
Overview
The configuration of certificates provided by Microsoft as part of the Secure Boot infrastructure has remained the same since Windows 8. These certificates are stored in the Signature Database (DB) and Key Enrollment Key (KEK) (also known as Key Exchange Key) variables in the firmware. Microsoft has provided the same three certificates across the original equipment manufacturer (OEM) ecosystem to include in the device's firmware. These certificates support Secure Boot in Windows and are also used by third-party operating systems (OS), which include the following Microsoft-provided certificates:
-
Microsoft Corporation KEK CA 2011
-
Microsoft Windows Production PCA 2011
-
Microsoft Corporation UEFI CA 2011
Important All three Microsoft-provided certificates are set to expire beginning in June 2026. So, in collaboration with our ecosystem partners, Microsoft is rolling out new certificates that will help ensure Secure Boot security and continuity for the future. Once these 2011 certificates expire, security updates for boot components will no longer be possible, compromising boot security and putting affected Windows devices at risk. To maintain Secure Boot functionality, all Windows devices must be updated to use the 2023 certificates before the 2011 certificates expire.
Note This article refers to “certificates” and “CA” (Certificate Authority) interchangeably.
Windows Secure Boot certificates expiring in 2026
Windows devices manufactured since 2012 may have expiring versions of certificates which must be updated.
Terminology
-
KEK: Key Enrollment Key
-
CA: Certificate Authority
-
DB: Secure Boot Signature Database
-
DBX: Secure Boot Revoked Signature Database
Expiring Certificate |
Expiration date |
New Certificate |
Storing location |
Purpose |
Microsoft Corporation KEK CA 2011 |
June 2026 |
Microsoft Corporation KEK CA 2023 |
Stored in KEK |
Signs updates to DB and DBX. |
Microsoft Windows Production PCA 2011 |
Oct 2026 |
Windows UEFI CA 2023 |
Stored in DB |
Used for signing the Windows boot loader. |
Microsoft UEFI CA 2011* |
June 2026 |
Microsoft UEFI CA 2023 |
Stored in DB |
Signs third-party boot loaders and EFI applications. |
Microsoft UEFI CA 2011* |
June 2026 |
Microsoft Option ROM CA 2023 |
Stored in DB |
Signs third-party option ROMs |
*During renewal of the Microsoft Corporation UEFI CA 2011 certificate, two certificates separate boot loader signing from option ROM signing. This allows finer control over system trust. For example, systems that need to trust option ROMs can add the Microsoft Option ROM UEFI CA 2023 without adding trust for third-party boot loaders.
Microsoft has issued updated certificates to ensure continuity of Secure Boot protection on Windows devices. Microsoft will manage the update process for these new certificates on a significant portion of Windows devices and will offer detailed guidance for organizations that manages their own device’s updates.
Scope for Enterprise and IT professional managed systems
This article is targeted at organizations that do not share diagnostic data with Microsoft and have dedicated IT professionals who manage updates to their environment. Currently, there is insufficient information for Microsoft to fully support rolling out the Secure Boot certificates on these devices, especially those with diagnostic data disabled.
Enterprises and IT professionals have the choice to get such systems to be Microsoft-managed systems, in which case Microsoft updates the Secure Boot certificates. However, we realize that this is not a feasible option for a variety of devices such as air-gapped devices in government, manufacturing, and so forth.
Please see the following section for the options in this category.
What solutions can Enterprise or IT professional managed devices expect?
Option 1: Automated updates (Only for Microsoft Update managed systems)
By choosing this option, your devices will automatically receive the latest Secure Boot updates, helping keep your devices safe and secure. To enable this, you will need to participate in and allow Microsoft to collect Universal Telemetry Client (UTC) diagnostic data from your devices. This step ensures your devices are enrolled in the Microsoft managed program and will receive all updates seamlessly as part of our standard rollout.
Rollout Strategy
For Windows devices that rely on Microsoft to apply the Secure Boot certificate updates to their device's, we utilize a very meticulous rollout strategy. We group systems with similar hardware and firmware profiles (based on Windows diagnostic data and OEM feedback), then gradually release updates to each group. Throughout this process, we closely monitor diagnostic feedback to ensure that everything runs smoothly. If any issues are detected in a group, we pause and address them before resuming rollout to that group.
Call to action
To be included in the Microsoft managed deployment, we suggest enabling Windows diagnostic data. With this, we can identify and target eligible devices for Secure Boot certificate updates.
Why does diagnostic data matter?
The Microsoft managed rollout strategy relies heavily on the diagnostic data we receive from the systems as we have included data signals that inform us of the state of the devices in reaction to installing the new Secure Boot certificates. This way, we can quickly identify issues in our rollout and proactively pause rollout to devices with similar hardware configurations to minimize the impact of the issue.
Enabling diagnostic data ensures your devices are visible. It will move your devices into the Microsoft managed stream for automated targeting and delivery of these updates.
Notes
-
Organizations that prefer not to enable diagnostic data will remain in full control and will receive future tools and guidance to manage the update process independently.
-
For the solutions highlighted here, you have the ultimate responsibility to monitor the progress of the updates to all devices in your environment and may have to use more than one solution to achieve full adoption.
To participate in the Microsoft managed rollout, please follow these steps:
-
Follow the Configure Windows diagnostic data in your organization and set the data setting to allow required diagnostic data. In other words, do not set to Disabled and do not set turn off diagnostic data. Any setting that provides more than required diagnostic data will also work.
-
Choose to participate in Microsoft managed updates for Secure Boot by setting the following registry key:
Registry location
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot
Key name
MicrosoftUpdateManagedOptIn
Key type
DWORD
DWORD value
-
0 or key does not exist
-
0x5944 – Secure Boot opt-in
Comments
We recommend setting this key to 0x5944 to indicate that all certificates should be updated in a manner that preserves the security profile of the existing device and updates the boot manager to the one signed by the Windows UEFI CA 2023 certificate.
Note This registry key will be enabled in a future update.
-
Note Support for the Microsoft managed rollout is only available for Windows 11 and Windows 10 client versions. After October 14, 2025, Windows 10, version 22H2 with extended security updates (ESU) will be included.
Option 2: Customer-Managed Self-service or partially automated solutions
Microsoft is evaluating guidance for partially automated solutions to assist enterprise and IT professional managed systems. Please note that these are self-service options that an enterprise or IT professionals can choose to apply as per their specific situation and usage model.
As Microsoft has limited visibility (or diagnostic data) for Enterprise and IT professional managed devices overall, the assists available from Microsoft are limited. The implementation is left to customers and their partners such as Independent Software Vendors (ISVs), Microsoft Active Protection Partners (MAPP), other Cryptographic Scanners and Security partners and OEMs. |
Important:
-
Applying Secure Boot Certificate updates can cause Boot failures, Bit locker Recovery, or even bricked devices in certain cases.
-
This awareness is needed especially for old systems which may be out of OEM Support. For example: Running into Firmware issues/bugs that are not fixed by OEM will need to be replaced or Secure Boot turned Off leading to the device no longer receiving security updates after Secure Boot certificate expiry starting June 2026.
Recommended methodology
-
Check with OEM for your device on any Secure Boot related updates or guidances. For example: Some OEMs are publishing the minimum firmware/BIOS versions that support the updated 2023 Secure Boot Certificates. Follow OEM recommendation and apply any updates
-
Get a list of devices that have Secure Boot turned ON. No action is needed for devices with Secure Boot turned OFF.
-
Classify your Enterprise devices which do not share diagnostic data with Microsoft by:
-
OEMModelBaseBoard
-
FirmwareMfg
-
FirmwareVersion
-
OEMName
-
OSArch
-
OEMSubModel
-
OEMModel
-
BaseBoardMfg
-
FirmwareManufacturer
-
OEMModelSystemFamily
-
OEMBaseBoardManufacturer
-
OEM
-
BaseBoardManufacturer
-
-
For each Unique category in Step 3, Validate Secure Boot Key update rollout (one of the steps further below) on a “few” devices [“few” would be a decision based on each customer. We recommend 4-10 devices at least]. After successful validation, the devices can be marked as GREEN/SAFE buckets for rollout at scale to other similar devices under Enterprise/IT management
-
Customer can choose one of the following methods or a combination to apply updated Certificates.
How can I tell if the new CAs are in the UEFI DB?
-
Download and install the UEFIv2 PowerShell module.
-
Run the following commands in an elevated PowerShell window:
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
Import-Module UEFIv2
Run (Get-UEFISecureBootCerts DB).signature
-
Look for the thumbprint or Subject CN.
-
Download the UEFIv2 2.7 PowerShell module.
-
At an elevated PowerShell command prompt, run the following command:
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match ‘Windows UEFI CA 2023’
The command should return: True = successful
Alternatively, run “(Get-UEFISecureBootCerts PK).Signature”
Methods to apply Secure Boot Certificate on SAFE devices
As noted previously in the "Recommended methodology" section, the Secure Boot Certificate updates should be applied only to SAFE/GREEN bucket devices after adequate testing/validation on a handful of devices.
Description of the following methods.
Method 1: Registry key-based Secure Boot key rolling updates. This method provices a way to test how Windows responds after the 2023 DB updates have been applied to a device, Method 2: Group Policy Object (GPO) for Secure Boot Key. This method provides an easy-to-use Group Policy setting that domain administrators can enable to deploy the Secure Boot updates across domain-joined Windows clients and servers. Method 3: Secure Boot API/CLI Interface using Windows Configuration System (WinCS). This may be used to enable SecureBoot keys. Method 4: To manually apply the Secure Boot DB updates, see the Manual DB/KEK update steps section. |
This method provides a way to test how Windows responds after the 2023 DB updates have been applied to a device,
CA Reg key values
Registry location |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot\AvailableUpdates |
Certificate values |
#define SERVICING_UPDATE_KEK 0x0004 #define SERVICING_UPDATE_DB_2024 0x0040 #define SERVICING_UPDATE_INVOKE_BFSVC_AI 0x0100 #define SERVICING_UPDATE_3P_OROM_DB 0x0800 #define SERVICING_UPDATE_3P_UEFI_DB 0x1000 #define CHECK_3P2011_BEFORE_3POROM_UEFICA 0x4000 |
Test steps
Run each of the following commands separately from an elevated PowerShell prompt:
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
You can find the results by observing the event logs as described in Secure Boot DB and DBX variable update events.
Notes
-
Restarts are sometimes required during this process.
-
SERVICING_UPDATE_INVOKE_BFSVC_AI updates the boot manager to the 2023 signed version, which changes the boot manager on the EFI partition.
More details about the registry key-based Secure Boot updates
The policy logic is built around three registry values stored in the following secure boot servicing registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
Note All the following registry subkeys are used to trigger the update and to record the update status.
Registry value |
Type |
Description & usage |
AvailableUpdates |
REG_DWORD (bitmask) |
Update trigger flags. Controls which Secure Boot update actions to perform on the device. Setting the appropriate bitfield here initiates the deployment of new secure boot certificates and related updates. For enterprise deployment, this should be set to 0x5944 (hex) – a value that enables all relevant updates (adding the new 2023 Microsoft UEFI CA keys, updating the KEK, and installing the new boot manager) for all customers. (This value effectively opts the device into the Secure Boot “key roll” deployment. When non-zero (i.e. 0x5944), the system’s scheduled task will apply the specified updates; if zero or not set, no Secure Boot key update is performed.)Note: As the bits are processed, they are cleared. Managing this with Group Policy and a CSP will need to account for this. |
UEFICA2023Status |
REG_SZ (string) |
Deployment status indicator. Reflects the current state of the Secure Boot key update on the device. It will be set to one of three text values: “NotStarted”, “InProgress”, or “Updated”, indicating that the update has not yet run, is actively in progress, or has completed successfully. Initially the status is “NotStarted”. It changes to “InProgress” once the update begins, and finally to “Updated” when all new keys and the new boot manager have been deployed.) |
UEFICA2023Error |
REG_DWORD (code) |
Error code (if any). This value remains 0 on success. If the update process encounters a fault, UEFICA2023Error is set to a non-zero error code corresponding to the first error encountered. An error here implies the Secure Boot update did not fully succeed and may require investigation or remediation on that device. (For example, if updating the DB (database of trusted signatures) failed due to a firmware issue, this registry might show an error code that can be mapped to an event log or documented error ID for Secure Boot servicing.) |
HighConfidenceOptOut |
REG_DWORD |
For enterprises that want to opt out of high confidence buckets that will automatically be applied as part of the LCU. They can set this key to a non-zero value to opt-out of the high confidence buckets. |
MicrosoftUpdateManagedOptIn |
REG_DWORD |
For enterprises that want to opt-in to CFR servicing (Microsoft Managed). In addition to setting this key, customers will need to allow the sending of “Optional Diagnostic Data”. |
How these keys work together
The IT admin (via GPO or CSP) configures AvailableUpdates = 0x5944, which signals Windows to execute the Secure Boot key roll process on the device. As the process runs, the system updates UEFICA2023Status from "NotStarted" to "InProgress", and finally to "Updated" upon success. As each bit in 0x5944 is processed successfully, it is cleared. If any step fails, an error code is recorded in UEFICA2023Error (and the status may remain "InProgress" or a partially updated state). This mechanism gives administrators a clear way to trigger and track the rollout per device.
Note: These registry values are introduced specifically for this feature (they do not exist on older systems until the supporting update is installed). The names UEFICA2023Status and UEFICA2023Error were defined in the design to capture the status of adding the “Windows UEFI CA 2023” certificates. They appear in the above registry path once the system is updated to a build that supports Secure Boot key rolling.
Affected platforms
Secure Boot is supported in Windows starting with the Windows Server 2012 code base and Group Policy support exists in all versions of Windows that support Secure Boot. Therefore, Group Policy support will be provided on all supported versions of Windows that supports Secure Boot.
This table further breaks down the support based on registry key.
Key |
Windows versions supported |
AvailableUpdates/AvailableUpdatesPolicy, UEFICA2023Status, UEFICA2023Error |
All versions of Windows that support Secure Boot (Windows Server 2012 and later Windows versions). |
HighConfidenceOptOut |
All versions of Windows that support Secure Boot (Windows Server 2012 and later Windows versions). Note: While the confidence data is gathered on Windows 10, versions 21H2 and 22H2 and later versions of Windows, it can be applied to devices running on earlier versions of Windows. |
MicrosoftUpdateManagedOptIn |
Windows 10, versions 21H2 and 22H2 Windows 11, versions 22H2 and 23H2 Windows 11, version 24H2 and Windows Server 2025 |
Our SBAI/TpmTasks implements a new routine to ingest the schema and make the determination of a Device’s bucket ID. It also needs to emit events to represent a Device’s bucket id on every boot session.
These new events will require that the Device Bucket Confidence data is present on the system. The data will be included with the cumulative updates and will be available online for up-to-date downloads.
Secure Boot error events
Error events have a critical reporting function to inform about Secure Boot Status and progress. For information about the error events, see Secure Boot DB and DBX variable update events. The error events are being updated with additional event for Secure Boot.
Error events
Secure Boot will emit events on each boot. The events emitted will depend on the state of the system.
Machine Metadata Event
Error events will include machine metadata such as architecture, firmware version, etc. to give customers details on the device. This metadata will give IT administrators data to help them understand which devices have expiring certificates and the characteristics of their devices.
This event will be emitted on all devices that do not have the necessary updated certificates. The necessary certificates are:
-
the PCA2023
-
the third-party UEFI CA and third-party Option ROM CA if the third-party 2011 CA is present
-
the KEK.
The standard attributes for the generic bucket are:
-
OEMName_Uncleaned
-
OEMModel
-
OEMSubModel
-
OEMModelSystemFamily
-
OEMModelBaseBoard
-
BaseBoardManufacturer
-
FirmwareManufacturer
-
FirmwareVersion
Event ID: 1801
Event log |
System |
Event source |
TPM-WMI |
Event ID |
1801 |
Level |
Error |
Event message text |
Secure Boot CA/keys need to be updated. This device’s signature information is included here. <Include standard attributes – the ones we use when an OEM has not defined> |
BucketIid+ Confidence Rating Event
This event will be emitted in conjunction with the Machine Meta Data event when the device doesn’t have the necessary updated certificates as described above. Each error event will include a BucketId and a confidence rating. The confidence rating can be one of the following.
Confidence |
Description |
High Confidence (Green) |
High confidence that all necessary certificates can be deployed successfully. |
Needs More Data (Yellow) |
In the bucket list but not enough data. May have high confidence in some certificates deploying and less confidence in other certificates. |
Unknown (Purple) |
Not in bucket list - never seen |
Paused (Red) |
Some certificates may be deployed with high confidence, but an issue has been detected that requires follow-up by Microsoft or the device manufacturer. This category can include Skipped, Known Issues, and Investigating. |
If there isn’t a bucket id for the device, then the event should indicate “Unknown” as the state and not include a device signature.
Event ID: 1802
Event log |
System |
Event source |
TPM-WMI |
Event ID |
1802 |
Level |
Error |
Event message text |
Secure Boot CA/keys need to be updated. This device signature information is included here.%nDeviceAttributes: %1%nBucketId: %2%nBucketConfidenceLevel: %3%nHResult: %4 Device signature: b1a7c2e5f6d8a9c0e3f2b4a1c7e8d9f0b2a3c4e5f6d7a8b9c0e1f2a3b4c5d6e7, Confidence Value: Currently Needs More Data (or Unknown, High Confidence, Paused) See https://aka.ms/GetSecureBoot for details |
Information events
Machine Up to Date Event
An information event will indicate that the machine is up to date, and no action is needed.
Event ID: 1803
Event log |
System |
Event source |
TPM-WMI |
Event ID |
1803 |
Level |
Information |
Event message text |
This device has updated Secure Boot CA/keys. %nDeviceAttributes: %1%nBucketId: %2%nBucketConfidenceLevel: %3%nHResult: %4 |
Warning events
Secure Boot Defaults Need Updating Event
Warning event that will indicate that the device’s firmware Secure Boot default settings are not up to date. This occurs when the device is booting from a PCA2023 signed boot manager and the DBDefaults in the firmware do not include the PCA2023 certificate.
Event ID: 1804
Event log |
System |
Event source |
TPM-WMI |
Event ID |
1804 |
Level |
Warning |
Error message text |
This device has been updated to the Windows boot manager signed by the “Windows UEFI CA 2023”, but the Secure Boot DBDefaults in the firmware do not include the “Windows UEFI CA 2023” certificate. Resetting the Secure Boot settings in the firmware to the defaults might prevent the device from booting. See https://aka.ms/GetSecureBoot for details. |
Additional Component Changes for Secure Boot
TPMTasks changes
Modify TPMTasks to determine if the state of the device either has the updated Secure Boot Certificates or does not. Currently it can make that determination but only if our CFR selects a machine for update. We want that determination and subsequent logging to happen in every boot session regardless of the CFR. If the Secure Boot Certificates are not fully up to date, then emit the two error events described above and if the Certificates are up to date, then emit the Information event. The Secure Boot Certificates that will be checked are:
-
Windows UEFI CA 2023
-
Microsoft UEFI CA 2023 and Microsoft Option ROM CA 2023 – if the Microsoft UEFI CA 2011 is present, then these two CA must be present. If the Microsoft UEFI CA 2011 is not present, then no check is necessary.
-
Microsoft Corporation KEK CA 2023
Machine Metadata Event
This event will gather the machine meta-data and issue an event.
-
BucketId + Confidence Rating Event
This event will use the meta-data of the machine to find the corresponding entry in the database of machines (bucket entry) and will format and emit an event with this data along with any confidence information regarding the bucket.
High Confident Device Assist
For devices in high confidence buckets, the Secure Boot certificates and 2023 signed boot manager will automatically be applied.
The update will be triggered at the same time as the two error events are generated, and the BucketId + Confidence Rating event includes a high-confidence rating.
For customers that want to opt-out, a new registry key will be available as follows:
Registry location |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot |
Key name |
HighConfidenceOptOut |
Key type |
DWORD |
DWORD value |
0 or key does not exist – High-confidence assist enabled. 1 – High-confidence assist is disabled Anything else – Undefined |
This method provides an easy-to-use Group Policy setting that domain administrators can enable to deploy the Secure Boot updates across domain-joined Windows clients and servers.
The Group Policy Object (GPO) will write the required registry AvailableUpdatesPolicy value and thereby initiate the process, using the standard Group Policy infrastructure for deployment and scope control.
GPO Configuration Overview
-
Policy Name (tentative): “Enable Secure Boot Key Rollout” (under Computer Configuration).
-
Policy Path: A new node under Computer Configuration → Administrative Templates → Windows Components → Secure Boot. For clarity, a subcategory like “Secure Boot Updates” should be created to house this policy.
-
Scope: Computer (machine-wide setting) – because it targets HKLM and affects the device’s UEFI state.
-
Policy Action: When Enabled, the policy will set the registry key AvailableUpdatesPolicy to the value 0x5944 (REG_DWORD) on the client under the path HKLM\System\CurrentControlSet\Control\SecureBoot\Servicing. This flags the device to install all available Secure Boot key updates on next opportunity.
Note: Due to the nature of Group Policy where the policy will be reapplied over time, and the nature of the AvailableUpdates where the bits are cleared as they are processed, it is necessary to have a separate registry key called AvailableUpdatesPolicy so that the underlying logic can track if the keys have been deployed. When AvailableUpdatesPolicy is set to 0x5944, TPMTasks will set AvailableUpdates to 0x5944 and make note that this has been done to prevent reapplying to AvailableUpdates multiple times. Setting AvailableUpdatesPolicy to Diabled will cause TPMTasks to clear (set to 0) AvailableUpdates and make note that this has been completed.
-
Disabled/Not Configured: When Not Configured, the policy makes no changes (Secure Boot updates remain opt-in and won’t run unless triggered by other means). If Disabled, the policy should set AvailableUpdates = 0, to explicitly ensure the device does not attempt the Secure Boot key roll or to stop the rollout if something goes wrong.
-
HighConfidenceOptOut can be Enabled or Disabled. Enabling will set this key to 1 and disabling will set it to 0.
ADMX Implementation: This policy will be implemented via a standard Administrative Template (.admx). It uses the Registry policy mechanism to write the value. For example, the ADMX definition would specify:
-
Registry Key: Software\Policies\... (Group Policy normally writes to the Policies branch), but in this case we need to affect HKLM\SYSTEM. We will leverage Group Policy’s ability to write directly to HKLM for machine policies. The ADMX can use the element with the real target path.
-
Value name: AvailableUpdatesPolicy, Value: 0x5944 (DWORD).
When the GPO is applied, the Group Policy client service on each targeted machine will create/update this registry value. The next time the Secure Boot servicing task (TPMTasks) runs on that machine, it will detect 0x5944 and carry out the update. (By design, on Windows the “TPMTask” scheduled task runs every 12 hours to process such Secure Boot update flags, so within at most 12 hours the update will start. Admins can also expedite by manually running the task or rebooting, if desired.)
Example Policy UI
-
Setting: “Enable Secure Boot Key Rollout” – When enabled, the device will install the updated Secure Boot certificates (2023 CAs) and associated boot manager update. The device’s firmware Secure Boot keys and configurations will be updated in the next maintenance window. Status can be tracked via the registry (UEFICA2023Status and UEFICA2023Error) or Windows Event Log.
-
Options: Enabled / Disabled / Not Configured.
This single setting approach keeps it simple for all customers (always using the recommended 0x5944 value). If in the future more granular control is needed, additional policies or options could be introduced. However, current guidance is that all new Secure Boot keys and the new boot manager should be deployed together in nearly all scenarios, so a one-toggle deployment is appropriate.
Security & Permissions: Writing to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\... requires administrative privileges. Group Policy runs as Local System on clients, which has the necessary rights. The GPO itself can be edited by administrators with Group Policy management rights. Standard GPO security can prevent non-admins from altering the policy.
Text for Group Policy UI
The English text used when configuring the policy is as follows.
Text element |
Description |
Node in Group Policy Hierarchy |
Secure Boot |
AvailableUpdates/ AvailableUpdatesPolicy |
|
Setting name |
Enable Secure Boot Certificate Deployment |
Options |
Options <no options needed – just “Not Configured”, “Enabled”, and “Disabled”> |
Description |
This policy setting allows you to enable or disable the Secure Boot Certificate Deployment process on devices. When enabled, Windows will automatically begin the certificate deployment process to devices where this policy has been applied. Note: This registry setting is not stored in a policy key, and this is considered a preference. Therefore, if the Group Policy Object that implements this setting is ever removed, this registry setting will remain. Note: The Windows task that runs and processes this setting, runs every 12 hours. In some cases, the updates will be held until the system reboots to safely sequence the updates. Note: Once the certificates are applied to the firmware, you cannot undo them from Windows. If clearing the certificates is necessary, it must be done from the firmware menu interface. For more information, see: https://aka.ms/GetSecureBoot |
HighConfidenceOptOut |
|
Setting name |
Automatic Certificate Deployment via Updates |
Options |
<no options needed – just “Not Configured”, “Enabled”, and “Disabled”> |
Description |
For devices where test results are available that indicate that the device can process the certificate updates successfully, the updates will be initiated automatically as part of the servicing updates. This policy is enabled by default. For enterprises that desire managing automatic update, use this policy to explicitly enable or disable the feature. For more information, see: https://aka.ms/GetSecureBoot |
This may be used to enable SecureBoot keys.
This system consists of a series of command-line utilities (both a traditional executable and a powershell module) that can locally query and apply SecureBoot configurations to a machine.
WinCS works off a configuration key that can be used with the command line utilities to modify the SecureBoot flag state on the machine. Once applied, the next scheduled SecureBoot check will take action based on the key.
Feature name |
WinCS Key |
Description |
Feature_AllowDBUpdate2023Rollout |
F924888F002 |
Allows updating the Secure Boot database (DB) with the new Windows UEFI CA 2023 certificate (the one that signs Windows boot loaders). |
Feature_Allow3POROMRollout |
3CCC848E002 |
Allows updating the Secure Boot DB with the new 3rd Party Option ROM 2023 certificate (for third-party option ROMs, usually peripheral firmware). |
Feature_Allow3PUEFICARollout |
E0366E8E002 |
Allows updating the Secure Boot DB with the new 3rd Party UEFI CA 2023 certificate (replacing the 2011 Microsoft 3P UEFI CA that signs third-party bootloaders). |
Feature_KEKUpdateAllowList |
3924588F002 |
Allows updating the Key Exchange Key (KEK) store with the new Microsoft KEK 2023. The “allow list” term indicates it appends the new KEK if the platform’s PK (platform key) matches Microsoft (ensuring the update only applies to Microsoft-controlled Secure Boot, not custom PK). |
Feature_PCA2023BootMgrUpdate |
99ACD08F002 |
Allows installation of a new PCA 2023-signed Boot Manager (bootmgfw.efi) if the system’s DB is updated with PCA 2023 but the current boot manager is still signed by the older PCA 20111. This ensures the boot chain is fully updated to 2023 certificates. |
Feature_AllKeysAndBootMgrByWinCS |
F33E0C8E002 |
Configures all of the above to be allowed. |
SecureBoot keys can be queried with the following command line:
WinCsFlags.exe /query -p "CVE:CVE-2025-55318"
This will return the following (on a clean machine):
Flag: F33E0C8E
Current Configuration: F33E0C8E001
Pending Configuration: None
Pending Action: None
State: Disabled
CVE: CVE-2025-55318
FwLink: https://aka.ms/getsecureboot
Configurations:
F33E0C8E002
F33E0C8E001
Notice that the state of the key is Disabled and the current configuration is F33E0C8E001.
The specific configuration to enable SecureBoot certificates can be configured in the following fashion:
WinCsFlags /apply –key “F33E0C8E002”
A successful application of the key should return the following information:
Successfully applied F33E0C8E002
Flag: F33E0C8E
Current Configuration: F33E0C8E002
Pending Configuration: None
Pending Action: None
State: Disabled
CVE: CVE-2025-55318
FwLink: https://aka.ms/getsecureboot
Configurations:
F33E0C8E002
To determine the state of the key later, you can re-use the initial query command:
WinCsFlags.exe /query -p "CVE:CVE-2025-55318"
The information returned will be similar to the following, depending on the state of the flag:
Flag: F33E0C8E
Current Configuration: F33E0C8E002
Pending Configuration: None
Pending Action: None
State: Enabled
CVE: CVE-2025-55318
FwLink: https://aka.ms/getsecureboot
Configurations:
F33E0C8E002
F33E0C8E001
Notice that the state of the key is now enabled, and the current configuration is F33E0C8E002.
Note The key being applied does not mean that the SecureBoot certificate installation process has started or has finished. It merely indicates that the machine will proceed with SecureBoot updates at the next available opportunity. This can be pending, already started, or completed. The state of the flag does not indicate this progress.
Manual DB/KEK update steps
For instructions on how to manually apply the Secure Boot DB updates, see Updating Microsoft Secure Boot keys. Additionally, for details on Microsoft recommended Secure Boot object configuration, see Microsoft Secure Boot objects GitHub Repo as it is the official spot for all Secure Boot object content.
Change date |
Change description |
September 2025 |
|
July 8, 2025 |
|
July 2, 2025 |
|