Copy and paste this sample script and modify as needed for your environment:

<# .SYNOPSIS     Detects Secure Boot certificate update status for fleet-wide monitoring.

.DESCRIPTION     This detection script collects Secure Boot status, certificate update registry values,     and device information. It outputs a JSON string for monitoring and reporting.

    Compatible with Intune Remediations, GPO-based collection, and other management tools.     No remediation script is needed — this is monitoring only.

    Exit 0 = "Without issue"  (certificates updated)     Exit 1 = "With issue"     (certificates not updated — informational only)

.PARAMETER OutputPath     Optional. Path to a folder where the JSON file will be saved.     If provided, saves HOSTNAME_latest.json to this folder.     If not provided, outputs JSON to stdout (original behavior).

.EXAMPLE     # Output to stdout (Intune/SCCM detection)     .\Detect-SecureBootCertUpdateStatus.ps1

.EXAMPLE     # Save to network share (GPO deployment)     .\Detect-SecureBootCertUpdateStatus.ps1 -OutputPath "\\server\SecureBootLogs$"

.NOTES     Registry paths per https://aka.ms/securebootplaybook:       HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot       HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing

    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR     IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,     FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE     AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER     LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,     OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE     SOFTWARE. #> param(     [Parameter(Mandatory = $false)]     [string]$OutputPath )

# Download URL: https://aka.ms/getsecureboot -> "Deployment and Monitoring Samples" # Note: This script runs on endpoints to collect Secure Boot status data.

# 1. HostName # PS Version: All | Admin: No | System Requirements: None try {     $hostname = $env:COMPUTERNAME     if ([string]::IsNullOrEmpty($hostname)) {         Write-Warning "Hostname could not be determined"         $hostname = "Unknown"     }     Write-Host "Hostname: $hostname" } catch {     Write-Warning "Error retrieving hostname: $_"     $hostname = "Error"     Write-Host "Hostname: $hostname" }

# 2. CollectionTime # PS Version: All | Admin: No | System Requirements: None try {     $collectionTime = Get-Date     if ($null -eq $collectionTime) {         Write-Warning "Could not retrieve current date/time"         $collectionTime = "Unknown"     }     Write-Host "Collection Time: $collectionTime" } catch {     Write-Warning "Error retrieving date/time: $_"     $collectionTime = "Error"     Write-Host "Collection Time: $collectionTime" }

# Registry: Secure Boot Main Key (3 values)

# 3. SecureBootEnabled # PS Version: 3.0+ | Admin: May be required | System Requirements: UEFI/Secure Boot capable system try {     $secureBootEnabled = Confirm-SecureBootUEFI -ErrorAction Stop     Write-Host "Secure Boot Enabled: $secureBootEnabled" } catch {     Write-Warning "Unable to determine Secure Boot status via cmdlet: $_"     # Try registry fallback     try {         $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\State" -Name UEFISecureBootEnabled -ErrorAction Stop         $secureBootEnabled = [bool]$regValue.UEFISecureBootEnabled         Write-Host "Secure Boot Enabled: $secureBootEnabled"     } catch {         Write-Warning "Unable to determine Secure Boot status via registry. System may not support UEFI/Secure Boot."         $secureBootEnabled = $null         Write-Host "Secure Boot Enabled: Not Available"     } }

# 4. HighConfidenceOptOut # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name HighConfidenceOptOut -ErrorAction Stop     $highConfidenceOptOut = $regValue.HighConfidenceOptOut     Write-Host "High Confidence Opt Out: $highConfidenceOptOut" } catch {     # HighConfidenceOptOut is optional - not present on most systems     $highConfidenceOptOut = $null     Write-Host "High Confidence Opt Out: Not Set" }

# 4b. MicrosoftUpdateManagedOptIn # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name MicrosoftUpdateManagedOptIn -ErrorAction Stop     $microsoftUpdateManagedOptIn = $regValue.MicrosoftUpdateManagedOptIn     Write-Host "Microsoft Update Managed Opt In: $microsoftUpdateManagedOptIn" } catch {     # MicrosoftUpdateManagedOptIn is optional - not present on most systems     $microsoftUpdateManagedOptIn = $null     Write-Host "Microsoft Update Managed Opt In: Not Set" }

# 5. AvailableUpdates # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name AvailableUpdates -ErrorAction Stop     $availableUpdates = $regValue.AvailableUpdates     if ($null -ne $availableUpdates) {         # Convert to hexadecimal format         $availableUpdatesHex = "0x{0:X}" -f $availableUpdates         Write-Host "Available Updates: $availableUpdatesHex"     } else {         Write-Host "Available Updates: Not Available"     } } catch {     Write-Warning "AvailableUpdates registry key not found or inaccessible"     $availableUpdates = $null     Write-Host "Available Updates: Not Available" }

# 5b. AvailableUpdatesPolicy (GPO-controlled persistent value) # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name AvailableUpdatesPolicy -ErrorAction Stop     $availableUpdatesPolicy = $regValue.AvailableUpdatesPolicy     if ($null -ne $availableUpdatesPolicy) {         # Convert to hexadecimal format         $availableUpdatesPolicyHex = "0x{0:X}" -f $availableUpdatesPolicy         Write-Host "Available Updates Policy: $availableUpdatesPolicyHex"     } else {         Write-Host "Available Updates Policy: Not Set"     } } catch {     # AvailableUpdatesPolicy is optional - only set when GPO is applied     $availableUpdatesPolicy = $null     Write-Host "Available Updates Policy: Not Set" }

# Registry: Servicing Key (3 values)

# 6. UEFICA2023Status # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing" -Name UEFICA2023Status -ErrorAction Stop     $uefica2023Status = $regValue.UEFICA2023Status     Write-Host "Windows UEFI CA 2023 Status: $uefica2023Status" } catch {     Write-Warning "Windows UEFI CA 2023 Status registry key not found or inaccessible"     $uefica2023Status = $null     Write-Host "Windows UEFI CA 2023 Status: Not Available" }

# 7. UEFICA2023Error # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing" -Name UEFICA2023Error -ErrorAction Stop     $uefica2023Error = $regValue.UEFICA2023Error     Write-Host "UEFI CA 2023 Error: $uefica2023Error" } catch {     # UEFICA2023Error only exists if there was an error - absence is good     $uefica2023Error = $null     Write-Host "UEFI CA 2023 Error: None" }

# 8. UEFICA2023ErrorEvent # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing" -Name UEFICA2023ErrorEvent -ErrorAction Stop     $uefica2023ErrorEvent = $regValue.UEFICA2023ErrorEvent     Write-Host "UEFI CA 2023 Error Event: $uefica2023ErrorEvent" } catch {     $uefica2023ErrorEvent = $null     Write-Host "UEFI CA 2023 Error Event: Not Available" }

# Registry: Device Attributes (7 values: 9-15)

# 9. OEMManufacturerName # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name OEMManufacturerName -ErrorAction Stop     $oemManufacturerName = $regValue.OEMManufacturerName     if ([string]::IsNullOrEmpty($oemManufacturerName)) {         Write-Warning "OEMManufacturerName is empty"         $oemManufacturerName = "Unknown"     }     Write-Host "OEM Manufacturer Name: $oemManufacturerName" } catch {     Write-Warning "OEMManufacturerName registry key not found or inaccessible"     $oemManufacturerName = $null     Write-Host "OEM Manufacturer Name: Not Available" }

# 10. OEMModelSystemFamily # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name OEMModelSystemFamily -ErrorAction Stop     $oemModelSystemFamily = $regValue.OEMModelSystemFamily     if ([string]::IsNullOrEmpty($oemModelSystemFamily)) {         Write-Warning "OEMModelSystemFamily is empty"         $oemModelSystemFamily = "Unknown"     }     Write-Host "OEM Model System Family: $oemModelSystemFamily" } catch {     Write-Warning "OEMModelSystemFamily registry key not found or inaccessible"     $oemModelSystemFamily = $null     Write-Host "OEM Model System Family: Not Available" }

# 11. OEMModelNumber # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name OEMModelNumber -ErrorAction Stop     $oemModelNumber = $regValue.OEMModelNumber     if ([string]::IsNullOrEmpty($oemModelNumber)) {         Write-Warning "OEMModelNumber is empty"         $oemModelNumber = "Unknown"     }     Write-Host "OEM Model Number: $oemModelNumber" } catch {     Write-Warning "OEMModelNumber registry key not found or inaccessible"     $oemModelNumber = $null     Write-Host "OEM Model Number: Not Available" }

# 12. FirmwareVersion # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name FirmwareVersion -ErrorAction Stop     $firmwareVersion = $regValue.FirmwareVersion     if ([string]::IsNullOrEmpty($firmwareVersion)) {         Write-Warning "FirmwareVersion is empty"         $firmwareVersion = "Unknown"     }     Write-Host "Firmware Version: $firmwareVersion" } catch {     Write-Warning "FirmwareVersion registry key not found or inaccessible"     $firmwareVersion = $null     Write-Host "Firmware Version: Not Available" }

# 13. FirmwareReleaseDate # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name FirmwareReleaseDate -ErrorAction Stop     $firmwareReleaseDate = $regValue.FirmwareReleaseDate     if ([string]::IsNullOrEmpty($firmwareReleaseDate)) {         Write-Warning "FirmwareReleaseDate is empty"         $firmwareReleaseDate = "Unknown"     }     Write-Host "Firmware Release Date: $firmwareReleaseDate" } catch {     Write-Warning "FirmwareReleaseDate registry key not found or inaccessible"     $firmwareReleaseDate = $null     Write-Host "Firmware Release Date: Not Available" }

# 14. OSArchitecture # PS Version: All | Admin: No | System Requirements: None try {     $osArchitecture = $env:PROCESSOR_ARCHITECTURE     if ([string]::IsNullOrEmpty($osArchitecture)) {         # Try registry fallback         $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name OSArchitecture -ErrorAction Stop         $osArchitecture = $regValue.OSArchitecture     }     if ([string]::IsNullOrEmpty($osArchitecture)) {         Write-Warning "OSArchitecture could not be determined"         $osArchitecture = "Unknown"     }     Write-Host "OS Architecture: $osArchitecture" } catch {     Write-Warning "Error retrieving OSArchitecture: $_"     $osArchitecture = "Unknown"     Write-Host "OS Architecture: $osArchitecture" }

# 15. CanAttemptUpdateAfter (FILETIME) # PS Version: All | Admin: May be required | System Requirements: None try {     $regValue = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\DeviceAttributes" -Name CanAttemptUpdateAfter -ErrorAction Stop     $canAttemptUpdateAfter = $regValue.CanAttemptUpdateAfter     # Convert FILETIME to UTC DateTime — registry stores as REG_BINARY (byte[]) or REG_QWORD (long)     if ($null -ne $canAttemptUpdateAfter) {         try {             if ($canAttemptUpdateAfter -is [byte[]]) {                 $fileTime = [BitConverter]::ToInt64($canAttemptUpdateAfter, 0)                 $canAttemptUpdateAfter = [DateTime]::FromFileTime($fileTime).ToUniversalTime()             } elseif ($canAttemptUpdateAfter -is [long]) {                 $canAttemptUpdateAfter = [DateTime]::FromFileTime($canAttemptUpdateAfter).ToUniversalTime()             }         } catch {             Write-Warning "Could not convert CanAttemptUpdateAfter FILETIME to DateTime"         }     }     Write-Host "Can Attempt Update After: $canAttemptUpdateAfter" } catch {     Write-Warning "CanAttemptUpdateAfter registry key not found or inaccessible"     $canAttemptUpdateAfter = $null     Write-Host "Can Attempt Update After: Not Available" }

# Event Logs: System Log (10 values: 16-25)

# 16-25. Event Log queries # Event IDs: #   1801 - Update initiated, reboot required #   1808 - Update completed successfully #   1795 - Firmware returned error (capture error code) #   1796 - Error logged with error code (capture code) #   1800 - Reboot needed (NOT an error - update will proceed after reboot) #   1802 - Known firmware issue blocked update (capture KI_<number> from SkipReason) #   1803 - Matching KEK update not found (OEM needs to supply PK signed KEK) # PS Version: 3.0+ | Admin: May be required for System log | System Requirements: None try {     # Query all relevant Secure Boot event IDs     $allEventIds = @(1795, 1796, 1800, 1801, 1802, 1803, 1808)     $events = @(Get-WinEvent -FilterHashtable @{LogName='System'; ID=$allEventIds} -MaxEvents 50 -ErrorAction Stop)

    if ($events.Count -eq 0) {         Write-Warning "No Secure Boot events found in System log"         $latestEventId = $null         $bucketId = $null         $confidence = $null         $skipReasonKnownIssue = $null         $event1801Count = 0         $event1808Count = 0         $event1795Count = 0         $event1795ErrorCode = $null         $event1796Count = 0         $event1796ErrorCode = $null         $event1800Count = 0         $rebootPending = $false         $event1802Count = 0         $knownIssueId = $null         $event1803Count = 0         $missingKEK = $false         Write-Host "Latest Event ID: Not Available"         Write-Host "Bucket ID: Not Available"         Write-Host "Confidence: Not Available"         Write-Host "Event 1801 Count: 0"         Write-Host "Event 1808 Count: 0"     } else {         # 16. LatestEventId         $latestEvent = $events | Sort-Object TimeCreated -Descending | Select-Object -First 1         if ($null -eq $latestEvent) {             Write-Warning "Could not determine latest event"             $latestEventId = $null             Write-Host "Latest Event ID: Not Available"         } else {             $latestEventId = $latestEvent.Id             Write-Host "Latest Event ID: $latestEventId"         }

        # 17. BucketID - Extracted from Event 1801/1808         if ($null -ne $latestEvent -and $null -ne $latestEvent.Message) {             if ($latestEvent.Message -match 'BucketId:\s*(.+)') {                 $bucketId = $matches[1].Trim()                 Write-Host "Bucket ID: $bucketId"             } else {                 Write-Warning "BucketId not found in event message"                 $bucketId = $null                 Write-Host "Bucket ID: Not Found in Event"             }         } else {             Write-Warning "Latest event or message is null, cannot extract BucketId"             $bucketId = $null             Write-Host "Bucket ID: Not Available"         }

        # 18. Confidence - Extracted from Event 1801/1808         if ($null -ne $latestEvent -and $null -ne $latestEvent.Message) {             if ($latestEvent.Message -match 'BucketConfidenceLevel:\s*(.+)') {                 $confidence = $matches[1].Trim()                 Write-Host "Confidence: $confidence"             } else {                 Write-Warning "Confidence level not found in event message"                 $confidence = $null                 Write-Host "Confidence: Not Found in Event"             }         } else {             Write-Warning "Latest event or message is null, cannot extract Confidence"             $confidence = $null             Write-Host "Confidence: Not Available"         }

        # 18b. SkipReason - Extract KI_<number> from SkipReason in the same event as BucketId         # This captures Known Issue IDs that appear alongside BucketId/Confidence (not just Event 1802)         $skipReasonKnownIssue = $null         if ($null -ne $latestEvent -and $null -ne $latestEvent.Message) {             if ($latestEvent.Message -match 'SkipReason:\s*(KI_\d+)') {                 $skipReasonKnownIssue = $matches[1]                 Write-Host "SkipReason Known Issue: $skipReasonKnownIssue" -ForegroundColor Yellow             }         }

        # 19. Event1801Count         $event1801Array = @($events | Where-Object {$_.Id -eq 1801})         $event1801Count = $event1801Array.Count         Write-Host "Event 1801 Count: $event1801Count"

        # 20. Event1808Count         $event1808Array = @($events | Where-Object {$_.Id -eq 1808})         $event1808Count = $event1808Array.Count         Write-Host "Event 1808 Count: $event1808Count"                  # Initialize error event variables         $event1795Count = 0         $event1795ErrorCode = $null         $event1796Count = 0         $event1796ErrorCode = $null         $event1800Count = 0         $rebootPending = $false         $event1802Count = 0         $knownIssueId = $null         $event1803Count = 0         $missingKEK = $false                  # Only check for error events if update is NOT complete         # Skip error analysis if: 1808 is latest event OR UEFICA2023Status is "Updated"         $updateComplete = ($latestEventId -eq 1808) -or ($uefica2023Status -eq "Updated")                  if (-not $updateComplete) {             Write-Host "Update not complete - checking for error events..." -ForegroundColor Yellow                          # 21. Event1795 - Firmware Error (capture error code)             $event1795Array = @($events | Where-Object {$_.Id -eq 1795})             $event1795Count = $event1795Array.Count             if ($event1795Count -gt 0) {                 $latestEvent1795 = $event1795Array | Sort-Object TimeCreated -Descending | Select-Object -First 1                 if ($latestEvent1795.Message -match '(?:error|code|status)[:\s]*(?:0x)?([0-9A-Fa-f]{8}|[0-9A-Fa-f]+)') {                     $event1795ErrorCode = $matches[1]                 }                 Write-Host "Event 1795 (Firmware Error) Count: $event1795Count" $(if ($event1795ErrorCode) { "Code: $event1795ErrorCode" })             }                          # 22. Event1796 - Error Code Logged (capture error code)             $event1796Array = @($events | Where-Object {$_.Id -eq 1796})             $event1796Count = $event1796Array.Count             if ($event1796Count -gt 0) {                 $latestEvent1796 = $event1796Array | Sort-Object TimeCreated -Descending | Select-Object -First 1                 if ($latestEvent1796.Message -match '(?:error|code|status)[:\s]*(?:0x)?([0-9A-Fa-f]{8}|[0-9A-Fa-f]+)') {                     $event1796ErrorCode = $matches[1]                 }                 Write-Host "Event 1796 (Error Logged) Count: $event1796Count" $(if ($event1796ErrorCode) { "Code: $event1796ErrorCode" })             }                          # 23. Event1800 - Reboot Needed (NOT an error - update will proceed after reboot)             $event1800Array = @($events | Where-Object {$_.Id -eq 1800})             $event1800Count = $event1800Array.Count             $rebootPending = $event1800Count -gt 0             if ($rebootPending) {                 Write-Host "Event 1800 (Reboot Pending): Update will proceed after reboot" -ForegroundColor Cyan             }                          # 24. Event1802 - Known Firmware Issue (capture KI_<number> from SkipReason)             $event1802Array = @($events | Where-Object {$_.Id -eq 1802})             $event1802Count = $event1802Array.Count             if ($event1802Count -gt 0) {                 $latestEvent1802 = $event1802Array | Sort-Object TimeCreated -Descending | Select-Object -First 1                 if ($latestEvent1802.Message -match 'SkipReason:\s*(KI_\d+)') {                     $knownIssueId = $matches[1]                 }                 Write-Host "Event 1802 (Known Firmware Issue) Count: $event1802Count" $(if ($knownIssueId) { "KI: $knownIssueId" })             }                          # 25. Event1803 - Missing KEK Update (OEM needs to supply PK signed KEK)             $event1803Array = @($events | Where-Object {$_.Id -eq 1803})             $event1803Count = $event1803Array.Count             $missingKEK = $event1803Count -gt 0             if ($missingKEK) {                 Write-Host "Event 1803 (Missing KEK): OEM needs to supply PK signed KEK" -ForegroundColor Yellow             }         } else {             Write-Host "Update complete (Event 1808 or Status=Updated) - skipping error analysis" -ForegroundColor Green         }     } } catch {     Write-Warning "Error retrieving event logs. May require administrator privileges: $_"     $latestEventId = $null     $bucketId = $null     $confidence = $null     $skipReasonKnownIssue = $null     $event1801Count = 0     $event1808Count = 0     $event1795Count = 0     $event1795ErrorCode = $null     $event1796Count = 0     $event1796ErrorCode = $null     $event1800Count = 0     $rebootPending = $false     $event1802Count = 0     $knownIssueId = $null     $event1803Count = 0     $missingKEK = $false     Write-Host "Latest Event ID: Error"     Write-Host "Bucket ID: Error"     Write-Host "Confidence: Error"     Write-Host "Event 1801 Count: 0"     Write-Host "Event 1808 Count: 0" }

# WMI/CIM Queries (5 values)

# 26. OSVersion # PS Version: 3.0+ (use Get-WmiObject for 2.0) | Admin: No | System Requirements: None try {     $osInfo = Get-CimInstance Win32_OperatingSystem -ErrorAction Stop     if ($null -eq $osInfo -or [string]::IsNullOrEmpty($osInfo.Version)) {         Write-Warning "Could not retrieve OS version"         $osVersion = "Unknown"     } else {         $osVersion = $osInfo.Version     }     Write-Host "OS Version: $osVersion" } catch {     # CIM may fail in some environments - use fallback     $osVersion = [System.Environment]::OSVersion.Version.ToString()     if ([string]::IsNullOrEmpty($osVersion)) { $osVersion = "Unknown" }     Write-Host "OS Version: $osVersion" }

# 27. LastBootTime # PS Version: 3.0+ (use Get-WmiObject for 2.0) | Admin: No | System Requirements: None try {     $osInfo = Get-CimInstance Win32_OperatingSystem -ErrorAction Stop     if ($null -eq $osInfo -or $null -eq $osInfo.LastBootUpTime) {         Write-Warning "Could not retrieve last boot time"         $lastBootTime = $null         Write-Host "Last Boot Time: Not Available"     } else {         $lastBootTime = $osInfo.LastBootUpTime         Write-Host "Last Boot Time: $lastBootTime"     } } catch {     # CIM may fail in some environments - use fallback     try {         $lastBootTime = (Get-Process -Id 0 -ErrorAction SilentlyContinue).StartTime     } catch {         $lastBootTime = $null     }     if ($lastBootTime) { Write-Host "Last Boot Time: $lastBootTime" } else { Write-Host "Last Boot Time: Not Available" } }

# 28. BaseBoardManufacturer # PS Version: 3.0+ (use Get-WmiObject for 2.0) | Admin: No | System Requirements: None try {     $baseBoard = Get-CimInstance Win32_BaseBoard -ErrorAction Stop     if ($null -eq $baseBoard -or [string]::IsNullOrEmpty($baseBoard.Manufacturer)) {         Write-Warning "Could not retrieve baseboard manufacturer"         $baseBoardManufacturer = "Unknown"     } else {         $baseBoardManufacturer = $baseBoard.Manufacturer     }     Write-Host "Baseboard Manufacturer: $baseBoardManufacturer" } catch {     # CIM may fail - baseboard info is supplementary     $baseBoardManufacturer = "Unknown"     Write-Host "Baseboard Manufacturer: $baseBoardManufacturer" }

# 29. BaseBoardProduct # PS Version: 3.0+ (use Get-WmiObject for 2.0) | Admin: No | System Requirements: None try {     $baseBoard = Get-CimInstance Win32_BaseBoard -ErrorAction Stop     if ($null -eq $baseBoard -or [string]::IsNullOrEmpty($baseBoard.Product)) {         Write-Warning "Could not retrieve baseboard product"         $baseBoardProduct = "Unknown"     } else {         $baseBoardProduct = $baseBoard.Product     }     Write-Host "Baseboard Product: $baseBoardProduct" } catch {     # CIM may fail - baseboard info is supplementary     $baseBoardProduct = "Unknown"     Write-Host "Baseboard Product: $baseBoardProduct" }

# 30. SecureBootTaskEnabled # PS Version: All | Admin: No | System Requirements: Scheduled Task exists # Checks if the Secure-Boot-Update scheduled task is enabled $secureBootTaskEnabled = $null $secureBootTaskStatus = "Unknown" try {     $taskOutput = schtasks.exe /Query /TN "\Microsoft\Windows\PI\Secure-Boot-Update" /FO CSV 2>&1     if ($LASTEXITCODE -eq 0) {         $taskData = $taskOutput | ConvertFrom-Csv         if ($taskData) {             $secureBootTaskStatus = $taskData.Status             $secureBootTaskEnabled = ($taskData.Status -eq 'Ready' -or $taskData.Status -eq 'Running')         }     } else {         $secureBootTaskStatus = "NotFound"         $secureBootTaskEnabled = $false     }     if ($secureBootTaskEnabled -eq $false) {         Write-Host "SecureBoot Update Task: $secureBootTaskStatus (Enabled: $secureBootTaskEnabled)" -ForegroundColor Yellow     } else {         Write-Host "SecureBoot Update Task: $secureBootTaskStatus (Enabled: $secureBootTaskEnabled)" -ForegroundColor Green     } } catch {     $secureBootTaskStatus = "Error"     $secureBootTaskEnabled = $false     Write-Host "SecureBoot Update Task: Error checking - $_" -ForegroundColor Red }

# 31. WinCS Key Status (F33E0C8E002 - Secure Boot Certificate Update) # PS Version: All | Admin: Yes (for query) | System Requirements: WinCsFlags.exe $wincsKeyApplied = $null $wincsKeyStatus = "Unknown" try {     # Check common locations for WinCsFlags.exe     $wincsFlagsPath = $null     $possiblePaths = @(         "$env:SystemRoot\System32\WinCsFlags.exe",         "$env:SystemRoot\SysWOW64\WinCsFlags.exe"     )     foreach ($p in $possiblePaths) {         if (Test-Path $p) { $wincsFlagsPath = $p; break }     }          if ($wincsFlagsPath) {         # Query specific key - requires admin rights         $queryOutput = & $wincsFlagsPath /query --key F33E0C8E002 2>&1         $queryOutputStr = $queryOutput -join "`n"                  if ($LASTEXITCODE -eq 0) {             # Check if key is applied (look for "Active Configuration" or similar indicator)             if ($queryOutputStr -match "Active Configuration.*:.*enabled" -or $queryOutputStr -match "Configuration.*applied") {                 $wincsKeyApplied = $true                 $wincsKeyStatus = "Applied"                 Write-Host "WinCS Key F33E0C8E002: Applied" -ForegroundColor Green             } elseif ($queryOutputStr -match "not found|No configuration") {                 $wincsKeyApplied = $false                 $wincsKeyStatus = "NotApplied"                 Write-Host "WinCS Key F33E0C8E002: Not Applied" -ForegroundColor Yellow             } else {                 # Key exists - check output for state                 $wincsKeyApplied = $true                 $wincsKeyStatus = "Applied"                 Write-Host "WinCS Key F33E0C8E002: Applied" -ForegroundColor Green             }         } else {             # Check for specific error messages             if ($queryOutputStr -match "Access denied|administrator") {                 $wincsKeyStatus = "AccessDenied"                 Write-Host "WinCS Key F33E0C8E002: Access denied (run as admin)" -ForegroundColor DarkGray             } elseif ($queryOutputStr -match "not found|No configuration") {                 $wincsKeyApplied = $false                 $wincsKeyStatus = "NotApplied"                 Write-Host "WinCS Key F33E0C8E002: Not Applied" -ForegroundColor Yellow             } else {                 $wincsKeyStatus = "QueryFailed"                 Write-Host "WinCS Key F33E0C8E002: Query failed" -ForegroundColor Red             }         }     } else {         $wincsKeyStatus = "WinCsFlagsNotFound"         Write-Host "WinCS Key F33E0C8E002: WinCsFlags.exe not found" -ForegroundColor Gray     } } catch {     $wincsKeyStatus = "Error"     Write-Host "WinCS Key F33E0C8E002: Error checking - $_" -ForegroundColor Red }

# ============================================================================= # Remediation Detection - Status Output & Exit Code # =============================================================================

# Build status object from all collected inventory data $status = [ordered]@{     UEFICA2023Status           = $uefica2023Status     UEFICA2023Error            = $uefica2023Error     UEFICA2023ErrorEvent       = $uefica2023ErrorEvent     AvailableUpdates           = if ($null -ne $availableUpdates) { $availableUpdatesHex } else { $null }     AvailableUpdatesPolicy     = if ($null -ne $availableUpdatesPolicy) { $availableUpdatesPolicyHex } else { $null }     Hostname                   = $hostname     CollectionTime             = if ($collectionTime -is [datetime]) { $collectionTime.ToString("o") } else { "$collectionTime" }     SecureBootEnabled          = $secureBootEnabled     HighConfidenceOptOut       = $highConfidenceOptOut     MicrosoftUpdateManagedOptIn        = $microsoftUpdateManagedOptIn     OEMManufacturerName        = $oemManufacturerName     OEMModelSystemFamily       = $oemModelSystemFamily     OEMModelNumber             = $oemModelNumber     FirmwareVersion            = $firmwareVersion     FirmwareReleaseDate        = $firmwareReleaseDate     OSArchitecture             = $osArchitecture     CanAttemptUpdateAfter      = if ($canAttemptUpdateAfter -is [datetime]) { $canAttemptUpdateAfter.ToString("o") } else { "$canAttemptUpdateAfter" }     LatestEventId              = $latestEventId     BucketId                   = $bucketId     Confidence                 = $confidence     SkipReasonKnownIssue       = $skipReasonKnownIssue  # KI_<number> from SkipReason in BucketId event     Event1801Count             = $event1801Count     Event1808Count             = $event1808Count     # Error events with captured details     Event1795Count             = $event1795Count          # Firmware returned error     Event1795ErrorCode         = $event1795ErrorCode      # Error code from firmware     Event1796Count             = $event1796Count          # Error code logged     Event1796ErrorCode         = $event1796ErrorCode      # Captured error code     Event1800Count             = $event1800Count          # Reboot needed (NOT an error)     RebootPending              = $rebootPending           # True if Event 1800 present     Event1802Count             = $event1802Count          # Known firmware issue     KnownIssueId               = $knownIssueId            # KI_<number> from SkipReason     Event1803Count             = $event1803Count          # Missing KEK update     MissingKEK                 = $missingKEK              # OEM needs to supply PK signed KEK     OSVersion                  = $osVersion     LastBootTime               = if ($lastBootTime -is [datetime]) { $lastBootTime.ToString("o") } else { "$lastBootTime" }     BaseBoardManufacturer      = $baseBoardManufacturer     BaseBoardProduct           = $baseBoardProduct     SecureBootTaskEnabled      = $secureBootTaskEnabled     SecureBootTaskStatus       = $secureBootTaskStatus     WinCSKeyApplied            = $wincsKeyApplied         # True if F33E0C8E002 key is applied     WinCSKeyStatus             = $wincsKeyStatus          # Applied, NotApplied, WinCsFlagsNotFound, etc. }

# Output the status - For data aggregation $jsonOutput = $status | ConvertTo-Json -Compress

# If OutputPath provided, save to file; otherwise output to stdout if (-not [string]::IsNullOrEmpty($OutputPath)) {     # Validate OutputPath - skip if it looks like a help request or has invalid chars     if ($OutputPath -match '^[/\-]' -or $OutputPath -match '[<>:"|?*]') {         Write-Host "Invalid OutputPath specified, outputting to stdout" -ForegroundColor Yellow         Write-Output $jsonOutput         if ($secureBootEnabled -and $uefica2023Status -eq "Updated") { exit 0 } else { exit 1 }     }          # Ensure the output folder exists     if (-not (Test-Path $OutputPath)) {         try {             New-Item -ItemType Directory -Path $OutputPath -Force | Out-Null         } catch {             Write-Warning "Could not create output folder: $OutputPath - $_"         }     }          # Save to HOSTNAME_latest.json     $outputFile = Join-Path $OutputPath "$($hostname)_latest.json"     try {         $jsonOutput | Out-File -FilePath $outputFile -Encoding UTF8 -Force         Write-Host "JSON saved to: $outputFile" -ForegroundColor Green     } catch {         Write-Warning "Could not write to file: $outputFile - $_"         # Fall back to stdout         Write-Output $jsonOutput     } } else {     # Original behavior - output to stdout     Write-Output $jsonOutput }

# Exit code: "Updated" is the success value per the playbook if ($secureBootEnabled -and $uefica2023Status -eq "Updated") {     exit 0  # Without issue } else {     exit 1  # With issue }

​​​​​​​

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.