Applies To
Windows 10 Windows 10, version 1607, all editions Win 10 Ent LTSC 2019 Win 10 IoT Ent LTSC 2019 Windows 10 IoT Core LTSC Windows 10 Enterprise LTSC 2021 Windows 10 IoT Enterprise LTSC 2021 Windows 10, version 22H2, all editions Windows 11 Home and Pro, version 21H2 Windows 11 Enterprise Multi-Session, version 21H2 Windows 11 Enterprise and Education, version 21H2 Windows 11 IoT Enterprise, version 21H2 Windows 11 Home and Pro, version 22H2 Windows 11 Enterprise Multi-Session, version 22H2 Windows 11 Enterprise and Education, version 22H2 Windows 11 IoT Enterprise, version 22H2 Windows 11 SE, version 23H2 Windows 11 Home and Pro, version 23H2 Windows 11 Enterprise and Education, version 23H2 Windows 11 Enterprise Multi-Session, version 23H2 Windows 11 SE, version 24H2 Windows 11 Enterprise and Education, version 24H2 Windows 11 Enterprise Multi-Session, version 24H2 Windows 11 Home and Pro, version 24H2 Windows 11 IoT Enterprise, version 24H2

Original Publish Date: February 18, 2026

KB ID: 5080921

This article has guidance for:

  • IT administrators who need visibility into Secure Boot certificate update status from their Intune enrolled Windows devices

  • Organizations preparing for the June 2026 Secure Boot certificate expiration deadline

  • Teams that want to monitor certificate rollout progress across their Intune enrolled Windows devices

In this article:

Introduction

Microsoft Secure Boot certificates (2011 CAs) are expiring starting June 2026. All Windows devices with Secure Boot enabled must be updated to the 2023 certificates before expiration to ensure continued security update support. 

This guide provides a monitoring-only approach using Microsoft Intune Remediations (Proactive Remediations). The detection script collects Secure Boot and certificate status from each device and reports it back to the Intune portal — no remediation action is taken on devices. This gives administrators a centralized, exportable view of certificate update progress across their Intune enrolled Windows devices. 

Why use this approach?

Benefit

Description

Device-wide visibility 

See every Intune enrolled Windows device’s certificate status in one place

Exportable 

Export results to CSV directly from the Intune portal

Raw registry values

See actual registry data, not just pass/fail

Device context 

Includes manufacturer, model, BIOS version, and firmware type

Event log telemetry 

Captures Secure Boot event IDs (1801/1808), bucket IDs, and confidence levels

Zero touch

Runs silently as SYSTEM — no user interaction required

For complete background information on the certificate updates, see Secure Boot certificate updates: Guidance for IT professionals and organizations

Prerequisites

Before deploying the detection script, ensure your environment meets the necessary requirements. 

This solution leverages Remediations in Microsoft Intune. For a full list of prerequisites, see Use Remediations to detect and fix support issues - Microsoft Intune.

Detection scripts

The detection script is a PowerShell script that collects comprehensive Secure Boot inventory data from each device and outputs it as a JSON string. The script reads from the following sources: 

Registry — Secure Boot certificate update status, servicing keys, device attributes, and opt-in/opt-out settings from HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot and its subkeys 

WMI/CIM — OS version, last boot time, and baseboard hardware info 

Event logs — System event log entries for Event IDs 1801 and 1808 (Secure Boot update events) 

The JSON output appears in the Intune portal under Remediations > Monitor > Device status > “Pre-remediation detection output” and can be exported to CSV for analysis. 

Important: This is a detection-only script. No changes are made to the device. No remediation script is needed. 

Creating the Script File 

Create the Remediation in Intune 

Follow these steps to deploy the detection script as a Remediation (script package) in Microsoft Intune. 

Step 1: Create the Script Package 

Step 2: Basics 

  • Configure the following settings on the Basics tab:

Setting

Value

Name

Secure Boot Certificate Status Monitor

Description

Monitors Secure Boot certificate update status across the fleet. Detection only — no remediation action is taken.

Publisher

(your organization name)

  • Click Next

Step 3: Settings 

  • Configure the following settings on the Settings tab:

Setting

Value

Notes

Detection script file 

Upload Detect-SecureBootCertificateStatus.ps1

The script from the previous section

Remediation script file 

(leave empty)

No remediation is needed — this is monitoring only

Run this script using the logged-on credentials 

No

Runs as SYSTEM to ensure access to Confirm-SecureBootUEFI and registry

Enforce script signature check 

No

Set to Yes if your organization requires signed scripts

Run script in 64-bit PowerShell

Yes

Required for Confirm-SecureBootUEFI cmdlet and accurate registry reads

  • Click Next

Step 4: Scope Tags 

  • Add any scope tags required by your organization, or leave as default

  • Click Next 

Step 5: Assignments 

Setting

Value

Notes

Assignments 

Select the device groups to monitor

Use All devices for fleet-wide monitoring, or specific groups for targeted monitoring

Schedule 

Configure to your monitoring needs

Recommended: Once every day for active rollout tracking, or once every week for ongoing monitoring

Note: Remediations run on the device’s configured schedule. The first run may take up to 24 hours after assignment depending on the device’s check-in cycle. 

Click Next

Step 6: Review + Create 

  • Review all settings

  • Click Create 

Viewing and Exporting Results 

View results in the portal 

  • Navigate to Devices > Remediations

  • Click on Secure Boot Certificate Status Monitor (or the name you chose)

  • Select the Monitor tab

  • Click Device status

MS Intune screenshot

You will see a table with the following columns: 

Column

Description

Device name

The name of the device

Username 

The primary user of the device

Detection status 

Without issue (certs updated) or with issue (certs not updated)

Pre-remediation detection output 

The full JSON output from the script

Last modified 

When the script last ran on the device

Export to CSV 

  • On the Device status page, click the Export button at the top of the table

  • The CSV file will download all columns including the full JSON detection output for every device

  • Open in Excel to filter, sort, and analyze by any field

Tip: In Excel, you can use the TEXTJOIN or JSON functions to parse the detection output JSON into separate columns for easier analysis. 

Overview tab

SecureBoot Cert status

The Overview tab on the Remediation provides a summary dashboard: 

Metric

Meaning

Devices with issues

Devices where certificates are not yet updated 

Devices without issues

Devices where certificates are up to date

Devices with failed detection

Devices where the script encountered an error

​​​​​​​Frequently Asked Questions 

Does this change anything on my devices? 

No. This is a detection-only script. No registry values are modified, no updates are triggered, and no remediation action is taken. The script only reads values and reports them. 

What does “With issue” mean? 

“With issue” means the device does not yet have the 2023 Secure Boot certificates applied and the 2023-signed boot manager in place. This could be because: - The certificate update hasn’t been initiated - The update is in progress and may require a reboot to complete - Secure Boot is not enabled on the device - The device is not UEFI-based or is waiting for a reboot to apply the boot manager. 

What does “Without issue” mean? 

“Without issue” means the device has Secure Boot enabled and the UEFICA2023Status registry value is Updated, indicating the 2023 certificates have been successfully applied. 

How often does the script run? 

The script runs on the schedule you configure in the assignment. For active monitoring during a rollout, daily is recommended. For ongoing monitoring, weekly is sufficient. 

What if the Servicing registry key doesn’t exist? 

If the HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing key does not exist on a device, the UEFICA2023Status field will show NoValue. This typically means certificate updates have not been initiated on the device. 

What licenses are required? 

Remediations require Windows 10/11 Enterprise E3/E5, Education A3/A5, or F3 licenses. If your devices have Business Premium or Pro licenses only, Remediations will not be available. See Prerequisites for Remediations

Resources 

Secure Boot Certificate Update Playbook 

Secure Boot Certificate Updates: Guidance for IT Professionals 

Registry Key Updates for Secure Boot 

Secure Boot DB and DBX Variable Update Events 

Remediations in Microsoft Intune 

Prerequisites for Remediations ​​​​​​​

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.