Registry key updates for Secure Boot: Windows devices with IT-managed updates
Applies To
Original Published Date: October 14, 2025
KB ID: 5068202
This article has guidance for:
|
Availability of this support:
|
In this article
Introduction
This document describes support for deploying, managing, and monitoring the Secure Boot certificate updates using Windows registry keys. The keys consist of the following:
-
One key to trigger the deployment of the certificates and boot manager on the device.
-
Two keys for monitoring status of the deployment.
-
Two keys for managing the opt-in/opt-out settings for the two available deployment assists.
These registry keys can be set manually on the device or remotely through available fleet management software. Other deployment methods, such as Group Policy, Intune, and WinCS are described in the article Windows devices for businesses and organizations with IT-managed updates.
Secure Boot registry keys
In this section
Registry keys
All Secure Boot registry keys described in this document are located under this registry path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
The following table describes each of the registry values.
Registry Value |
Type |
Description & Usage |
---|---|---|
AvailableUpdates |
REG_DWORD (bitmask) |
Update trigger flags. Controls which Secure Boot update actions to perform on the device. Setting the appropriate bitfield here initiates the deployment of new Secure Boot certificates and related updates. For enterprise deployment, this should be set to 0x5944 (hex) – a value that enables all relevant updates (adding the new 2023 CA certificates, updating the KEK, and installing the new boot manager). Settings:
|
UEFICA2023Status |
REG_SZ (string) |
Deployment status indicator. Reflects the current state of the Secure Boot key update on the device. It will be set to one of the following text values:
Initially the status is NotStarted. It changes to InProgress once the update begins, and finally to Updated when all new keys and the new boot manager have been deployed. If there is an error, then the UEFICA2023Error registry value is set to a non-zero code. |
UEFICA2023Error |
REG_DWORD (code) |
Error code (if any). This value remains 0 on success. If the update process encounters a fault, UEFICA2023Error is set to a non-zero error code corresponding to the first error encountered. An error here implies the Secure Boot update did not fully succeed and may require investigation or remediation on that device. For example, if updating the DB (database of trusted signatures) failed due to a firmware issue, this registry key might show an error code that can be mapped to an event log or documented error ID in Secure Boot DB and DBX variable update events. |
HighConfidenceOptOut |
REG_DWORD |
An opt-out option. For enterprises that want to opt out of high confidence buckets that will automatically be applied as part of the LCU. You can set this key to a non-zero value to opt-out of the high confidence buckets. Settings
|
MicrosoftUpdateManagedOptIn |
REG_DWORD |
An opt-in option. For enterprises that want to opt-in to Controlled Feature Rollout (CFR) servicing, also known as Microsoft Managed. In addition to setting this key, allow the sending of required diagnostic data (see Configure Windows diagnostic data in your organization). Settings
|
How these keys work together
The IT admin configures the AvailableUpdates registry value to 0x5944, which signals Windows to execute the Secure Boot key update and installation on the device.
As the process runs, the system updates UEFICA2023Status from NotStarted to InProgress, and finally to Updated upon success. As each bit in 0x5944 is processed successfully, it is cleared.
If any step fails, an error code is recorded in UEFICA2023Error (and the status remains InProgress).
This mechanism gives administrators a clear way to trigger and track the rollout per device.
Deployment using registry keys
Deployment to a group of devices consists of the following steps:
-
Set the AvailableUpdates registry value to 0x5944 on each of the devices to be updated.
-
Monitor the UEFICA2023Status and UEFICA2023Error registry keys to see that the devices are making progress. Remember that the task that processes these updates runs once every 12 hours. Note that the boot manager update may not happen until after a restart occurs.
-
Investigate issues if they occur. If UEFICA2023Error is non-zero on a device, you can check the event log for events related to this issue. See Secure Boot DB and DBX variable update events for a complete list of Secure Boot events.
A note about restarts: While a restart might be required to complete the process, initiating the deployment of the Secure Boot updates will not cause a restart. If a restart is needed, the Secure Boot deployment relies on restarts happening as the normal course of using the device.
Device testing using registry keys
When testing individual devices to ensure that the devices will process the updates correctly, the registry keys can be a straightforward way to test.
To test, run each of the following commands separately from an administrator PowerShell prompt:
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x5944 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
The first command initiates the certificate and boot manager deployment on the device. The second command causes the task that processes the AvailableUpdates registry key to run right away. Normally the task runs every 12 hours.
You can find the results by observing the UEFICA2023Status and UEFICA2023Error registry keys and the event logs as described in Secure Boot DB and DBX variable update events.
Opt-in and opt-out for assists
The HighConfidenceOptOut and MicrosoftUpdateManagedOptIn registry keys can be used to manage the two deployment “assists” described in Windows devices with IT-managed updates.
-
The HighConfidenceOptOut registry key controls the automatic update of devices through the cumulative updates. For the devices where Microsoft has observed specific devices updating successfully, they will be considered “high confidence” devices, and the Secure Boot certificate updates will happen automatically. The default setting for this opted in.
-
The MicrosoftUpdateManagedOptIn registry key allows IT departments to opt-in to automatic deployment managed by Microsoft. This setting is disabled by default and setting it to 1 opts-in. This setting also requires that the device send optional diagnostic data.
Supported versions of Windows
This table further breaks down the support based on registry key.
Key |
Supported versions of Windows |
AvailableUpdates UEFICA2023Status UEFICA2023Error |
All versions of Windows that support Secure Boot (Windows Server 2012 and later Windows versions). Note: While the confidence data is gathered on Windows 10, versions LTSC, 22H2 and later versions of Windows, it can be applied to devices running on earlier versions of Windows.
|
HighConfidenceOptOut |
|
MicrosoftUpdateManagedOptIn |
Secure Boot error events
Error events have a critical reporting function to inform about Secure Boot Status and progress. For information about the error events, see Secure Boot DB and DBX variable update events. The error events are being updated with additional event information for Secure Boot.
Additional component changes for Secure Boot
In this section
TPMTasks changes
Modify TPMTasks to determine if the state of the device has the updated Secure Boot certificates. Currently it can make that determination but only if CFR selects a machine for update. That determination and subsequent logging should happen in every boot session regardless of the CFR. If the Secure Boot certificates are not fully up to date, then they will emit the two error events described above. If the certificates are up to date, then they will emit the Information event. The Secure Boot certificates that will be checked are:
-
Windows UEFI CA 2023
-
Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 – These two CAs must be present only if the Microsoft UEFI CA 2011 is present. If the Microsoft UEFI CA 2011 is not present, then no check is necessary.
-
Microsoft Corporation KEK 2K CA 2023
Machine metadata event
This event will gather the machine meta-data and issue the following event:
-
BucketId + Confidence Rating event
This event will use the meta-data of the machine to find the corresponding entry in the database of machines (bucket entry). The machine will format and emit an event with this data along with any confidence information regarding the bucket.
High-confident device assist
For devices in high-confidence buckets, the Secure Boot certificates and 2023 signed boot manager will automatically be applied.
The update will be triggered at the same time as the two error events are generated, and the BucketId + Confidence Rating event includes a high-confidence rating.
Opt-out
For customers who want to opt-out, a new registry key will be available as follows:
Registry location |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot |
Key name |
HighConfidenceOptOut |
Key type |
DWORD |
DWORD value |
0 or key does not exist – High-confidence assist is enabled. 1 – High-confidence assist is disabled Any other value is undefined |