June 2026: Secure Boot Certificates are expiring – Help is on the way

June 2026: Secure Boot Certificates are expiring – Help is on the way

Introduction

In 2026, it’s easy to overlook the security features that have been protecting Windows devices for years. Secure Boot is one of them. Introduced with Windows 8, it changed how PCs defend themselves during startup by blocking an entire class of pre-boot attacks—before the operating system even loads.

Today, Secure Boot isn’t a “nice to have.” It’s a baseline control for modern Windows devices – whether you manage them manually, via Configuration Manager, or through Intune. Yet it’s still often misunderstood, disabled for convenience, or treated as a one-time checkbox rather than a continuing chain of trust.

This post revisits Secure Boot: what it is, why it matters in 2026, and what to know about upcoming certificate changes.

What is Secure Boot?

Secure Boot is a critical security feature built into modern PCs using UEFI (Unified Extensible Firmware Interface) firmware. Its primary purpose is to ensure that only trusted, digitally signed software can run during your device’s boot sequence. This is achieved by validating the digital signature of each piece of boot software against a set of trusted digital keys stored in the UEFI firmware.

As an industry standard, Secure Boot outlines protocols for managing certificates, authenticating firmware, and establishing the interface between the operating system (OS) and the verification process. Trust and authenticity within Secure Boot rely on a Public-Key Infrastructure (PKI) model, where Certificate Authorities (CAs) such as Microsoft and Original Equipment Manufacturers (OEMs) issue and manage the digital certificates that form the foundation of system trust.

Threats Secure Boot helps prevent

Secure Boot is designed to mitigate several types of attacks that target the boot process, including:

  • Bootkits and Rootkits: Malware that attempts to compromise the bootloader or kernel during startup.
  • Firmware Attacks: Attempts to tamper with or replace UEFI firmware.
  • Code Injection: Unauthorized code injected into the boot process.
  • Unauthorized Kernel Modules: Loading of unsigned or tampered kernel modules.
  • Exploitation of Boot-Time Vulnerabilities: Attacks that target vulnerabilities in the boot sequence itself.

By verifying the integrity and authenticity of each stage in the boot process, Secure Boot helps prevent these threats from compromising your system before the operating system even loads.

How Secure Boot works

Secure Boot was first introduced with Windows 8 as a defense against the emerging threat of pre-boot malware, coined as Bootkits. It is now a core part of Microsoft’s Trusted Boot security architecture. During platform initialization, Secure Boot authenticates various modules – including UEFI firmware drivers, bootloaders, applications, and option ROMs – by checking their digital signatures.

In the final step of the Secure Boot process, the firmware verifies the trustworthiness of the Windows boot loader. Once authenticated, control is passed to the boot loader, which then verifies, loads, and launches Windows. This multi-layered process ensures that only verified code is executed before Windows starts, effectively preventing attackers from exploiting the boot path as an attack vector.

Why are Secure boot Certificates expiring?

When Secure Boot was introduced with Windows 8, Microsoft and OEMs provisioned devices with a set of certificates (CAs) that define what code is trusted at boot. These certificates are stored in your device’s firmware and are used to validate updates and boot components.

However, the original Microsoft Secure Boot certificates from 2011 are expiring in 2026 (valid for 15 years). If your device still relies on these certificates, it will no longer be able to receive Secure Boot updates or security fixes for pre-boot components after expiration. This could leave your device vulnerable to new threats.

What’s changing?

Microsoft has issued new Secure Boot certificates (2023 versions) to replace the expiring 2011 certificates. These new certificates ensure your device continues to receive updates and remains protected. The update process involves adding the new certificates to your device’s firmware databases (KEK and DB).

Expiring CertificateExpirationNew CertificatePurpose
Microsoft Corporation KEK CA 2011June 2026Microsoft Corporation KEK CA 2023Signs updates to DB and DBX
Microsoft Windows Production PCA 2011Oct 2026Windows UEFI CA 2023Signs the Windows boot loader
Microsoft UEFI CA 2011June 2026Microsoft UEFI CA 2023Signs third-party boot loaders and EFI apps
Microsoft UEFI CA 2011June 2026Microsoft Option ROM CA 2023Signs third-party option ROMs

Preparing Your Environment for the Windows Secure Boot Certificate Update

Microsoft is rolling out updates to the Secure Boot Allowed Signature Database (DB) and related UEFI variables to transition devices to the Windows UEFI CA 2023 certificate. This is a significant change that affects how early-boot components are trusted, and it requires careful preparation in enterprise environments.

1. Assess Your Current State

Inventory All Windows Endpoints and Firmware Models

Before you touch anything, you need to know what you have. For every managed endpoint, capture:

  • OEM and model
  • BIOS/UEFI firmware version
  • Windows version and build number
  • Secure Boot state (enabled/disabled, current DB/DBX contents)
  • BitLocker state and protector type
  • Management method (Intune, SCCM, WSUS, standalone)

Some outcomes depend directly on firmware capability and OEM key provisioning. Microsoft explicitly notes that certain devices will need OEM firmware updates before the Secure Boot DB update can complete.

Identify Devices with Non-Standard Boot Paths

Flag any device that uses:

  • Custom Secure Boot keys (non-default PK, KEK, DB, or DBX entries)
  • Dual boot configurations (Linux, alternative bootloaders)
  • PXE boot or bootable media used in production workflows
  • Offline or air-gapped devices that do not receive Windows Update servicing

These devices are more likely to require manual planning. Secure Boot updates can be blocked by customized keys or non-standard boot manager conditions, and automated rollout signals may not apply.

Set Expectations: What Happens If You Do Nothing?

Devices will generally continue booting and receiving normal Windows updates. However, they will not receive new early-boot protections — boot manager updates, DB/DBX revocations, and mitigations for future boot-level vulnerabilities — if they do not receive the new certificates.

2. Prepare the Platform

Confirm Supported Servicing Levels

Windows updates released on or after February 13, 2024 include the ability to apply the Windows UEFI CA 2023 certificate to the Secure Boot DB. Ensure your devices are current on cumulative updates. In enterprise environments, the certificate installation is not always automatic.

Update OEM Firmware Proactively

Firmware limitations and OEM-specific key provisioning can block the update entirely. Microsoft’s guidance explicitly identifies cases where firmware issues or a missing PK-signed KEK prevent the DB update from completing.

Practical step: establish an OEM firmware update program with defined rings, validation, and change windows — ideally ahead of the Secure Boot rollout.

Verify BitLocker Readiness

Secure Boot variable updates can trigger BitLocker recovery in certain configurations. Microsoft recommends temporarily suspending BitLocker when indicated during the update process.

Preparation tasks:

  • Confirm recovery keys are escrowed (Entra ID, AD DS, MBAM, or your established process)
  • Document a standard BitLocker suspend-and-resume workflow that can be applied per ring
  • Validate that your helpdesk can retrieve recovery keys quickly if needed

3. Build a Controlled Rollout Plan

Create a Representative Pilot Group

Select test devices that cover each major hardware and firmware combination in your environment. Microsoft explicitly recommends controlled validation on representative devices due to known compatibility issues with DB updates.

Define Success Criteria

Before deploying to any ring, agree on what “success” looks like:

  • Devices boot normally after certificate and DB updates are applied
  • BitLocker does not enter recovery unexpectedly
  • PXE boot and recovery media workflows remain functional
  • No user-facing impact beyond planned reboots

You can validate success via the Windows Secure Boot event logs (covered in the monitoring section below).

Decide: Auto-Rollout or Managed Rollout?

Microsoft began phased automatic updates for eligible devices starting with the January 2026 cumulative updates, gated by “high confidence” device signals. In enterprise environments, you may prefer explicit control through defined rings and change windows especially if you have custom Secure Boot keys, non-standard boot flows, or strict change management requirements.

Read it here: January 13, 2026—KB5074109 (OS Builds 26200.7623 and 26100.7623) – Microsoft Support

4. Prepare Your Deployment Mechanics

Configure Deployment Rings

Microsoft’s enterprise guidance describes enabling the DB update via a controlled mechanism, including a registry-based trigger, after validation. Set up your tooling accordingly:

  • Ring 0 — Pilot: IT and representative hardware, manual validation
  • Ring 1 — Broad: General population, monitored rollout
  • Ring 2 — Critical: Sensitive or high-availability systems, final wave

You can create more rings if needed. Align reboot windows with your change management process. Some updates require a restart, and in certain scenarios more than one reboot is needed.

Plan for Secure Boot Revocations Separately

If you are also planning to apply Secure Boot boot manager revocations (for example, CVE-related mitigations), be aware that Microsoft warns some of these changes are non-reversible while Secure Boot remains enabled. Test these thoroughly and treat them as a separate change with their own validation and rollback considerations.

5. Update Recovery and Deployment Media

This step is commonly missed.

Secure Boot trust changes affect system recovery media, PXE boot applications, and other boot-time components especially once revocations and new signing chains are active.

Preparation tasks:

  • Rebuild and validate WinRE (Windows Recovery Environment) images
  • Update USB recovery media creation processes
  • Test PXE boot images against pilot devices that have already received the DB update
  • Verify that any custom boot applications are signed with certificates that will remain trusted

6. Implement Monitoring and Operational Readiness

Collect and Monitor Secure Boot Event Logs

Microsoft documents detailed event IDs for Secure Boot update outcomes, including success, deferrals, blocks, and cases requiring manual remediation (such as firmware blocks or missing PK-signed KEK).

Set up:

  • Central log collection via Microsoft Sentinel, Defender for Endpoint, Log Analytics, or your SIEM
  • Dashboards that surface key states: successblockeddeferredaction required

Pre-Stage Troubleshooting Playbooks

Build runbooks for the most common scenarios based on Microsoft’s published guidance:

ScenarioAction
BitLocker-related deferralSuspend BitLocker, reboot, allow update to apply, confirm BitLocker resumes
Firmware known-issue blockApply the required OEM BIOS/UEFI update, then retry
Missing PK-signed KEKEngage the OEM for provisioning guidance specific to the device model

7. Communication and User Impact Management

Prepare Internal Communications

Write a short notice for both your helpdesk team and end users that covers:

  • Expected reboots: When and how many, aligned to your ring schedule
  • BitLocker recovery prompt: What to do if prompted, and where to find the recovery key
  • Escalation path: Who to contact if a device does not boot normally

Microsoft notes that devices generally keep working throughout this process, but some will require administrator action for firmware readiness or BitLocker considerations. Setting expectations upfront reduces support volume significantly.

Summary

PhaseKey Action
1. AssessInventory endpoints, flag non-standard boot paths, set expectations
2. PrepareConfirm servicing levels, update firmware, verify BitLocker escrow
3. PlanPilot group, success criteria, auto vs. managed rollout decision
4. DeployRings, registry triggers, separate revocation planning
5. MediaRebuild WinRE, update PXE and USB media
6. MonitorEvent log collection, dashboards, troubleshooting playbooks
7. CommunicateHelpdesk briefing, user notice, escalation path

Taking the time to work through these steps before the update reaches your devices will save you from reactive firefighting. The Secure Boot certificate transition is not optional long-term it is the foundation for future boot-level security but it is absolutely something you can control the pace of in your environment.

Conclusion

15 years after its introduction, Secure Boot remains a foundational component of Windows platform security. What began as a response to early bootkit threats has evolved into a trusted, industry-standard mechanism that protects devices at their most vulnerable stage – before the operating system even loads!

In 2026, Secure Boot should be considered a default expectation rather than an optional feature. Whether devices are managed through SCCM, Intune, or a hybrid approach, you need to ensure Secure Boot is enabled and properly configured – this helps maintain platform integrity, supports modern security features, and reduces exposure to low-level attacks that are otherwise difficult to detect or remediate.

Secure Boot may operate quietly in the background, but its role in establishing trust at startup is as relevant today as it was when it first shipped – and it remains a critical part of a secure Windows deployment!

There are plenty of things you can do, but you must start now! In the next post we will demonstrate how this is updated and how real environments will handle this way of updating your device estate.

References

Act now: Secure Boot certificates expire in June 2026 – Windows IT Pro Blog

Secure the Windows boot process | Microsoft Learn

Windows Secure Boot certificate expiration and CA updates – Microsoft Support

Specifications | Unified Extensible Firmware Interface Forum (uefi.org)

Windows Secure Boot Key Creation and Management Guidance | Microsoft Learn

KB5036210: Deploying Windows UEFI CA 2023 certificate to Secure Boot Allowed Signature Database (DB) – Microsoft Support

microsoft/secureboot_objects: Secure boot objects recommended by Microsoft.

Secure Boot DB and DBX variable update events – Microsoft Support

Authors

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories
  • Follow on SoMe