MC1104112 – (Updated) Act now: Secure Boot certificates expire in June 2026

cloudscout.one Icon

check before: 2025-07-08

Product:

Copilot, Windows

Platform:

Linux, Mac, Online, Windows Desktop, World tenant

Status:

Change type:

Admin impact

Links:

Details:

Updated July 8, 2025: survey link changed


In the coming months, Microsoft will be rolling out updated Secure Boot certificates needed to ensure a secure startup environment of Windows. Current certificates will start expiring in June 2026 on all Windows systems released since 2012, except for 2025 Copilot+ PCs. This also affects third-party operating systems. Start by checking on the latest available firmware from original equipment manufacturers (OEMs) and enabling Windows diagnostic data. Visit the Secure Boot certificate rollout landing page for guidance for personal devices and IT-managed systems.

When will this happen:
In the coming months, the following updated certificates will be rolling out: Microsoft Corporation KEK 2K CA 2023, Microsoft Corporation UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, Windows UEFI CA 2023
June 2026, the following certificates will expire: Microsoft Corporation KEK CA 2011 and Microsoft Corporation UEFI CA 2011 (or third-party UEFI CA)
October 2026, the following certificate will expire: Microsoft Windows Production PCA 2011

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-06-27

updated:
2025-07-09

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

Microsoft is updating Secure Boot certificates, which will expire in June 2026, requiring users to update their systems to maintain security and compatibility with new software.

Direct effects for Operations**

Loss of Secure Boot Updates
Devices will lose the ability to install Secure Boot security updates after June 2026, leading to potential vulnerabilities.
   - roles: System Administrators, IT Support Staff
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856

Trust Issues with Third-Party Software
Devices will not trust third-party software signed with new certificates after June 2026, affecting software installations and updates.
   - roles: End Users, System Administrators
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856

Security Fixes for Boot Manager
Devices will not receive security fixes for Windows boot manager by October 2026, increasing the risk of security breaches.
   - roles: System Administrators, IT Security Officers
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856

Firmware Update Requirements
Failure to check for the latest firmware from OEMs may lead to compatibility issues with the new Secure Boot certificates.
   - roles: System Administrators, IT Support Staff
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856

Diagnostic Data Configuration
Not configuring organizational policies to allow diagnostic data may hinder the management of Secure Boot-related updates.
   - roles: IT Managers, System Administrators
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

Streamlined Firmware Update Process
Implementing a centralized firmware management solution can ensure that all devices are running the latest firmware from OEMs, reducing vulnerabilities associated with outdated Secure Boot certificates.
   - next-steps: Research and evaluate centralized firmware management tools that integrate with existing IT infrastructure. Develop a rollout plan for implementation across all devices.
   - roles: IT Administrators, Security Officers, System Engineers
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856, https://support.microsoft.com/windows/windows-11-and-secure-boot-a8ff1202-c0d9-42f5-940f-843abef64fad

Enhanced Diagnostic Data Management
By allowing Microsoft to manage Windows updates and diagnostic data, organizations can ensure timely updates for Secure Boot, minimizing the risk of security breaches due to expired certificates.
   - next-steps: Create a policy document outlining the benefits of enabling Microsoft-managed updates and diagnostic data. Communicate this to stakeholders and gain approval for implementation.
   - roles: IT Managers, Compliance Officers, Security Analysts
   - references: https://aka.ms/getsecureboot, https://support.microsoft.com/topic/29bfd847-5855-49f1-bb94-e18497fe2315

User Training and Awareness Programs
Educating users about the importance of Secure Boot and the implications of expired certificates can enhance security posture and compliance with IT policies.
   - next-steps: Develop training materials focused on Secure Boot, including its significance and how users can verify their systems. Schedule training sessions and distribute materials to all employees.
   - roles: Training Coordinators, IT Support Staff, Security Officers
   - references: https://techcommunity.microsoft.com/blog/windows-itpro-blog/updating-microsoft-secure-boot-keys/4055324, https://support.microsoft.com/topic/e2b43f9f-b424-42df-bc6a-8476db65ab2f

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



change history

DatePropertyoldnew
2025-07-09MC prepareFirst, check on the latest available firmware from original equipment manufacturers (OEMs). Then, allow Microsoft to manage Windows updates, including Secure Boot updates:
Configure your organizational policies to allow at least the "required" level of diagnostic data.
Allow Microsoft to manage Secure Boot-related updates for your devices by setting the following registry key:
Registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot
Key name: MicrosoftUpdateManagedOptIn
Type: DWORD
DWORD value: 0x5944 (opt in to Windows Secure Boot updates)


If you prefer not to enable diagnostic data, please take this anonymous readiness survey.

Additional information:
Read Act now. Secure Boot certificates expire in June 2026.
Bookmark Secure Boot certificate rollout landing page.
Consult guidance for Windows devices for businesses and organizations with IT-managed updates.
For unmanaged scenarios, see Windows devices for home users, businesses, and schools with Microsoft-managed updates.
Follow guidance in Windows 11 and Secure Boot to check if it's enabled.
Get additional technical guidance at Updating Microsoft Secure Boot keys.
https://aka.ms/getsecureboot
https://forms.office.com/r/dX5V1Crsi0
https://support.microsoft.com/topic/29bfd847-5855-49f1-bb94-e18497fe2315
https://support.microsoft.com/topic/e2b43f9f-b424-42df-bc6a-8476db65ab2f
https://support.microsoft.com/windows/windows-11-and-secure-boot-a8ff1202-c0d9-42f5-940f-843abef64fad
https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856
https://techcommunity.microsoft.com/blog/windows-itpro-blog/updating-microsoft-secure-boot-keys/4055324
First, check on the latest available firmware from original equipment manufacturers (OEMs). Then, allow Microsoft to manage Windows updates, including Secure Boot updates:
Configure your organizational policies to allow at least the "required" level of diagnostic data.
Allow Microsoft to manage Secure Boot-related updates for your devices by setting the following registry key:
Registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot
Key name: MicrosoftUpdateManagedOptIn
Type: DWORD
DWORD value: 0x5944 (opt in to Windows Secure Boot updates)


If you prefer not to enable diagnostic data, please take this anonymous readiness survey.

Additional information:
Read Act now. Secure Boot certificates expire in June 2026.
Bookmark Secure Boot certificate rollout landing page.
Consult guidance for Windows devices for businesses and organizations with IT-managed updates.
For unmanaged scenarios, see Windows devices for home users, businesses, and schools with Microsoft-managed updates.
Follow guidance in Windows 11 and Secure Boot to check if it's enabled.
Get additional technical guidance at Updating Microsoft Secure Boot keys.
https://aka.ms/getsecureboot
https://aka.ms/SecureBootCA/ReadinessSurvey
https://support.microsoft.com/topic/29bfd847-5855-49f1-bb94-e18497fe2315
https://support.microsoft.com/topic/e2b43f9f-b424-42df-bc6a-8476db65ab2f
https://support.microsoft.com/windows/windows-11-and-secure-boot-a8ff1202-c0d9-42f5-940f-843abef64fad
https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856
https://techcommunity.microsoft.com/blog/windows-itpro-blog/updating-microsoft-secure-boot-keys/4055324
2025-07-09MC Last Updated06/26/2025 19:21:082025-07-09T01:35:43Z
2025-07-09MC MessagesIn the coming months, Microsoft will be rolling out updated Secure Boot certificates needed to ensure a secure startup environment of Windows. Current certificates will start expiring in June 2026 on all Windows systems released since 2012, except for 2025 Copilot+ PCs. This also affects third-party operating systems. Start by checking on the latest available firmware from original equipment manufacturers (OEMs) and enabling Windows diagnostic data. Visit the Secure Boot certificate rollout landing page for guidance for personal devices and IT-managed systems.

When will this happen:
In the coming months, the following updated certificates will be rolling out: Microsoft Corporation KEK 2K CA 2023, Microsoft Corporation UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, Windows UEFI CA 2023
June 2026, the following certificates will expire: Microsoft Corporation KEK CA 2011 and Microsoft Corporation UEFI CA 2011 (or third-party UEFI CA)
October 2026, the following certificate will expire: Microsoft Windows Production PCA 2011
Updated July 8, 2025: survey link changed


In the coming months, Microsoft will be rolling out updated Secure Boot certificates needed to ensure a secure startup environment of Windows. Current certificates will start expiring in June 2026 on all Windows systems released since 2012, except for 2025 Copilot+ PCs. This also affects third-party operating systems. Start by checking on the latest available firmware from original equipment manufacturers (OEMs) and enabling Windows diagnostic data. Visit the Secure Boot certificate rollout landing page for guidance for personal devices and IT-managed systems.

When will this happen:
In the coming months, the following updated certificates will be rolling out: Microsoft Corporation KEK 2K CA 2023, Microsoft Corporation UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, Windows UEFI CA 2023
June 2026, the following certificates will expire: Microsoft Corporation KEK CA 2011 and Microsoft Corporation UEFI CA 2011 (or third-party UEFI CA)
October 2026, the following certificate will expire: Microsoft Windows Production PCA 2011
2025-07-09MC Start Time06/26/2025 19:21:072025-07-09T01:35:41Z
2025-07-09MC TitleAct now: Secure Boot certificates expire in June 2026(Updated) Act now: Secure Boot certificates expire in June 2026
2025-07-09MC End Time06/26/2026 19:21:072026-07-09T01:35:41Z

Last updated 4 days ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!