Windows Secure Boot Certificate Updates in 2026: What IT Admins Need to Do Now

Windows Secure Boot Certificate Updates in 2026: What IT Admins Need to Do Now

User avatar placeholder
Written by Dave W. Shanahan

April 12, 2026

If you manage Windows devices, Secure Boot just moved from “nice to have” to “you really can’t ignore this anymore.”

Starting in 2026, older Secure Boot certificate authorities begin to expire, and Microsoft is rolling out new certificates, tools, and admin experiences to keep devices protected.

What’s happening with Secure Boot certificates?

Windows Secure Boot Certificate Updates in 2026: What IT Admins Need to Do Now

Secure Boot relies on UEFI firmware and cryptographic keys (certificate authorities) to make sure only trusted firmware and bootloaders run at startup.

Some of the older Secure Boot certificates—dating back to 2011—start expiring in June 2026, and organizations need to have the newer 2023 certificate authorities installed before that happens.

Key points:

  • Many PCs manufactured since 2024 already ship with the 2023 certificates.

  • For older devices, Microsoft is delivering updated Secure Boot certificates through Windows monthly updates, while OEMs are providing firmware updates where needed.

  • If you do nothing, you risk devices eventually failing Secure Boot validation when the older certs expire.

Microsoft has published a Secure Boot playbook that outlines the rollout and offers guidance on which devices need attention and how to stage the updates safely.

New Windows and PowerShell tools to help

Windows Secure Boot Certificate Updates in 2026: What IT Admins Need to Do Now

 

To make this manageable at scale, Microsoft has started shipping new admin tools:

  • The Windows Security app now surfaces clearer information about the status of Secure Boot certificate updates on supported devices, rolling out automatically starting in April 2026.

  • The Get‑SecureBootUEFI PowerShell cmdlet now has a -Decoded flag so you can view Secure Boot certificates in a readable format instead of raw data blobs.

  • A new Get‑SecureBootSVN cmdlet lets you check the Secure Boot Security Version Number (SVN) for the device’s UEFI firmware and bootloader, so you can verify that the latest Secure Boot policy is applied.

These tools are designed to help you inventory which machines are compliant, which ones still rely on older certs, and where firmware updates might be required.

What IT admins should do next

Here’s a practical, phased approach you can turn into a quick internal plan:

  1. Inventory your fleet

    • Use your device management platform (Intune, ConfigMgr, etc.) plus the new PowerShell cmdlets to identify devices that:

      • Have Secure Boot enabled.

      • Are still using older Secure Boot certificate authorities.

  2. Verify certificate status and SVN

    • Run Get-SecureBootUEFI -Decoded to inspect the installed certificates.

    • Use Get-SecureBootSVN to confirm that devices reflect the latest Secure Boot policy level.

  3. Stage OS and firmware updates

    • Make sure devices are receiving the latest monthly Windows updates, which include the new Secure Boot certificates.

    • Coordinate with OEM vendors to apply any required UEFI/firmware updates, especially for systems manufactured before 2024.

  4. Watch for new warnings in Windows Security

    • Educate your helpdesk and endpoint teams to look for new Secure Boot warnings in the Windows Security app as these experience updates roll out from April 2026 onward.

  5. Plan for June 2026 and beyond

    • Treat June 2026 as a hard milestone for having all critical systems updated—servers, domain controllers, and high‑sensitivity endpoints should be first in line.

The bottom line: this isn’t a flashy feature, but letting Secure Boot certificates lapse could leave devices exposed at the earliest stage of boot, where traditional antivirus can’t help.

Recent Posts You Might Like


Discover more from Microsoft News Now

Subscribe to get the latest posts sent to your email.

Image placeholder

I'm Dave W. Shanahan, a Microsoft enthusiast with a passion for Windows, Xbox, Microsoft 365 Copilot, Azure, and more. I started MSFTNewsNow.com to keep the world updated on Microsoft news. Based in Massachusetts, you can email me at davewshanahan@gmail.com.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.