Skip to Content

How do I manually update UEFI Secure Boot certificates if Windows Update fails?

Will my PC stop booting when the Windows Secure Boot certificate expires in June 2026?

Time is running out for Windows administrators and users. The root interaction between your hardware and operating system faces a critical expiration date. In June 2026, the original Secure Boot certificates—standardized 15 years ago during the Windows 8 era—will become invalid. Microsoft officially flagged this looming deadline in their technical community alert, “Act now: Secure Boot certificates expire in June 2026.”

While systems should theoretically boot post-deadline, relying on theory is dangerous in IT environments. Expired certificates compromise the trust chain. This failure affects both personal endpoints and enterprise fleets, potentially blocking secure boot processes or triggering recovery modes that disrupt business continuity.

The Technical Bottleneck: Why Windows Update Struggles

Microsoft has attempted to resolve this through standard Windows Update channels since 2023. These efforts have yielded inconsistent results. The fundamental issue lies in the diverse ecosystem of UEFI firmware.

  • The Mechanism: Updates must write new Key Exchange Keys (KEK) and Database (DB) updates directly to the motherboard firmware.
  • The Failure Point: Many OEM motherboards block OS-level write access to these secure regions. Consequently, automatic attempts to refresh these certificates “in waves” frequently fail on older or strictly locked-down hardware.

The Solution: Microsoft’s New Intune Playbook

To mitigate widespread failure, Microsoft Intune released the “Secure Boot playbook for certificates expiring in 2026” on February 2, 2026. This document serves as the official technical manual for IT professionals. It details three core phases:

  1. Preparation: Identifying vulnerable devices within your infrastructure.
  2. Execution: Methods to push certificate updates via Intune scripts, PowerShell, or manual UEFI flashing.
  3. Verification: Monitoring tools to confirm the new Trust Authority is active.

Advisor’s Assessment

Do not view the Playbook as a guaranteed fix. It presents an optimistic workflow that assumes modern, compliant hardware. Real-world application is messier. Reports indicate that specific hardware configurations completely reject software-based certificate rotation.

You must audit your specific hardware models immediately. If Microsoft’s automated scripts fail, you will likely face a labor-intensive process requiring manual BIOS/UEFI updates from the hardware manufacturer, not Microsoft. Prepare for scenarios where the “rosy picture” of remote remediation collapses, necessitating physical access to the device.