Skip to Content

How Do I Update Expiring Windows Secure Boot Certificates Before the June 2026 Deadline?

What Happens When Microsoft Secure Boot Certificates Expire and How Can Administrators Prepare?

The original Microsoft Secure Boot certificates will expire in June 2026. Microsoft issued these cryptographic keys 15 years ago to secure the Unified Extensible Firmware Interface (UEFI) against early-stage malware. Administrators must now replace these 2011 certificates with the new 2023 versions. Microsoft recently released comprehensive guidance and video sessions to help IT professionals manage this transition safely.

Understanding the 2026 Certificate Expiration

Secure Boot relies on digital certificates to verify that operating systems and hardware drivers come from trusted sources. The certificates integrated into millions of motherboards since 2011 are reaching the end of their lifecycle. Microsoft published a detailed TechCommunity post outlining the specific keys expiring in June 2026. Devices need the updated 2023 certificates stored directly in their UEFI firmware to maintain optimal protection.

Immediate Impact on Unpatched Systems

If a device misses the update before the 2011 certificates expire, the system will not crash immediately. Microsoft confirmed in a February 2026 blog post that existing software will continue running normally. However, the machine will enter a degraded security state. Systems lacking the 2023 certificates will lose the ability to install future Secure Boot security updates. They will also fail to trust third-party hardware components signed with the new certificates and could eventually fail to load newer operating systems.

Updating Windows Clients and Servers

Microsoft currently delivers the 2023 certificates to supported Windows clients via standard Windows Updates. The March 2026 security patches included specific telemetry improvements to help classify which machines can safely receive the automatic certificate exchange.

Conversely, Windows Servers do not receive these certificate updates automatically through Windows Update. Administrators must manually deploy the update package. You must modify the registry and trigger the designated scheduled task to inject the new certificates directly into the firmware. This manual requirement also applies to older, unsupported Windows clients that no longer receive automatic security patches.

Managing Hyper-V Virtual Machines

Virtual machines require special attention during this transition. The certificate exchange process for Hyper-V virtual machines running Windows guest operating systems requires distinct steps. Microsoft announced they would provide official support and dedicated update paths for these virtual environments starting in March 2026.

Accessing Official Microsoft Support Videos

To assist administrators navigating this process, Microsoft continues to provide direct support through various multimedia channels. The Windows IT Pro team published an instructional video on their X channel on March 9, 2026. Additionally, Microsoft hosted a dedicated Ask Me Anything (AMA) session on YouTube on February 5, 2026. A second AMA livestream airs today, March 12, 2026, at 4:00 PM on the Windows IT Pro YouTube channel. Administrators can consult these videos and the official Microsoft FAQ to ensure a smooth transition.