On 8 May 2026, every UK SME running a Windows estate is staring at the same calendar entry. In 42 days, on 19 June 2026, the cryptographic spine that has signed every Windows boot path on Earth for the last fifteen years — the Microsoft 2011 Secure Boot certificate chain — starts to expire. Devices will still turn on. Windows Update will still pull cumulative updates. BitLocker will not re-prompt. But from that date forward, any machine that has not been moved to the new 2023 certificate chain will be quietly locked out of every future Secure Boot security update Microsoft ships: no new Boot Manager updates, no new DBX revocations, no mitigations for boot-level vulnerabilities that surface in 2027, 2028 or beyond.
This is not a Windows 10 cliff. It is not a paid Extended Security Update. It does not need new hardware or a new licence. The 2023 chain is free, and Microsoft has been shipping it inside cumulative updates since October 2025. What it does need is engineering time, an honest inventory of every Windows endpoint and server in your estate, and a deployment plan that lands on the right side of Patch Tuesday on 12 May 2026 — according to Help Net Security’s May forecast, the last comfortable patch window before the June expiry. This is the full UK SME action plan: what is changing, what stops working, the four supported deployment paths, the PowerShell verification kit, the Cyber Essentials v3.3 Danzell angle, and a 42-day rollout sequence keyed to the 0x5944 registry value and the \Microsoft\Windows\PI\Secure-Boot-Update scheduled task.
What Microsoft has actually announced
The Microsoft IT Pro team and the wider Windows engineering organisation have, over the last seven months, published the most detailed and most accessible certificate-rotation plan in the platform’s history. The headline is straightforward: four certificates that have signed Windows Boot Managers, third-party UEFI bootloaders, Option ROMs and the DBX revocation lists since 2011 are reaching their fifteen-year design life and rolling over to a parallel set of 2023 certificates. The pivot points are calendar dates, not telemetry-triggered events, and once the dates land they will not move.
Two of the four expiring CAs — Microsoft Corporation KEK CA 2011 (the Key Exchange Key that signs DB and DBX updates pushed by Microsoft) and Microsoft UEFI CA 2011 (the third-party CA that signs Linux shims, GRUB and Option ROM signatures for network cards, RAID controllers and discrete GPUs) — expire in June 2026. The third CA, Microsoft Windows Production PCA 2011 (the cert that signs the Windows Boot Manager itself), follows on 14 October 2026. Each one is being replaced by a named 2023 successor stored in either KEK or DB on the device’s firmware: Microsoft Corporation KEK 2K CA 2023, Microsoft UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, and Windows UEFI CA 2023. The Option ROM bifurcation is new — one 2011 CA is being replaced by two 2023 CAs to cleanly separate operating-system bootloader signing from peripheral firmware signing.
Microsoft began shipping the 2023 CAs as part of October 2025 cumulative updates, which is when the chain-of-trust transition started. The January 2026 cumulative updates moved the rollout from optional to phased automatic deployment for ‘high-confidence’ devices — estates whose hardware vendors and firmware versions Microsoft has verified work cleanly with the new chain. The April 2026 cumulative updates added a Secure Boot certificate status panel inside the Windows Security app, so end users and IT administrators can see, on a single screen and without PowerShell, whether a device is on the 2011 or 2023 chain. The IT pro landing page is https://aka.ms/GetSecureBoot and is the single source of truth for the rollout.
The cliff is not just the certificate clock. After June 2026, Microsoft will publish a DBX revocation that explicitly blocks any bootloader signed only with Microsoft UEFI CA 2011, and that DBX update will reach devices through Windows Update. From that point a 2011-only device is locked out of new third-party bootloaders — new Linux ISOs that ship with shims signed under the 2023 CA, security recovery tools, and any Option ROM firmware that has been re-signed under the 2023 chain. The local UEFI clock thinking the certificate is still valid does not save you. The DBX revocation is the hard cliff, not the calendar.
The 2025-2026 timeline at a glance
How urgent is each certificate, in days
Translating the above into a single ranked view of remaining time helps prioritise the rollout. The 19 June expiries are the binding constraint. The DBX revocation window is a Microsoft-defined cadence rather than a single date, but the published guidance places it within a few weeks of the June expiries. The 14 October Production PCA is the longest pole in the tent but it is the one that breaks future feature updates, not just future security updates.
What still works after June — and what does not
One of the most useful framings of this rollover, and the one most worth communicating to non-technical leadership in your SME, is the difference between ‘continues working’ and ‘stops getting updates’. The 2011 chain expiring does not brick devices. It does not prevent Windows from booting. It does not stop the Defender engine from updating, BitLocker from unlocking the volume, or Windows Update from pulling cumulative updates. Standard application code-signing chains are completely unaffected — this is UEFI / pre-OS code only.
What does change is the device’s ability to receive future Secure Boot updates. After June, a 2011-only device will be unable to install new Boot Manager updates Microsoft ships in subsequent cumulative updates, will not pull new DBX revocations, and once Microsoft pushes the post-June DBX revocation of UEFI CA 2011, will refuse to load third-party bootloaders signed only with the old CA. New Linux distribution releases that use a 2023-signed shim, security tools that ship their own bootloader, and any Option ROM firmware updates re-signed under the 2023 chain will all be blocked. The donut below is the cleanest visual we have for this divide.
How ready is your estate, honestly
Before you push any registry value or stage any GPO, the highest-leverage action is an honest readiness assessment. The score grid below is the one Cloudswitched uses with new IT Support clients in the first conversation. Each row is binary in spirit but expressed on a Red / Amber / Green scale because in practice an SME estate is rarely all the way to one extreme. If three or more rows score Red, the 12 May Patch Tuesday is your ‘decision’ window, not your ‘deploy’ window — meaning you spend the next four days doing inventory, not certificate updates.
What it costs in engineering time, by estate size
The licence column of the cost table for this rollover is mercifully simple: the 2023 CAs ship inside ordinary cumulative updates, so the answer is £0 across the board for every supported version. There is no Extended Security Update equivalent, no per-device fee, and no Microsoft 365 add-on required. The cost is entirely engineering time, and the curve scales with estate size and with how distributed and how heterogeneous your hardware is. A 30-endpoint single-site SME with Microsoft 365 Business Premium and Intune is a genuinely different shape of project from a 250-endpoint multi-site SME with mixed Surface, Dell and HP hardware on a slow firmware patching cadence.
| Estate size | Engineering time (planning + rollout + verification) | Recommended deployment path | Licence cost |
|---|---|---|---|
| 5–25 endpoints, single site | Approximately 4 hours | Registry plus scheduled task per device, run during a quiet morning | £0 |
| 25–100 endpoints, single or two-site | Approximately 1 day | Group Policy Preferences pushing the 0x5944 registry value, plus PowerShell remoting for verification | £0 |
| 100–500 endpoints, multi-site | 2–4 days | Intune Settings Catalog Secure Boot policy, ring-deployed (pilot ring, broad ring, exception ring) | £0 |
| 500+ endpoints, mixed Intune/SCCM | 1–2 weeks (project shape) | Hayes Jupe SCCM task sequence pattern, plus Intune Settings Catalog for cloud-managed devices, plus exception register for legacy hardware | £0 |
| Servers (2012 ESU through 2025) | Approximately 2 hours per server cluster, change-controlled | Manual registry / scheduled task during a planned maintenance window, with cluster-level reboot orchestration | £0 (free even on 2012 ESU paths) |
Three deployment postures — and the failure mode of each
The choice you actually face is not technical. It is a posture choice between waiting and seeing, phasing the rollout before 12 May Patch Tuesday, or holding back to a single big-bang deployment in late June. Each one has a different failure mode, a different cost, and a different conversation with leadership and with your cyber insurance renewal questionnaire. The Cloudswitched recommendation, set out under the ‘Phase before 12 May’ column, is the one most likely to leave you with the smallest support load and the cleanest evidence for Cyber Essentials.
Wait and see
- Phased auto-deployment only covers high-confidence devices. Fleet outliers are excluded by design.
- No visibility into which devices have actually flipped. The April status panel helps, but no one is opening it.
- June arrives and a meaningful percentage of the estate is still 2011-only. Now you are doing emergency response, not planned ops.
- Cyber Essentials v3.3 A2.4 evidence is incomplete. Insurance questionnaire scores the estate as exposed.
Phase before 12 May Patch Tuesday
- Pilot ring of 5–10% of devices on Friday 9 May. Validate via Get-UEFICertificate and Windows Security app.
- Broad rollout Monday 12 May aligns with Patch Tuesday so the reboot is bundled with the regular CU reboot users already expect.
- Exception ring for any device that fails the pilot. You have until 19 June to resolve, with a clear remaining-budget number.
- Cyber Essentials evidence and insurance questionnaire both pass cleanly. Audit trail is short and chronological.
Big-bang in late June
- All deployment work compressed into a 5–7 day window with zero room for hardware-specific failure.
- Reboots are not aligned with normal patch reboots, so users notice and helpdesk volume spikes.
- Any failure means the device misses 19 June, ends up on the wrong side of the DBX revocation, and now needs out-of-band remediation.
- Late June is also peak holiday cover season for UK SMEs — the worst possible time to be dependent on senior engineers.
The 10-step rollout plan, in order, with dependencies
This is the sequence a managed IT Support team would run for a typical 50–200 endpoint UK SME starting today. The percentages on the progress bars represent how much of the work the average estate has typically already done by 8 May 2026 — based on Microsoft’s phased rollout signals, not a sourced UK statistic. If your numbers are materially worse than these, treat them as a calibrated warning, not a benchmark.
Cyber Essentials v3.3 Danzell exposure if you do nothing
The UK Cyber Essentials v3.3 control set, published as the Danzell update on 27 April 2026, includes A2.4 covering boot security. The control text reads, in our paraphrase, that boot processes must be ‘secure boot enabled and supported by current vendor security updates.’ A device on the 2011 chain after 19 June can still report Secure Boot as enabled in the firmware menu, but it has been cut off from current vendor security updates — specifically the new DBX revocations Microsoft will publish under the 2023 chain. That is, on our reading of the control text, an A2.4 gap. The gauge below visualises the exposure trajectory if you take no action.
The four supported deployment paths, with the exact registry values
Microsoft documents four supported paths to apply the 2023 CAs. Each one ends up writing the same registry value and triggering the same scheduled task. The choice of path is operational, not technical — pick the one that matches how you already manage Windows policy in your estate.
1. Registry — set HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates to 0x5944 (DWORD). Then run the scheduled task \Microsoft\Windows\PI\Secure-Boot-Update. Reboot. Re-run the scheduled task. Verify. This is the path Microsoft documents first and it is what every other path ultimately invokes.
2. Group Policy / Intune Settings Catalog — push the same AvailableUpdates DWORD value of 0x5944 through GPO Preferences and Registry, or via Intune’s Settings Catalog Secure Boot policy. The Settings Catalog has a dedicated Secure Boot Certificate Update profile that abstracts the registry write away from the administrator.
3. WinCS APIs (Windows Customer Self-help) — the programmatic path used by OEMs and large fleet management tools. Most UK SMEs do not need this directly; their managed-services partner or RMM platform might.
4. SCCM / MECM — covered by the published Hayes Jupe task sequence pattern. Recommended for estates with established imaging pipelines and a strong preference for the SCCM compliance reporting model. The same registry value and the same scheduled task path are used inside the task sequence.
The PowerShell verification kit
Whichever deployment path you choose, the verification step is identical. It is also the step most often skipped — the registry write returns success even if the scheduled task subsequently fails, so verifying the actual cert state on the device is the only honest signal. The kit below is small enough to paste into a remote PowerShell session and big enough to be definitive. After reboot, re-run Get-UEFICertificate and confirm all four 2023 CAs are present.
Confirm Secure Boot is on: Confirm-SecureBootUEFI
List every CA in DB / KEK / DBX: Get-UEFICertificate | Format-Table Database, Subject, NotAfter (uses the community Get-UEFICertificate script — see source 10).
Trigger the certificate update task explicitly: Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name AvailableUpdates -Value 0x5944 -Type DWord followed by Start-ScheduledTask -TaskPath "\Microsoft\Windows\PI\" -TaskName "Secure-Boot-Update" followed by a Restart-Computer. After the reboot, re-run Get-UEFICertificate and confirm the four 2023 CAs are present in DB / KEK.
Your 42-day plan in five steps, at a glance
| # | Action | Owner | By when |
|---|---|---|---|
| 1 | Build a complete inventory: every Windows endpoint and server, with build, edition, OEM, and last-CU date. | IT lead | Friday 9 May 2026 |
| 2 | Bring every device current to at least the April 2026 CU. Address any device more than two CUs behind. | IT lead | Saturday 10 May 2026 |
| 3 | Pilot the 0x5944 registry value plus scheduled task on a representative ring of 5–10% of devices. Verify with Get-UEFICertificate. | IT lead / partner | Sunday 11 May 2026 |
| 4 | Broad rollout via GPO Preferences or Intune Settings Catalog, aligned to 12 May Patch Tuesday. Bundle reboot with the CU reboot. | IT lead / partner | Tuesday 12 May 2026 |
| 5 | Build the exception register, document Cyber Essentials v3.3 A2.4 evidence, and verify the four 2023 CAs are present on every device. | IT lead | Friday 16 May 2026 |
How this fits with the rest of your in-flight Windows estate work
This rollover does not happen in isolation. Every UK SME running Windows is currently juggling at least three other estate-level workstreams, and Secure Boot 2023 has touchpoints with each. The most important one to be precise about is the Windows 10 14 October 2026 ESU cliff — same calendar quarter, same Windows estate, completely different event. Conflating them is the most common briefing-paper error in this space, and it leads to the wrong budget conversation with leadership.
Our prior coverage of the broader Windows estate transition lives at the Windows 10 October 2026 final cliff piece, which sets out the ESU side of the estate decision. The Cyber Essentials v3.3 control set that the A2.4 boot security control sits inside is detailed in the Cyber Essentials v3.3 Danzell deadline brief. For context on Microsoft platform reliability over the same window, our Microsoft 365 / Azure outage wave 2026 piece sits alongside this rollout. The wider patching cadence picture — this Patch Tuesday is not just the Secure Boot Tuesday — is in the Palo Alto PAN-OS zero-day action plan, which is sister coverage of this week. The breach-rate framing for leadership conversations is in the UK Cyber Security Breaches Survey 2025/2026 SME wake-up call piece. And the broader UK government posture on SME cyber resilience is set out in the UK cyber resilience pledge / CyberUK 2026 piece.
Need a managed Secure Boot 2023 rollout for your London or Home Counties SME?
Our IT Support team runs Secure Boot 2023 rollouts as a packaged engagement: inventory, pilot ring, broad rollout aligned to your next Patch Tuesday, exception register and Cyber Essentials evidence pack. Fixed-fee for estates up to 250 endpoints. Phased for larger estates. Every reboot bundled with the cumulative update reboot users already expect.
Talk to IT SupportFrequently asked questions on the 2026 Secure Boot rollover
Where this leaves the UK SME conversation in May 2026
The Secure Boot 2023 rollover is the rare estate-level change that has all of the right properties for a clean managed rollout: it is calendar-driven rather than incident-driven, the deployment paths are well documented, the verification is mechanical, and the cost is engineering time rather than licence spend. The risk profile is asymmetric — doing it on time is uneventful, doing it late is an incident. The opportunity cost of a 12 May rollout is one Tuesday afternoon and one bundle of regular CU reboots. The opportunity cost of a 19 June rollout, even if it goes well, is having a meaningful percentage of your estate on the wrong side of the DBX revocation for some unbounded number of days while your team chases exceptions in the dark.
The Cyber Essentials v3.3 angle reinforces the calendar. A2.4 evidence is reviewed at renewal, and renewals happen on the anniversary of the original certificate. If your Cyber Essentials renewal falls in summer or autumn 2026, the assessor will look for evidence that the boot security posture was maintained continuously through the rollover — not just patched up the day before the assessment. That is a different evidence pack from a one-off remediation log, and it is much easier to produce if your rollout window was 12 May rather than 19 June minus three days.
Make 12 May Patch Tuesday the day Secure Boot 2023 lands cleanly across your estate
Our IT Support team handles the inventory, the pilot ring, the broad rollout aligned to Patch Tuesday, the exception register and the Cyber Essentials v3.3 A2.4 evidence pack. For organisations also working through their Cyber Essentials v3.3 control set, the same engagement can be packaged with our Cyber Essentials consulting work to update the wider control evidence at the same time.
Plan your Secure Boot 2023 rollout


