<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Connor Dean]]></title><description><![CDATA[A blog to document solutions and findings within the Microsoft Ecosystem.
I will cover things like:
Microsoft Admin Centres (Exchange/SharePoint/Teams)
Microsoft Intune
Microsoft Security
Microsoft Purview]]></description><link>https://www.connordean.co.uk</link><image><url>https://cdn.hashnode.com/uploads/logos/69c01ab5d9da55a9a5b416d5/22dd65c0-6f64-4f26-bc6b-1e1773e8f7fb.png</url><title>Connor Dean</title><link>https://www.connordean.co.uk</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 16:15:02 GMT</lastBuildDate><atom:link href="https://www.connordean.co.uk/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Secure Boot Expiry Alert: Fix Affected Device Certificates (using the Intune Method)]]></title><description><![CDATA[Continuing on from our detection
Now that we have identified secure boot certificates that are due for expiry in the previous article (Secure Boot Cert Expiry: Detection), we can remediate them using ]]></description><link>https://www.connordean.co.uk/secure-boot-cert-expiry-remediation-intune</link><guid isPermaLink="true">https://www.connordean.co.uk/secure-boot-cert-expiry-remediation-intune</guid><dc:creator><![CDATA[Connor]]></dc:creator><pubDate>Mon, 23 Mar 2026 22:13:09 GMT</pubDate><content:encoded><![CDATA[<h2>Continuing on from our detection</h2>
<p>Now that we have identified secure boot certificates that are due for expiry in the previous article (<a href="https://www.connordean.co.uk/secure-boot-cert-expiry-detection">Secure Boot Cert Expiry: Detection</a>), we can remediate them using the steps below.</p>
<p>The easiest way to do this is via an Intune Policy which I will document here. Other methods are possible and can be found in the playbook linked below.</p>
<h3>Resources</h3>
<p>Playbook: <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/secure-boot-playbook-for-certificates-expiring-in-2026/4469235#community-4469235-_option1">Microsoft Playbook Article</a></p>
<hr />
<h2>Deploying the Intune Policy</h2>
<p>Log in to <a href="https://intune.microsoft.com/.">https://intune.microsoft.com/</a></p>
<p>Navigate to ‘Devices’ → ‘Windows’ → ‘Configuration’</p>
<p>Click ‘Create’ and select Platform: ‘Windows 10 and later’, Profile Type: ‘Settings Catalog’ and choose ‘Create’ again.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/ffeca2f6-81e9-402a-a110-fa0fa4b47592.png" alt="Create a Windows Config Profile" style="display:block;margin:0 auto" />

<p>Enter a name and description.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/6a275a8d-cf68-4662-a57c-6602b5bfc0c8.png" alt="Enter a name and description for the profile" style="display:block;margin:0 auto" />

<p>Add the settings, in the search enter ‘Secure boot’. Then select the 3 settings, see their descriptions below:</p>
<ul>
<li><p>Enable SecureBoot Certificate Updates - This policy controls whether Windows initiates the Secure Boot certificate deployment process on devices.</p>
</li>
<li><p>Configure Microsoft Update Managed Opt In - This policy allows your organization to participate in a <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/commercial-control-for-continuous-innovation/3737575">Controlled Feature Rollout</a> of Secure Boot certificate update managed by Microsoft.</p>
</li>
<li><p>Configure High Confidence Opt-Out - This policy controls whether Secure Boot certificate updates are applied automatically through Windows monthly security and non-security updates.</p>
</li>
</ul>
<p>I will be enabling the first two and will leave ‘Configure High Confidence Opt-Out’ disabled.</p>
<p>Further details can be seen here: <a href="https://support.microsoft.com/en-us/topic/microsoft-intune-method-of-secure-boot-for-windows-devices-with-it-managed-updates-1c4cf9a3-8983-40c8-924f-44d9c959889d">Intune Method for Secure Boot Cert Fix | Microsoft Support</a></p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/e9862948-9357-4c64-b316-7c17bf417eae.png" alt="Settings Catalog settings" style="display:block;margin:0 auto" />

<p>Then assign this to your devices, this will then allow them to receive the new certificates.</p>
<p>This can then be monitored by your remediation script or Windows Autopatch report mentioned in part 1.</p>
<hr />
<h2>Verifying Success</h2>
<p>Go to the previously created remediation script or the Windows Autopatch report and wait for an update on if the device needs action.</p>
<p>If after a few syncs it is still reporting incorrectly then further diagnosis might be required.</p>
<p>It should look like this once successful.</p>
<h3>Report</h3>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/4a66d70f-d85d-4240-8538-bf1b901310ab.png" alt="" style="display:block;margin:0 auto" />

<h3>Detection Script</h3>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/9ebd101a-5e77-4a09-ab8d-c86675d3e296.png" alt="" style="display:block;margin:0 auto" />]]></content:encoded></item><item><title><![CDATA[Secure Boot Expiry Alert: Detect Affected Devices Using Autopatch Reports]]></title><description><![CDATA[What is happening to Secure Boot certificates?
Secure Boot certificates are expiring this year. Recently built devices (manufactured 2023 and after) will likely not face any issues however most organi]]></description><link>https://www.connordean.co.uk/secure-boot-cert-expiry-detection</link><guid isPermaLink="true">https://www.connordean.co.uk/secure-boot-cert-expiry-detection</guid><dc:creator><![CDATA[Connor]]></dc:creator><pubDate>Sun, 22 Mar 2026 20:46:58 GMT</pubDate><content:encoded><![CDATA[<h2>What is happening to Secure Boot certificates?</h2>
<p>Secure Boot certificates are expiring this year. Recently built devices (manufactured 2023 and after) will likely not face any issues however most organisations will likely have older infrastructure to patch, you need to act now!</p>
<p>See the below article from Microsoft:</p>
<p><a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856">Microsoft Playbook Article</a></p>
<h3>How long do I have?</h3>
<p>These certificates will expire July 2026. After that point there will likely be a large influx of tickets.</p>
<h3>What do I need to do?</h3>
<p>Start capturing which devices are expiring using the methods below, then remediate by deploying the fix via Intune Policy + other methods (<a href="https://www.connordean.co.uk/secure-boot-cert-expiry-remediation-intune">Secure Boot Cert Expiry: Remediation - Intune Method</a>)</p>
<h3>Resources</h3>
<p>Microsoft's Playbook: <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/secure-boot-playbook-for-certificates-expiring-in-2026/4469235#community-4469235-_option1">Microsoft Playbook Article</a></p>
<hr />
<h2>Detecting via Windows Autopatch Reports</h2>
<p>If you have Windows Autopatch running on your Intune devices then it’s pretty simple to identify which devices need upgrading.</p>
<p>Start by logging into <a href="https://intune.microsoft.com">https://intune.microsoft.com</a>.</p>
<p>Then navigate to the report by selecting ‘Reports’ in the side bar → then under ‘Windows Autopatch’ select ‘Windows quality updates’.</p>
<p>You should be on a screen like this:</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/f82a54c0-c815-46f2-b5ac-d4894b410846.png" alt="Reports View - Windows quality updates" style="display:block;margin:0 auto" />

<p>Select ‘Reports’ next to open the next tab.</p>
<p>Then choose ‘Secure boot status’ (see below):</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/509c664f-762d-4253-bda7-328b994b6805.png" alt="Secure Boot Status under Reports" style="display:block;margin:0 auto" />

<p>This will show/generate the Secure Boot report which allows you to see which devices require attention and updating.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/69fb0fbd-f8f4-4736-8cfe-3119bee233ca.png" alt="Secure Boot Status Report" style="display:block;margin:0 auto" />

<p>The process for fixing the certificates can be seen in the next post.</p>
<hr />
<h2>Detecting via Detection Script</h2>
<p>Alternatively, if you don’t have Windows Autopatch deployed then you can use a Detection Script.</p>
<p>Start by going to this link which contains the Microsoft recommended script for detecting the secure boot certificate status: <a href="https://support.microsoft.com/en-gb/topic/sample-secure-boot-inventory-data-collection-script-d02971d2-d4b5-42c9-b58a-8527f0ffa30b">Secure Boot Cert Expiry | Detection Script</a></p>
<p>Then, log into <a href="https://intune.microsoft.com">https://intune.microsoft.com</a>.</p>
<p>Navigate to Scripts and Remediation by clicking ‘Devices’ → ‘Windows’ → under ‘Manage devices’ select ‘Scripts and remediations’.</p>
<p>You should then see your Remediations and Platform scripts.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/57a35f01-a76d-4d51-96c0-3cf404c8eb99.png" alt="Scripts and remediations" style="display:block;margin:0 auto" />

<p>Click ‘Create’. This will open a new window.</p>
<p>Enter a name and description for the script like below, then click next.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/1b52fb51-021b-4a9c-b473-a5465263ac4f.png" alt="Name and Description for Script" style="display:block;margin:0 auto" />

<p>Upload the script file, in the ‘Detection script file’ area. Leave the ‘Remediation script file’ blank.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/51cda3b3-f9fc-48aa-a6e4-515e3ad40281.png" alt="Detection Script upload" style="display:block;margin:0 auto" />

<p>Scroll down and ensure that ‘Run script in 64 bit PowerShell’ is set to ‘Yes'. Then click next.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/ff2f9657-d9d7-4826-9c70-9c0089d22604.png" alt="Script parameters" style="display:block;margin:0 auto" />

<p>Apply scope tags if necessary, click next.</p>
<p>Then select your devices to be monitored, since I have a small amount of devices I have chosen ‘All Devices’.</p>
<p>Finally, click next, then review and create.</p>
<p>The script will run and will report on devices, check back periodically to see if there are any hits.</p>
<p>If there are, then you will need to remediate, this will be documented in a forthcoming guide.</p>
<img src="https://cdn.hashnode.com/uploads/covers/69c01ab5d9da55a9a5b416d5/0f7403ec-9276-4055-a607-3ff0a3f2b2b0.png" alt="Detection Script statuses" style="display:block;margin:0 auto" />]]></content:encoded></item></channel></rss>