Secure Boot Expiry Alert: Fix Affected Device Certificates (using the Intune Method)
Written by Connor Dean | Modern Workplace Specialist
Continuing on from our detection
Now that we have identified secure boot certificates that are due for expiry in the previous article (Secure Boot Cert Expiry: Detection), we can remediate them using the steps below.
The easiest way to do this is via an Intune Policy which I will document here. Other methods are possible and can be found in the playbook linked below.
Resources
Playbook: Microsoft Playbook Article
Deploying the Intune Policy
Log in to https://intune.microsoft.com/
Navigate to ‘Devices’ → ‘Windows’ → ‘Configuration’
Click ‘Create’ and select Platform: ‘Windows 10 and later’, Profile Type: ‘Settings Catalog’ and choose ‘Create’ again.
Enter a name and description.
Add the settings, in the search enter ‘Secure boot’. Then select the 3 settings, see their descriptions below:
Enable SecureBoot Certificate Updates - This policy controls whether Windows initiates the Secure Boot certificate deployment process on devices.
Configure Microsoft Update Managed Opt In - This policy allows your organization to participate in a Controlled Feature Rollout of Secure Boot certificate update managed by Microsoft.
Configure High Confidence Opt-Out - This policy controls whether Secure Boot certificate updates are applied automatically through Windows monthly security and non-security updates.
I will be enabling the first two and will leave ‘Configure High Confidence Opt-Out’ disabled.
Further details can be seen here: Intune Method for Secure Boot Cert Fix | Microsoft Support
Then assign this to your devices, this will then allow them to receive the new certificates.
This can then be monitored by your remediation script or Windows Autopatch report mentioned in part 1.
Verifying Success
Go to the previously created remediation script or the Windows Autopatch report and wait for an update on if the device needs action.
If after a few syncs it is still reporting incorrectly then further diagnosis might be required.
It should look like this once successful.
Report
Detection Script


