Secure Boot 2026 BIOS Assessment Toolkit

Multi-vendor fleet readiness for the UEFI CA 2011 certificate transition. SCCM and Intune assessment, Phase 1 and Phase 2 remediation, a GUI vendor editor, and Dell, HP, and Lenovo readiness databases covering 2,920 models.

📖 20 min read
🎯 Advanced
🔧 PowerShell Toolkit
💡 Dell · HP · Lenovo · 2,920 Models

Introduction

The Secure Boot 2026 certificate transition touches every physical Windows device in your organization. Every workstation, laptop, and server needs a firmware update and a certificate deployment before the old Microsoft certificate expires in 2026. A separate second-phase rollout is required on top of that to close the BlackLotus vulnerability. Leave devices behind and you carry real risk: unpatched exposure to the very vulnerability these mitigations address, and an out-of-support state as Microsoft and OEMs move forward with the new chain.

Microsoft ships the platform but leaves the hard part to you: figuring out which of your hundreds or thousands of devices actually need firmware updates, which are covered by automatic rollout, and which will be left behind. This done-for-you toolkit takes that problem off your plate. Point it at your existing management environment, get a clear picture of your fleet's readiness, and roll out both phases on your own timeline with confidence.

Get Instant Access to This Solution

Join the membership platform and get the complete toolkit plus the April 2026 workshop slides

MVP-Built Solutions • Production-Ready • Complete Documentation

The Problem

Every organization running a mixed Windows fleet hits the same wall when it starts planning the Secure Boot 2026 transition:

  • Firmware comes before certificates: deploying the new certificates on devices with outdated BIOS silently fails. Without knowing which devices need firmware updates first, the rollout stalls before it starts.
  • Three vendors, three formats, thousands of models: Dell, HP, and Lenovo each publish their own readiness documentation with different models, version formats, and naming conventions. Cross-referencing your fleet against all three by hand does not scale.
  • No built-in visibility from Microsoft: the tools Microsoft provides are narrow, require specific telemetry and tenant settings, and cover only part of the transition.
  • The second phase is a breaking change: the post-certificate revocation step affects legacy boot and recovery media. You need to know exactly what will break before you trigger it, and you need to track completion on every device.
  • Servers don't auto-update: every physical server and every Azure Gen2 VM must be explicitly triggered and tracked. Nothing happens on its own.
  • Microsoft's auto-deploy list is opaque: Microsoft will auto-deploy the update to specific models, but the data is buried and there is no portal to query. You can't plan around it without the data in hand.
Without a fleet-wide toolkit: manual research across three vendor sources, ad-hoc scripts, and guesswork is the norm. The deadline does not move.

Solution Overview

An end-to-end, production-tested solution for the Secure Boot 2026 transition. Everything you need to go from "we haven't started" to "we're fully rolled out" across SCCM-managed, Intune-managed, server, and cloud environments. Delivered as a single package with no agents to install and no infrastructure to stand up.

Secure Boot BIOS Readiness Report

Interactive readiness report: executive summary, vendor breakdown, and per-device detail at a glance

Immediate Value: Point the toolkit at your existing SCCM or Intune environment and get a board-ready readiness report in minutes. Every device classified, every model categorized, every exception flagged.

What's in the Toolkit

Five capability areas, delivered as a single download. Pick the ones that match your environment.

1. Fleet Assessment

Run one command against your existing management environment and receive a complete readiness report for every device. Works against Configuration Manager for on-prem fleets and Microsoft Graph for Intune-managed fleets, and covers both workstation and server scenarios. Output is an interactive HTML dashboard with a searchable, sortable device table, vendor breakdown, and executive summary cards.

2. Per-Device Diagnostic and Remediation

Tooling that runs on individual devices to diagnose exactly where each one sits in the transition and safely trigger both rollout phases. Includes prerequisite validation, safe sequencing, and a read-only detection mode that plugs into SCCM Configuration Items and Intune Remediations for compliance tracking through your existing reporting.

Second-phase rollout is a breaking change: revoking the old certificate affects legacy boot and recovery media. The toolkit's per-device tooling handles the prerequisite checks and safe sequencing, but your environment still needs preparation. The included project plan walks you through it.

3. Vendor Readiness Databases

Curated readiness data for Dell, HP, and Lenovo covering thousands of device models, sourced from each vendor's official Secure Boot documentation and maintained through 2026 as vendors publish new firmware. Every entry is classified so you know at a glance whether a model is ready, pending a vendor update, or will never receive one. Cross-referenced with Microsoft's own automatic-deployment list so you can tell which devices Microsoft will cover and which you need to handle yourself.

4. Vendor Database Editor

A Windows GUI for extending the vendor databases when you encounter a model that is not already covered. Validation, safeguards against bad entries, and automatic backups so you can extend the data without risking the core databases. You stay in control of what goes into your environment.

Secure Boot Vendor Data Editor

Vendor Data Editor with validation, search, and safe extension of the built-in databases

5. Progress Tracking

Every assessment run is saved as a point-in-time snapshot. Aggregate multiple snapshots into a trend report showing how your fleet's readiness improves week over week. Ideal for showing progress to management, tracking SLAs, and demonstrating the rollout is on course for the deadline.

Secure Boot Progress Report

Trend report showing fleet readiness improving over successive assessment runs

Bonus: Secure Boot Speed Date Workshop Slides

Members also receive the full PDF slide deck from the Secure Boot Speed Date Workshop delivered in April 2026. The workshop is structured around two core parts: a deep-dive on assessment (how to size up your fleet and interpret the readiness data) and a deep-dive on deployment (how to roll out both phases with confidence). Throughout, the slides walk through exactly how to apply the toolkit in your own environment.

Key Benefits

For Infrastructure Teams

  • Fleet-wide readiness in minutes, not weeks: replaces manual cross-referencing with a single command
  • Zero agents to install: works against your existing inventory sources
  • Multi-vendor coverage maintained for you: vendor readiness data kept current as Dell, HP, and Lenovo publish updates
  • Progress tracking built in: snapshot-based trend reports show remediation velocity

For Security Teams

  • Both phases, one toolkit: certificate deployment and post-rollout revocation handled end-to-end
  • Per-device diagnostic clarity: know exactly where every device is in the rollout, including which are blocked by firmware issues
  • Compliance detection ready for SCCM and Intune: plug into your existing Configuration Items or Remediations and track through existing reporting
  • Audit-ready evidence: every run produces structured data for compliance and risk reporting

For Management

  • Executive dashboards: summary cards show fleet readiness, what Microsoft will auto-deploy, and what your team needs to handle
  • Trend visibility for project tracking: progress over weeks and months, not just a snapshot
  • Informed hardware-refresh decisions: unsupported models flagged so you can plan replacements before the deadline
  • Deadline confidence: measurable progress toward the 2026 enforcement date

Requirements

The toolkit runs in standard Windows administration environments:

  • A modern PowerShell environment on the machine running the assessments
  • Read access to your Configuration Manager inventory (for SCCM-managed fleets) or standard Graph API permissions (for Intune-managed fleets)
  • Administrator rights on individual devices for the interactive diagnostic and remediation tooling
  • Standard SCCM or Intune permissions for the compliance detection integrations

No additional infrastructure. No new licensing. No cloud service to configure.

Deadline reality: the old Microsoft certificate expires in 2026. First-phase rollout should already be underway in your fleet. The second phase is not auto-deployed by Microsoft and must be triggered explicitly on every device. Every week of delay is a week of risk.

What's Included

When you access this solution through membership, you receive:

  • The complete toolkit: ready-to-run package covering every capability area above
  • Quick-start guides: get from download to first report in under 30 minutes
  • Full implementation documentation: covering every scenario from SCCM-only to Intune-only to hybrid, with project plan templates and rollout guidance
  • Workshop slide deck (PDF): the full deck from the Secure Boot Speed Date Workshop (April 2026), structured around assessment and deployment and showing how to apply the toolkit in your environment
  • Ongoing vendor data updates: Dell, HP, and Lenovo readiness data refreshed as vendors publish new firmware
  • Direct access to the author: Microsoft MVP support through membership

Ready to Assess Your Fleet?

The complete toolkit plus the April 2026 workshop slides, production-tested by a Microsoft MVP

MVP-Built Solutions • Production-Ready • Complete Documentation

About the Author

Kaido Järvemets - Microsoft MVP

Kaido Järvemets

Microsoft MVP | Microsoft Hybrid-Cloud Security Expert

With over 15 years of experience in IT, cybersecurity, and Microsoft technologies, Kaido specializes in Microsoft Azure, Microsoft 365, and hybrid-cloud security solutions. As a Microsoft MVP since 2010, he has deep expertise in Configuration Manager, Enterprise Mobility, and Azure Hybrid & Security.

Kaido is a Microsoft Certified Trainer who has been traveling across Europe for the past 12 years, speaking at events including the Microsoft Management Summit and Midwest Management Summit. He founded User Group Estonia and System Center User Group Estonia, building strong communities of Microsoft technology professionals.

🎯 Specializations

Microsoft Security:
  • Microsoft Defender XDR
  • Microsoft Sentinel SIEM & SOAR
  • Microsoft Entra ID (Azure AD)
  • Microsoft Intune
Azure & Hybrid Cloud:
  • Azure Arc Services
  • Azure Log Analytics
  • Azure Automation
  • Hybrid Cloud Management

"I simplify the process and make each change meaningful. It's all about adopting modern solutions that replace archaic ones and make the workplace easier for everyone involved."