Skip to main content

SecureBoot 2026 Compliance Check

Overview

This script evaluates whether a Windows device is prepared for the upcoming Microsoft Secure Boot certificate transition scheduled for 2026. Microsoft is replacing legacy Secure Boot certificates with updated 2023-era certificates (KEK and DB). Devices that do not contain these updated certificates may be considered at risk once older certificates expire.

The script performs the following checks:

  • Verifies that Secure Boot is enabled.
  • Checks for presence of:
    • Microsoft Corporation KEK 2K CA 2023
    • Windows UEFI CA 2023 (DB certificate)
  • Determines overall readiness status:
    • Ready → Secure Boot enabled + both 2023 certificates present
    • Risk → Secure Boot enabled but 2023 certificates missing
    • N/A → Secure Boot disabled or not supported
  • Outputs a compact compliance string.
  • Optionally writes the result to a Datto RMM (CentraStage) Custom UDF field.

Implementation

  1. Download the component SecureBoot 2026 Compliance Check from the attachments.

  2. After downloading the attached file, click on the Import button

  3. Select the component just downloaded and add it to the Datto RMM interface.
    Image 1

Sample Run

To execute the component over a specific machine, follow these steps:

  1. Select the machine you want to run the component on from the Datto RMM.

  2. Click on the Quick Job button.
    Image 2

  3. Search the component SecureBoot 2026 Compliance Check and click on Select Image 3

  4. Enter the UDF ID to store the Secure Boot Check Status Image 3

Datto Variables

Variable NameTypeDefaultDescription
usrUDFStringEnter the UDF numberEnter the UDF number to store the data.

Output

Activity Log

Image 3

Custom Field

Image 3

Attachments

SecureBoot 2026 Compliance Check

Changelog

2026-03-12

  • Initial version of the document