Windows Secure Boot certificates expiring in 2026
Enterprise IT administrators must monitor Secure Boot certificates (KEK, DB, DBX, PK) for expiration to prevent security issues and ensure compliance. Currently, Patch My PC Insights reports do not expose Secure Boot certificate details. Without this visibility, organizations risk unplanned outages, boot failures, and audit findings when certificates expire undetected.
Requested Feature
Please add a reporting feature in Patch My PC Insights to:
Automatically inventory Secure Boot certificate details (issuer, type, expiration date) from all managed Windows devices.
Provide an insight dashboard summarizing certificate expiration status across the fleet.
Generate a detailed report listing expiration and certificate details per computer.
Support alerts or flags for certificates expiring within a configurable time window.
This will enable proactive certificate renewal planning and secure operations, directly supporting security and compliance goals.
Im very dissapointed in PMPC in regards to this either, specially with the new PMPC Intune reporting. You have a client installed on all devices, and when MS screwed up reporting insanily, and Rudy Ooms keep pushing out one article after another with secure boot info, yet, PMPC fails to follow up on this. its 6 months since this idea was created. Internet is screaming about Secure Boot Certificates., even other vendors/suppliers sells reporting tools but nothing from PMPC..
I asked about on X(TwitteR), and i was told to make an idea, i responded its a waste of time. This clearly shows after 6 months its still status submitted that i was right.
This is one of the times we need you the most when MS keep failing, Rudy Ooms has clearly deep knowledge about this, so it should be a cakewalk for PMPC to gather this info with the PMPC Intune Client, and create some reports for us.
But we need it now, not in August 2027.