New to this forum. I am operating a Bee Link SER 5 Max mini pc with AMD Ryzen 7 6800U processor and Radeon Graphics. Running Windows 11 Pro 25H2 (26200.7705) system fully updated through Windows Update within a local account with secure boot enabled. I have updated the Bios and AMD drivers. I currently have BitLocker and Data Encryption disabled.
From reviewing the event logs, key registry and using PowerShell, it appears that the 2023 CA certificates are present in DB and KEK. The Task Scheduler shows Secure-Boot-Update task has run a successful operation (0x0). Registry keys : AvailableUpdates value of 0x0000000 (0), UEFICA2023Status is NotStarted, Windows UEFICA2023Capable value of 0x0000002 (2) and UEFISecureBootEnabled 0x00000001 (1). TPM 2.0 status is ready for use.
Reviewing the event logs it appears that there are multiple sequential TPM ID 17 events with " TPM hardware failed to execute a TPM command" and then a TPM-WMI event error ID 1801 with "Updated Secure Boot Certificates are available on this Device but have not yet been applied to the firmware" occurs.
I have run "Clear TPM" in Windows and "Restore Factory Keys" in Bios without resolving the issue. Manufacturer suggests to cycle the current enabled fTPM setting to disabled/restart and then back to enabled/restart. I am concerned that there are risks with doing this. I have read about forcing the update with PowerShell script by setting AvailableUpdates key to 0x5944 but I am not sure that applies to this situation and I don't know how to run the script.
With the Secure-Boot-Update task successfully completing it's run and if the 2023 CA certificates are in the data bases, why won't the registry key UEFICA2023Status proceed through the "NotStarted", "InProgress" and finally to "Updated" sequence on its own through Windows Update?