Share via

Why aren't the Secure Boot Certificates being applied to my SER5 Max

BDB-6880 0 Reputation points
2026-02-05T21:55:04.7066667+00:00

New to this forum. I am operating a Bee Link SER 5 Max mini pc with AMD Ryzen 7 6800U processor and Radeon Graphics. Running Windows 11 Pro 25H2 (26200.7705) system fully updated through Windows Update within a local account with secure boot enabled. I have updated the Bios and AMD drivers. I currently have BitLocker and Data Encryption disabled.

From reviewing the event logs, key registry and using PowerShell, it appears that the 2023 CA certificates are present in DB and KEK. The Task Scheduler shows Secure-Boot-Update task has run a successful operation (0x0). Registry keys : AvailableUpdates value of 0x0000000 (0), UEFICA2023Status is NotStarted, Windows UEFICA2023Capable value of 0x0000002 (2) and UEFISecureBootEnabled 0x00000001 (1). TPM 2.0 status is ready for use.

Reviewing the event logs it appears that there are multiple sequential TPM ID 17 events with " TPM hardware failed to execute a TPM command" and then a TPM-WMI event error ID 1801 with "Updated Secure Boot Certificates are available on this Device but have not yet been applied to the firmware" occurs.

I have run "Clear TPM" in Windows and "Restore Factory Keys" in Bios without resolving the issue. Manufacturer suggests to cycle the current enabled fTPM setting to disabled/restart and then back to enabled/restart. I am concerned that there are risks with doing this. I have read about forcing the update with PowerShell script by setting AvailableUpdates key to 0x5944 but I am not sure that applies to this situation and I don't know how to run the script.

With the Secure-Boot-Update task successfully completing it's run and if the 2023 CA certificates are in the data bases, why won't the registry key UEFICA2023Status proceed through the "NotStarted", "InProgress" and finally to "Updated" sequence on its own through Windows Update?

Windows for home | Windows 11 | Windows update
{count} votes

3 answers

Sort by: Most helpful
  1. Prabhakar Hampanna Vrushabendrappa 0 Reputation points Microsoft Employee
    2026-03-04T05:10:28.74+00:00

    Hello BDB-6880,

    UEFICA2023Capable 2 indicates that device does have new boot manager signed with new Windows UEFI CA 2023 certificate. This also confirms that you have primary Windows UEFI CA 2023 certificate in the Secure Boot DB. The event 1801 indicates device is missing 1 or more of remaining certificates (KEK CA 2023, Option ROM CA 2023 and Microsoft UEFI CA 203). To Deploy remaining certs, follow below steps:

    • Run Powershell as Administrator and execute following commands
    • Reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot" /v AvailableUpdates /t REG_DWORD /d 0x5944 /f​​
    • Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"

    This will immediately apply the remaining certificates to the Secure Boot DB and KEK. After this step, registry value UEFICA2023Status will transition to "Updated"

    0 comments No comments

  2. Carl-L 9,895 Reputation points Microsoft External Staff Moderator
    2026-02-13T14:20:12.51+00:00

    Hello BDB-6880,

    DISM an SFC actually is a built-in scanner of system file embedded by Microsoft. It was meant to be user friendly, even with low-tech users. So, they are relatively safe, it will try to detect and repair any corruption in the system files. They will return a failed message if they cannot safely repair them.

    What you see while looking for the files is actually expected. It does mean that the payload folder is ready, and it seems like the thing blocking it is the AvailableUpdates parameter is 0.

    I do understand your concerns about editing the registry and uninstall TPM from your device manager. These steps do pose a risk, especially when we can only give suggestion based on what you described without have a direct look on it. That is why I recommend that you save a copy of the registry before editing, since in the worst case, you can access the Safe Mode and restore the saved registry.

    In this case, if you are not confident in this. I suggest that you could look for a local store in your area to see if they can help you in this or contact Microsoft Support. They will have the proper tool and more expertise in this to help you and provide remote assistance if needed. Thank you for your understanding.


  3. Carl-L 9,895 Reputation points Microsoft External Staff Moderator
    2026-02-12T07:16:16.5733333+00:00

    Hello BDB-6880,

    Welcome to Microsoft Q&A forum.

    Even if the certificate is present, the status might not advance due to various reasons from the OS (Cannot write variables, complete the boot manager handoff or waiting for a trigger). The error 1801 might indicates that Windows does recognize the certificate but currently unable to do all the changes and swap to the 2023 boot manager. We can start from that.

    • Restore the payloads using SFC.
      1. Go to C:\Windows\System32\SecureBootUpdates and find files like dbupdate.bin, kekupdatecommand.bin and bootmgfw_2023.efi. (The name might be slightly different)
      2. If the folder is empty. Type "Command Prompt" in the search bar and select "Run as administrator"
      3. Type "DISM /Online /Cleanup-image /restorehealth and press Enter.
      4. When the scan is done. Type SFC /scannow and press Enter.
      5. Restart your computer.
    • Set the trigger to start the task. Disclaimer: Generally, modifying registry subkeys or work group is intended for advanced users, administrators, and IT Professionals. It can help fix some problems, however, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For further protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click How to back up and restore the registry in Windows - Microsoft Support to view the article.
      1. Type "PowerShell" in the search bar and select "Run as administrator"
      2. Type reg add "HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot" /v AvailableUpdates /t REG_DWORD /d 0x5944 /f and press Enter.
      3. Type Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update" and press Enter.
      4. Restart your computer.

    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.