Microsoft warns Windows Secure Boot certificates expire in June 2026
A routine April patch hides a June deadline: Windows Secure Boot certificates start expiring, and unmanaged device fleets could lose boot security updates.

A patch that looks routine on paper is really a June readiness test for any IT team running a mixed fleet of Windows devices. Microsoft’s April 14 update warned that the Secure Boot certificates used by most Windows devices begin expiring in June 2026, and devices that miss the upgrade path could lose future boot-related security fixes.
Microsoft said the certificates at risk are the original 2011 Secure Boot certificates, and it is moving organizations to newer 2023 certificates to keep trust intact in boot components. The company said that once the older certificates expire, security updates for boot components will no longer be possible on affected devices, leaving some Windows machines out of security compliance and potentially weakening boot security. In Microsoft Security app, the problem can surface as early as June 2026 when a boot-related update exists but cannot be delivered to the device’s current boot configuration.
That creates a practical burden well beyond patch management. Microsoft said most personal Windows devices will receive the new certificates through Microsoft-managed updates, but organization-managed devices need to follow enterprise guidance. Some systems may also require an OEM firmware update before the new certificates can be applied correctly. Microsoft added that many Windows PCs manufactured since 2024 already have the updated 2023 certificates, but that does not help teams still running older hardware or devices with custom boot configurations.

For monday.com, the warning lands squarely in the middle of how a distributed SaaS company keeps work moving. Engineers depend on secure laptops for local development and internal testing. Product teams need stable endpoints to keep planning, release coordination, and customer-facing builds on track. Sales teams cannot afford laptop failures, recovery prompts, or a missed update before a travel day or live demo. A boot issue is not just an IT ticket; it is time lost across the business.
That is why monday.com’s own trust materials matter here. The company says its security work is guided and monitored by a Security Team and a broader Security Forum with representatives from Infrastructure, R&D, Operations, and IT. It also says employees receive information security awareness training at onboarding and annually after that, while endpoint security, device hardening, and compliance are active security domains. The lesson is blunt: even a patch buried in April release notes can become a June workplace disruption if IT teams do not inventory devices, test firmware paths, and communicate early.
Know something we missed? Have a correction or additional information?
Submit a Tip

