๐ Secure Bits ๐ก
๐ก๐ฒ๐ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ฝ๐ฟ๐ผ๐ฐ๐ฒ๐ฑ๐๐ฟ๐ฒ ๐ณ๐ผ๐ฟ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐๐ผ๐ผ๐ ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ฒ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ๐
I tested the new Microsoft procedure I shared last time (link in comments).
Iโll be honest โ I was a bit ๐ผ๐๐ฒ๐ฟ๐๐ต๐ฒ๐น๐บ๐ฒ๐ฑ at first. There are multiple scripts, and I ran into a few โpaper cutsโ, so itโs still not as straightforward as the article makes it look.
This post covers ๐ฃ๐ต๐ฎ๐๐ฒ ๐ญ: ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป & ๐ฆ๐๐ฎ๐๐๐ ๐ ๐ผ๐ป๐ถ๐๐ผ๐ฟ๐ถ๐ป๐ด (enterprise level) โ which, for many orgs, is already the most useful part: enable the process with GPO + get recurring monitoring you can trust.
โธป
โ ๐ฃ๐ต๐ฎ๐๐ฒ ๐ญ โ ๐๐ต๐ฎ๐ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ถ๐ ๐๐ฟ๐๐ถ๐ป๐ด ๐๐ผ ๐ฎ๐ฐ๐ต๐ถ๐ฒ๐๐ฒ
Central monitoring of where your servers/clients are in the Secure Boot cert update process.
1๏ธโฃ ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐๐ต๐ฒ ๐ฐ๐ผ๐น๐น๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐ต๐ฎ๐ฟ๐ฒ + ๐ฝ๐ฒ๐ฟ๐บ๐ถ๐๐๐ถ๐ผ๐ป๐
Run Microsoftโs script that creates the file share and sets ACLs.
2๏ธโฃ ๐ฃ๐ฟ๐ฒ๐ฝ๐ฎ๐ฟ๐ฒ ๐๐ต๐ฒ ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ ๐ณ๐ผ๐น๐ฑ๐ฒ๐ฟ
At minimum youโll work with:
โข Deploy-GPO-SecureBootCollection.ps1
โข Detect-SecureBootCertUpdateStatus.ps1
3๏ธโฃ ๐ฅ๐๐ป ๐๐ฒ๐ฝ๐น๐ผ๐-๐๐ฃ๐ข-๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ๐๐ผ๐ผ๐๐๐ผ๐น๐น๐ฒ๐ฐ๐๐ถ๐ผ๐ป.๐ฝ๐๐ญ
I noticed mismatches in names/paths in the article + scripts. For example in the top part of the article the share path is referenced as SecureBootLogs, but the script creates SecureBootData.
๐ My recommendation: follow the bottom part of the article โ it looked the most consistent/precise during my testing.
After running the script, youโll be guided through prompts and it will create a new GPO called: SecureBoot-EventCollection
At first glance, it may look empty in GPMC โ itโs not. This is what happens when settings are injected into the GPO via PowerShell.
To verify / โmake it visibleโ:
Computer Configuration โ Preferences โ Control Panel Settings โ Scheduled Tasks โ SecureBoot-EventCollection
Open the task, click OK, refresh policy view โ and you should see the settings appear.
(the script mentions โComplete the scheduled task configuration in GPMC (see instructions above)โ โ but there are none.
4๏ธโฃ ๐ง๐ฒ๐๐ ๐ผ๐ป ๐ฎ ๐ณ๐ฒ๐ ๐บ๐ฎ๐ฐ๐ต๐ถ๐ป๐ฒ๐
Run gpupdate /force on a few servers/clients and run the scheduled task manually. You should see a new task: SecureBoot-EventCollection
If it runs correctly, youโll start seeing JSON files created on the file share.
5๏ธโฃ ๐๐ด๐ด๐ฟ๐ฒ๐ด๐ฎ๐๐ฒ ๐๐ต๐ฒ ๐ฟ๐ฒ๐๐๐น๐๐
Now test:
โข Aggregate-SecureBootCertStatus.ps1
Youโll likely need to:
โข adjust paths
โข modify the Start-Process part (it didnโt work for me as-is)
After that, you should get the report.
โธป
๐โ๐น๐น ๐ฎ๐น๐๐ผ ๐ฐ๐ผ๐๐ฒ๐ฟ ๐ฃ๐ต๐ฎ๐๐ฒ ๐ฎย โ I already tested it, but I hit an error and Iโm contacting Microsoft. Some of the script/path mismatches may be fixed by the time you read this (Iโm communicating this in real-time).
Links to the official procedure + my field notes are in the comments.
#SecureBoot #SecureBits #HorizonSecured



