Skip to content

Instantly share code, notes, and snippets.

Microsoft UEFI CA 2023 Boot Manager Signature Database (DB) fails to retain certificates after system restart

Symtoms

  • After the Scheduled Task runs and prior to a reboot, the Signature Database (DB) shows the Microsoft UEFI CA 2023 certificates, but the entries do not exist after a reboot.
  • Under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
    • BootMgrLastUpdateError = 0x80004005 (2147500037)
    • BootMgrLastUpdateErrorReason = PCA2023NotFoundInDB
  • The Key-Exchange (KEK) does contain the Microsoft UEFI CA 2023 certificate changes.
$cmtrace = "${env:windir}\CCM\CMTrace.exe"
cmd /c assoc .log=CMTrace.LogFile
cmd /c assoc .lo_=CMTrace.LogFile
cmd /c ftype CMTrace.LogFile="$cmtrace" "%1"
@MyITGuy
MyITGuy / readme.md
Last active November 26, 2025 14:13

Entry Syntax

00000004 Install-map entry missing component key in populate [l:COMPONENT_NAME_LENGTH]'COMPONENT_NAME' [l:COMPONENT_VERSION_LENGTH]

Meaning

The v!COMPONENT_VERSION key is missing under HKEY_LOCAL_MACHINE\COMPONENTS\DerivedData\VersionedIndex\...\ComponentFamilies\COMPONENT_NAME.

#region Get-SMSAdvertisement
function Get-SMSAdvertisement {
[CmdletBinding()]
PARAM(
[Alias('PKG_PackageID')]
[Parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)]
[string]
$PackageId
,
[Alias('PRG_ProgramName')]
function Get-CMSoftwareDistribution {
[CmdletBinding()]
PARAM(
[Alias('PKG_Name')]
[Parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)]
[string]
$PackageName
,
[Alias('PKG_PackageID')]
function ConvertFrom-ByteArray {
[CmdletBinding()]
param (
[Alias('appid')]
[Parameter(Mandatory = $true, Position = 0, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)]
[byte[]]
$byteArray
)
begin {}

System File Checker (SFC) Cannot Be Trusted

Known Problem

When executing System File Checker (SFC), aka. sfc.exe, on a computer known to have missing protected files, e.g., \Windows\System32\quser.exe, the computer returns 'Windows Resource Protection did not find any integrity violations.' when it should have returned 'Windows Resource Protection found integrity violations.'

$CommandText = @"
SELECT
[t1].[computer_id]
, [t1].[name]
, [t1].[serial_num]
, [t1].[last_inventory]
, [GS] = (SELECT TOP 1 UPPER([hostname]) FROM mmsettings)
FROM
[computer] [t1]
"@
function Get-WindowsTempExtensionSummary {
[CmdletBinding()]
param (
[Parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)]
[string[]]
$ComputerName = $env:COMPUTERNAME
)
begin {
$ScriptBlock = {
$OutputObject = Get-ChildItem -Path $env:windir\temp -Recurse -File | Group-Object -Property Extension | ForEach-Object {
#region Get-CMInstallPath
function Get-CMInstallPath {
function Split-CommandLine {
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $false, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true, Position = 0)]
[ValidateNotNullOrEmpty()]
[string]$CommandLine
)