Adding a new EFI disk will result in all certificates being added.
*The `qm enroll-efi-keys` command is for virtual machines created before certificates were added. Virtual machines created after applying updates to Proxmox already have certificates.
Step 1 (0x40) is not required, but the other steps (0x100, 0x80, 0x200, 0x800) are still necessary.
If the Windows 11 task isn't fixed, it will show ID 1801, so we'll wait for Microsoft to fix it.
*Windows Server 2025 has tasks that function correctly.
*As
@lucius_the mentioned, this would cause an access violation, so ID 1801 remains because it doesn't transition to Upgraded. In reality, the steps can be executed, so the update is complete and there is no issue.
I believe the qm enroll-efi-keys command not working properly is a matter of the virtual machine configuration.
If the OS Type in Option is not set to Microsoft Windows 11/2022/2025, an error will occur as per specification.
If you have changed it and added the certificate, the following will occur.
linux 6.x -2.6 Kernel
Code:
qm enroll-efi-keys 804
skipping - OS type is neither Windows 10 nor Windows 11
Microsoft Windows 11/2022/2025
Code:
qm enroll-efi-keys 804
skipping - no pre-enrolled keys or already got ms-cert=2023 marker
Changes to AvailableUpdates and task execution will result in a value of 0, indicating the changes have been applied.
Therefore, the updates are complete.
When UEFICA2023Status changes from NotStarted to InProgress and then to Upgraded, error 1801 will no longer appear.
In Windows 11, after an access violation, the status reverts from InProgress back to NotStarted. Consequently, it does not reach Upgraded, and error ID 1801 remains.
* Even if you manually change the UEFICA2023Status, it will revert back, so you have no choice but to wait for a fix.
Code:
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Status
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x40 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
# 0x40 is likely unnecessary since it is updated by qm enroll-efi-keys.
timeout /t 5
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Status
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Error
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023ErrorEvent
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x100 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
timeout /t 5
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Status
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Error
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023ErrorEvent
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x80 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
timeout /t 5
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Status
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Error
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023ErrorEvent
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x200 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
timeout /t 5
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Status
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023Error
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v UEFICA2023ErrorEvent
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x800 /f
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"