This might be more helpful for you if you are still fighting the issue.
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
I have applied a GPO to allow the new secure boot certificate to apply but I still get failures on my VM's regarding memory issues
This might be more helpful for you if you are still fighting the issue.
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
Hello.
First, could you check whether any error code appears when the issue occurs? Having that information would be very helpful.
Based on your description, I'd guess the memory error is likely caused by the virtual NVRAM being too small to accommodate the updated, larger DBX revocation list provided by Microsoft. This situation commonly triggers error code 0x80070008, as UEFI variable storage on virtual hardware versions earlier than version 20 does not have sufficient capacity for these security updates.
To resolve this issue, you should upgrade your virtual machine compatibility to hardware version 20 or later, which is supported on ESXi 8.0 and newer. This upgrade increases the available storage for EFI variables.
You can verify whether the update was successful by checking the Microsoft-Windows-SecureBoot/Operational event log, specifically Event ID 103, to confirm that the variable was written successfully.
If you find my answer useful, please mark it as the "Accepted Answer" so other members can find the solution easily. Your help in supporting the community is much appreciated!
Best regards,
Scott
For Windows guests running on VMware, Secure Boot certificate updates work the same way as on physical hardware, but success depends on how the virtual firmware handles Secure Boot variables.
From the available guidance, there are two supported ways to get the new Secure Boot certificates into virtual machines:
Computer Configuration → Administrative Templates → Windows Components → Secure Boot to control deployment of the Secure Boot certificate updates.If failures are occurring on VMware VMs with errors that look like firmware or memory issues when updating Secure Boot variables, the relevant guidance is:
Actionable steps:
Applications and Services Logs → Microsoft → Windows → TPM-WMI and Microsoft → Windows → Secure-Boot-Update (if present) and confirm whether Event ID 1795 is logged when the update runs.If the VMware virtual firmware cannot reliably update Secure Boot variables, the only durable fix will be a platform/firmware update from VMware (or the host OEM) so that the guest’s Secure Boot DB/KEK can be updated correctly.
References: