For devices still experiencing Error 65000 after Microsoft's service-side fixes (deployed January-February 2026), implement targeted workarounds while waiting for complete licensing propagation.
First, verify if your tenant has received the licensing service updates:
# Check tenant licensing service version (run from any domain-joined device)
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI" -Name "LastLoggedOnProvider" -ErrorAction SilentlyContinue
For devices with subscription-activated Enterprise licenses showing as Pro, force license refresh:
# Force Windows license refresh
slmgr /ato
slmgr /dli
# Clear licensing cache and re-evaluate
slmgr /cpky
slmgr /upk
slmgr /ipk [Your-Enterprise-Product-Key]
slmgr /ato
Create a remediation script for bulk deployment through Intune Remediations:
# Detection script
$secureBootEnabled = Confirm-SecureBootUEFI
$policyError = Get-WinEvent -FilterHashtable @{LogName='Application'} -MaxEvents 50 | Where-Object {$_.Id -eq 65000}
if ($secureBootEnabled -and $policyError) {
Write-Output "Remediation needed: Secure Boot enabled but policy error present"
exit 1
} else {
Write-Output "Secure Boot status acceptable"
exit 0
}
Deploy this as an Intune Remediation with a corresponding remediation script that forces the certificate update process.
Verification: Monitor the remediation deployment success rate and track which devices continue to report Error 65000 despite functional Secure Boot.
Pro tip: For persistent issues affecting more than 10% of your fleet, open a Microsoft support case referencing the Secure Boot certificate expiry timeline and request tenant-specific licensing propagation status.