When Microsoft launched Windows 11 in 2021, it introduced a strict hardware compatibility requirement, including the necessity for a Trusted Platform Module (TPM) that adheres to the TPM 2.0 standard.
A TPM is a secure cryptoprocessor designed to manage encryption keys and perform security-related tasks while minimizing vulnerability to attacks. It powers key Windows features like Secure Boot, BitLocker encryption, and Windows Hello biometric authentication. This hardware ensures secure storage for encryption keys, digital certificates, and authentication data.
Defined by the ISO/IEC 11889 international standard created over 20 years ago, the TPM architecture emphasizes "integrity protection, isolation, and confidentiality." TPMs can be embedded as discrete chips, integrated into CPUs, or even implemented virtually. Companies like Intel, AMD, and Qualcomm have included firmware-based TPMs in their processors since 2016.
Microsoft's Pluton security processor also offers TPM functionality in collaboration with AMD and Qualcomm. A recent Microsoft IT Pro Blog post described TPM 2.0 as "a non-negotiable standard for the future of Windows." This shift is evident, as most modern PCs already include TPM 2.0, especially since Microsoft mandated its inclusion in 2016.
In Windows systems, the TPM works with Secure Boot to verify that only trusted code runs during startup, blocking unauthorized changes like rootkits. It supports Windows Hello for biometric authentication and holds BitLocker keys, making it highly secure against unauthorized access.
Most PCs built after 2016 come with TPM 2.0 enabled by default. Older models, dating back to 2014, may include TPMs but often follow the now unsupported TPM 1.2 standard. Some devices may have TPMs disabled in BIOS settings, particularly if configured with Legacy BIOS instead of UEFI. You can check your TPM configuration using the System Information tool (Msinfo32.exe).
While TPM is integral to Windows, it also supports Linux systems and IoT devices. Apple uses a similar design called the Secure Enclave, which handles cryptographic operations and secures sensitive data.
For systems without TPM, users can bypass compatibility checks using unofficial tools like the open-source utility Rufus. However, Microsoft strongly advocates for TPM 2.0 to ensure a higher level of security.
For detailed TPM information, check under the Security Devices section in your PC’s Device Manager. As the tech industry moves towards more robust security standards, TPM 2.0 remains a critical component for safeguarding modern computing environments.