• Thread Author
If you want to play the latest PC shooters on Windows 10, you may need to flip a few firmware switches: Secure Boot and TPM 2.0 are increasingly being enforced by modern anti-cheat systems, and that enforcement often requires your PC to be running UEFI with the boot disk formatted as GPT rather than legacy BIOS/MBR. This requirement is now explicit for Battlefield 6 and is rapidly becoming the de facto baseline for titles that rely on kernel‑level anti‑cheat protections. (ea.com)

A holographic shield displaying Secure Boot over a motherboard, highlighting MBR to GPT conversion.Background / Overview​

The long-running arms race between game developers and cheaters has pushed anti-cheat systems deeper into the platform — into firmware and the pre-boot environment. Game publishers have begun to require platform-level guarantees that the system boot path is untampered, that kernel-level code is signed and trusted, and that the machine’s identity cannot be trivially spoofed. The practical result: some modern multiplayer games now block play unless Secure Boot is enabled and a TPM (trusted platform module) compliant with version 2.0 is present and active. (pcgamer.com)
Microsoft’s own tooling and documentation provide the supported path for migrating legacy systems to the required platform configuration: convert MBR to GPT, switch firmware to UEFI, and then enable TPM and Secure Boot in the firmware settings. The recommended, supported in-place conversion tool is mbr2gpt.exe, which can convert a system disk without deleting user data when its preconditions are met. Microsoft documents the tool’s options and validation checks in detail. (learn.microsoft.com)
This article is a practical, in-depth feature that summarizes the controls you’ll touch, verifies the technical specifics, explains the risks and trade-offs, and provides a clear sequence of steps you can follow to bring a Windows 10 PC up to gaming standard — plus advice for troubleshooting, manufacturer quirks, and when to walk away and consider a hardware refresh.

Why Secure Boot and TPM 2.0 are being required for games​

  • Secure Boot is part of the UEFI firmware specification and ensures that only signed, trusted bootloaders and kernel components run at boot time. This prevents unsigned kernel drivers and many pre-boot rootkits from loading undetected. For anti-cheat systems that must detect or block kernel-level cheats, Secure Boot closes a class of powerful attacks that can defeat software-only defenses.
  • TPM 2.0 is a secure enclave (either discrete chip or firmware‑based) used to store cryptographic keys and to anchor hardware-backed attestations. Anti-cheat stacks can use TPM-backed attestations to make tamper-evidence and to bind anti-cheat state to a device identity that is harder to spoof. Microsoft and industry practice have normalized TPM 2.0 as a security baseline. (support.microsoft.com)
  • Publishers that have adopted these requirements (notably EA for Battlefield 6) assert those requirements are needed to combat kernel cheats, spoofing, VM/emulator-based tampering, and other advanced techniques. EA’s public page on Secure Boot for Battlefield 6 explicitly lists the rationale and the enforcement policy. (ea.com)
Two independent types of sources back up these facts: official vendor documentation (Microsoft) for the conversion and TPM requirements, and the game developer/publisher statements for the anti-cheat policy. Both are needed: one confirms the technical steps you must take; the other explains why games are refusing to run without those steps.

What must be true before trying to enable Secure Boot and TPM 2.0​

Before making changes, confirm the following minimum conditions. These are not optional — if they aren’t met, the conversion or the UEFI switch can fail or leave the PC unbootable.
  • The PC firmware supports UEFI boot (many systems produced since ~2012 do, but older boards may not). Confirm on the manufacturer’s site or in firmware screens.
  • Windows 10 installation is 64‑bit and you have administrative access.
  • Back up everything important. The conversion tool is designed to be non‑destructive, but disk‑level operations always carry risk. Create a full image and keep a separate recovery medium. (learn.microsoft.com)
  • BitLocker (if active) should be suspended or disabled before changing boot firmware or partitioning, because BitLocker can prompt for recovery keys after changes.
  • Windows 10 build requirements: the MBR2GPT utility is present in supported Windows 10 releases; Microsoft’s documentation lists the conditions and flags for running it online or offline. Validate with the /validate option first. (learn.microsoft.com)
  • If you run a dual‑boot configuration (Linux, older tools, custom kernels), be aware Secure Boot will reject unsigned boot resources unless you enroll keys or configure shim/signed bootloaders. Review dual‑boot implications before enabling.

The technical checklist — what you will accomplish​

  • Verify current state (MBR vs GPT, BIOS vs UEFI, TPM present).
  • Convert system disk from MBR to GPT (non‑destructively) using mbr2gpt.
  • Switch firmware from Legacy/CSM/BIOS mode to UEFI boot mode.
  • Enable TPM (fTPM/PTT/PSP as applicable) in UEFI settings.
  • Enable Secure Boot and, if necessary, restore manufacturer factory keys.
  • Verify the machine boots, confirm Secure Boot = On and TPM Specification Version = 2.0.
Both Microsoft and a number of reputable how‑to guides lay out these steps and the important validation commands. Use msinfo32 (System Information) to check BIOS Mode and Secure Boot State, and tpm.msc to confirm TPM is present and shows Specification Version 2.0. (support.microsoft.com)

Step‑by‑step: convert MBR to GPT safely (validated approach)​

These are the validated steps, summarized from Microsoft’s documentation and tested community guidance. Follow them exactly.

Preliminary: verify partition style and prerequisites​

  • Open Disk Management: right‑click Start → Disk Management.
  • Right‑click the system disk (Disk 0 usually) → Properties → Volumes tab → check "Partition style." If it reads GUID Partition Table (GPT) you do not need conversion. If it reads Master Boot Record (MBR) continue.
  • Run msinfo32 (Windows + R → msinfo32) and confirm BIOS Mode shows Legacy/BIOS (if it already shows UEFI there’s no firmware mode flip required).
  • Ensure no BitLocker is active, or suspend it. Back up everything.

Option A — Offline conversion (recommended): use Windows Recovery Environment​

  • Settings → Update & Security → Recovery → Restart now under Advanced startup.
  • Troubleshoot → Advanced options → Command Prompt.
  • At the Recovery command prompt, run:
  • mbr2gpt /validate
  • If validation passes: mbr2gpt /convert
  • When conversion completes, do NOT boot straight into Windows. Close the command prompt and power off. The disk is now GPT but firmware still in Legacy mode — you must switch to UEFI next. (learn.microsoft.com)

Option B — Online conversion (allowed but slightly higher risk)​

  • Open an elevated Command Prompt in Windows.
  • Run:
  • mbr2gpt /validate /allowFullOS
  • If validation passes: mbr2gpt /convert /allowFullOS
  • After success, shut down and change firmware mode to UEFI before attempting to boot. (learn.microsoft.com)
Microsoft documents required conditions (active partitions, max primary partition count, and OS bitness) and explains differences between running the tool in Windows PE vs full OS. Always inspect mbr2gpt output and logs if conversion fails. (learn.microsoft.com)

Switch firmware from Legacy (BIOS/CSM) to UEFI and enable Secure Boot / TPM​

After conversion, enter your motherboard/PC firmware to flip boot mode and enable platform security:
  • Power on and press the vendor key to enter firmware (common keys: F1/F2/F10/F12/Del/Esc). Consult the OEM manual if unsure.
  • Set Boot Mode to UEFI Only or disable CSM/Legacy support.
  • Save and exit; if Windows won’t boot, go back and ensure the disk was successfully converted to GPT and the boot entries exist in the EFI System Partition.
  • Reboot to UEFI and then locate TPM settings (may be called Intel PTT, AMD fTPM, PSP fTPM, or similar). Enable it and save.
  • Finally, in the Boot or Security tab enable Secure Boot. If Secure Boot is greyed out, look for “Restore Factory Keys” or similar to populate the platform key store. Save and exit.
After successful boot, verify:
  • Run msinfo32: BIOS Mode should be UEFI; Secure Boot State should read On.
  • Run tpm.msc: TPM ready and Specification Version 2.0. (support.microsoft.com)

Manufacturer and firmware naming quirks (what to look for)​

Motherboard vendors use different names for firmware TPM and for enabling options:
  • Intel: often lists TPM as PTT (Platform Trust Technology).
  • AMD: lists it as fTPM or PSP fTPM (firmware TPM).
  • ASUS: may show “TPM-SPI” for discrete modules, or PTT/fTPM names for firmware versions.
  • Gigabyte / MSI / OEM laptops: expect vendor-specific labels such as “Security Device Support,” “PTT,” or “AMD CPU fTPM.” Consult your manual.

Common pitfalls and how to avoid them​

  • BitLocker recovery: If BitLocker is enabled and not suspended, changing firmware or partition table can trigger a recovery prompt. Store your recovery key before proceeding.
  • Dual‑boot breakage: Enabling Secure Boot or converting to GPT can prevent Linux or custom bootloaders from booting unless they are properly signed or shimmed. Plan for reconfiguring GRUB or enrolling keys where needed.
  • Greyed-out options: Secure Boot may be greyed out until the boot mode is UEFI and factory keys are loaded. Some OEMs lock firmware or disable options behind supervisor passwords — remove or clear those first.
  • Old motherboards: Pre‑UEFI boards cannot be upgraded to Secure Boot. In those cases your only path to play titles that mandate Secure Boot is new hardware.
  • Unexpected partition layout: MBR2GPT validates the disk layout; if you have more than supported primary partitions or nonstandard layouts, conversion will fail. Create images and be prepared to restore if necessary. (learn.microsoft.com)

Troubleshooting — if Windows won’t boot after conversion​

  • Re-enter firmware and revert to Legacy/CSM temporarily to confirm the OS still works.
  • Confirm the EFI System Partition (ESP) was created and contains valid EFI boot entries (use a rescue environment to inspect).
  • From Windows Recovery Environment run reagentc /disable and reagentc /enable if the Windows Recovery Environment (WinRE) is misconfigured after conversion (this has been noted in real-world conversions).
  • If you suspect the bootloader is corrupted, use a Windows installation USB to perform a startup repair or rebuild the BCD using bcdboot pointing to the \Windows directory on the OS partition. (learn.microsoft.com)

The policy and user‑experience implications for gamers​

Adopting Secure Boot and TPM as gating conditions is an aggressive — but defensible — move in the name of fair play and platform security. Publishers like EA have publicly defended the approach: they say it helps block modern kernel cheats and spoofing techniques that otherwise render conventional anti‑cheat software ineffective. This has provoked frustrated responses from users who find older or custom rigs suddenly incompatible, and from those who rely on dual‑boot or unsigned drivers. (ea.com, pcgamer.com)
The trade-offs are clear:
  • Benefits:
  • Stronger baseline protection against low-level cheat vectors and boot-time tampering.
  • More reliable anti-cheat telemetry and fewer hard-to-detect kernel attacks.
  • Ultimately, fewer cheaters and a more stable multiplayer environment for the majority of players.
  • Risks / downsides:
  • Excludes some older hardware and niche configurations.
  • Creates troubleshooting overhead for publishers, PC vendors, and users (support tickets, recovery key issues).
  • Raises concerns among enthusiasts who rely on modding, unsigned drivers, or alternative OSes.
Publishers will need clear messaging, robust support articles, and compatibility tools to reduce friction; otherwise friction will create negative PR despite the intent to protect the player base. Coverage of Battlefield 6 beta feedback shows developers acknowledging the pain while defending the decision as necessary. (gamesradar.com, pcgamer.com)

When to consider hardware replacement instead of conversion​

Converting MBR→GPT and enabling UEFI/Secure Boot is typically achievable on systems from roughly the last decade. However, consider replacing the system when:
  • The motherboard firmware lacks UEFI or Secure Boot support and there’s no firmware update.
  • The CPU or platform fails other compatibility checks (especially if you plan to upgrade to Windows 11 later).
  • The laptop is locked by OEM firmware with no user options to enable TPM/PTT or Secure Boot.
  • The total cost and effort of troubleshooting and upgrading components approaches the price of a modern system that ships with UEFI and TPM 2.0 enabled.

Best practices and checklist before you start (one more time)​

  • Create a full system image and copy critical files off‑site.
  • Note any BitLocker recovery keys and suspend BitLocker if present.
  • Update Windows 10 so you have the latest mbr2gpt and recovery features.
  • Confirm with msinfo32, Disk Management, and tpm.msc current state.
  • Validate with mbr2gpt /validate before converting.
  • Convert offline from Windows RE if possible.
  • After conversion, change firmware to UEFI, enable TPM, then Secure Boot.
  • Reboot and verify Secure Boot = On and TPM Specification = 2.0. (learn.microsoft.com, support.microsoft.com)

Final assessment: technical correctness, risks, and recommendation​

The technical guidance from Microsoft (MBR2GPT and firmware expectations) and the publishers’ documented anti-cheat policy form a consistent, verifiable narrative: games that rely on kernel-level anti-cheat require stronger platform guarantees, and those guarantees are delivered via UEFI Secure Boot and TPM 2.0. Microsoft’s MBR2GPT utility is the supported, non‑destructive path to convert system disks and enable UEFI booting when the hardware supports it. (learn.microsoft.com)
That said, the approach is not risk‑free for every user. The most salient risks are:
  • Accidental data loss or the need to restore from recovery if an unexpected partition layout or BitLocker state interferes with conversion.
  • Permanent incompatibility for legacy boards that lack UEFI or for locked OEM firmware that disables user configuration.
  • Disruption to advanced, legitimate use cases (dual‑boot, kernel development, modding).
Recommendation: For mainstream Windows 10 gamers who want to play titles that require Secure Boot and TPM 2.0, follow the validated conversion process, back up first, and proceed cautiously. For users with custom dual‑boot rigs or legacy hardware, weigh the value of those configurations against the increasing number of titles that will require modern platform security — and consider hardware upgrades when necessary.

Secure Boot and TPM 2.0 represent a structural shift in PC gaming security — they are a new gate and, increasingly, the norm rather than the exception. If you plan to play the latest multiplayer blockbusters on Windows 10, prepare your firmware and partition table now: validate, back up, convert, switch to UEFI, enable TPM, and turn on Secure Boot. Doing this once will protect you from a wide range of low-level attacks and, for now, keep the modern multiplayer doors open.

Source: Windows Central Want to play modern games on Windows 10? You’ll need Secure Boot and TPM 2.0
 

Back
Top