Steam Beta Now Shows Secure Boot and TPM Status for Easy Compliance

  • Thread Author
Valve's Steam beta now surfaces whether your PC has Secure Boot and TPM enabled, making it trivial for gamers to see if their system will pass the new breed of anti‑cheat checks that many publishers are rolling out. The status shows up under Help → System Information in the Steam client (look under the Operating System section), and the Steam beta already exposes both the Secure Boot state and the TPM details so you can confirm compliance without digging through UEFI or Windows tools.

Background​

Windows 11 raised the profile of two firmware‑level defenses: Secure Boot and Trusted Platform Module (TPM) 2.0. Microsoft treats TPM 2.0 as a necessary building block for many of its platform protections and recommends Secure Boot for device integrity. TPM stores cryptographic keys and measured‑boot values that higher‑level Windows features (BitLocker, Windows Hello, Device Health Attestation) use to prove a machine’s integrity; Secure Boot prevents unsigned or tampered boot components from loading during startup. Together they form a hardware‑anchored foundation for defending against boot‑level malware and kernel tampering.
In the last 12–36 months the PC gaming industry has increasingly leaned on those platform features to strengthen kernel‑level anti‑cheat approaches. High‑profile publishers now require Secure Boot and TPM for some titles or anti‑cheat subsystems, meaning players without those features active can be blocked at launch. That shift is what makes Valve’s small but practical Steam client change notable: it reduces friction for gamers who need to check compliance quickly.

What Valve added to Steam and why it matters​

What the Steam change actually shows​

In the Steam beta, the System Information page — accessible from the menu bar at Help → System Information — lists a number of hardware and firmware details. Scroll to the Operating System block and you’ll now find lines for Secure Boot (On / Off / Unsupported) and TPM (presence and version), alongside the usual BIOS Mode and OS version fields. This mirrors the same basic data Windows provides in msinfo32 and tpm.msc, but surfacing it in Steam means players can confirm readiness from the client they already run every day.
Valve also indicated this information will eventually be included in Steam’s Hardware Survey, which would let the platform show population numbers for how many Steam users have Secure Boot enabled and what TPM versions are in use. For publishers and the community, that’s an important telemetry data point as anti‑cheat and DRM policies make use of these features.

Why game publishers pushed this​

Kernel‑level cheats and early‑loader exploits are a persistent problem in modern competitive multiplayer. Anti‑cheat solutions often need to start before user‑level games or drivers can be tampered with, and Secure Boot gives anti‑cheat vendors a trusted launch environment to register and protect their kernel components. TPM augments that by recording boot measurements and safeguarding keys used for disk encryption and attestation. Publishers like EA and Activision have publicly tied Secure Boot/TPM to their anti‑cheat roadmaps for flagship series, which in turn creates real compatibility pressure on players.

How Secure Boot and TPM work (concise technical primer)​

  • Secure Boot is a UEFI firmware feature that checks digital signatures of firmware, bootloaders, and other early startup components so the system only runs trusted code before Windows loads. If signatures don’t match, the firmware can refuse to boot that component. This is signed‑code enforcement at the earliest stage of the boot chain.
  • TPM (Trusted Platform Module) is a hardware or firmware device that stores cryptographic keys and records measured‑boot hashes. TPM 2.0 is the version Microsoft requires for modern Windows 11 features. TPM can be a discrete chip, embedded in the CPU package, or implemented as firmware (fTPM), but its security model separates sensitive operations from the host OS.
  • Measured boot: Secure Boot checks signatures; TPM can record boot‑time hashes so the OS or remote services can later verify that the platform started in a known good state. This measured chain of trust is why anti‑cheat vendors rely on both features for kernel protection and attestation.

How to check and enable Secure Boot / TPM (practical steps)​

If Steam’s System Information shows Secure Boot or TPM as disabled or unsupported, the typical steps to bring a modern PC into compliance are:
  • Confirm current state in Windows:
  • Run System Information (Win + R → msinfo32) and look for BIOS Mode (should be UEFI) and Secure Boot State (On/Off/Unsupported).
  • Run the TPM management console (Win + R → tpm.msc) to see whether a TPM is present and the specification version.
  • Enter UEFI/BIOS settings:
  • Use Windows Advanced startup → Troubleshoot → Advanced options → UEFI Firmware Settings → Restart, or press the manufacturer-specified key at boot (F2/DEL/F12 etc.). TPM and Secure Boot options are commonly under Security, Advanced, or Trusted Computing menus.
  • Enable TPM and/or fTPM / Intel PTT:
  • On many motherboards the switch is labeled TPM, AMD fTPM, Intel PTT, or Security Device Support. Enable it and save/exit. Firmware TPMs are often off by default on DIY motherboards.
  • Enable Secure Boot and set Platform to UEFI:
  • Ensure Disk partition style is GPT (not MBR) and that BIOS Mode is set to UEFI. Then enable Secure Boot and (in some firmware) restore factory keys or set the Secure Boot mode to Standard. Save and reboot.
  • Verify in Windows again:
  • Re‑open msinfo32 and tpm.msc to confirm Secure Boot State is On and TPM Specification Version is 2.0 (if supported). Many anti‑cheat systems require the TPM to be present and active, not merely available.
Important: BIOS/UEFI options vary widely by vendor. When in doubt, consult your motherboard or PC manufacturer’s support pages for exact instructions and BIOS updates; enabling Secure Boot sometimes requires converting a boot drive from MBR to GPT or updating firmware. Microsoft also publishes step‑by‑step guidance for enabling TPM and Secure Boot.

The gaming angle: which titles and anti‑cheats are pushing Secure Boot / TPM​

In 2024–2025 a number of major multiplayer titles and publishers publicly tied Secure Boot and TPM requirements to their anti‑cheat strategies. Activision announced phased enforcement for its Ricochet system and Call of Duty entries, while EA’s Battlefield franchise integrated Javelin — a kernel‑level anti‑cheat that requires Secure Boot — and confirmed Steam Deck and Linux compatibility concerns as a result. These moves aren’t hypothetical: publishers have started to display in‑game prompts and launch checks that require firmware compliance.
That industry momentum is the proximate reason Valve’s Steam client change matters: it gives gamers an immediate, one‑click way to check whether they will be blocked by these new checks before they buy or try to join a match. Steam surfacing Secure Boot and TPM is a small UI change with outsized utility for an audience being asked to flip firmware switches to play certain games.

Risks, pushback, and why some users are uneasy​

Kernel‑level anti‑cheat and privileged software​

Anti‑cheat systems that insist on kernel‑level drivers and pre‑boot presence (loaded early at system start) raise two clear concerns: security attack surface and platform access control. Kernel‑level components run with the highest privileges; a flaw there can be devastating. That’s the argument critics make about systems like Riot’s Vanguard and EA’s Javelin, even as developers counter that kernel privileges are needed to outpace cheat authors who themselves operate at low levels. Several publications and security researchers documented the debate and vendor responses, including expanded bug bounties and security reviews from anti‑cheat teams.

Privacy and telemetry worries​

TPM and Secure Boot are attestation tools: they help prove a machine's state, which is useful for device security but can be spun into a form of gatekeeping if used for DRM or strict platform checks. Publishers say these checks do not exfiltrate personal user data and only verify boot state; however, distrust remains among communities worried about opaque decisions, telemetry collection, and the mixing of platform security with DRM or anti‑consumer restrictions. Independent reporting about how publishers framed the rollout highlights both assurances and skepticism from users.

Compatibility impact: Steam Deck, Linux, and older hardware​

The Secure Boot requirement breaks compatibility for some Linux installations, Proton‑based compatibility layers, and handheld PCs that either do not support Secure Boot emulation or where the anti‑cheat stack refuses to run. EA confirmed Battlefield 6 would not operate on Steam Deck because Javelin depends on Windows Secure Boot and a kernel driver model incompatible with Valve’s Linux‑based compatibility layer. This is not theoretical: several outlets documented Steam Deck and Linux exclusions tied to that enforcement. The result is fragmentation: gamers on alternative OSes or older machines may be locked out of AAA releases.

What Valve’s small UI change reveals about the bigger trend​

Valve surfacing Secure Boot and TPM status is an acknowledgement that firmware‑level settings are now part of the normal compatibility checklist for modern PC games. The change:
  • Reduces friction: players can check in the Steam client without hunting through UEFI menus or Windows consoles.
  • Signals adoption: Steam is preparing to treat Secure Boot/TPM as first‑class compatibility attributes alongside GPU, CPU, and RAM. Valve’s plan to add these to the Hardware Survey will make adoption visible to the community and industry.
  • Highlights a governance problem: when platform security primitives become prerequisites for entertainment, questions about access, vendor responsibility, and user choice move from the margins to the mainstream. The UI change is a pragmatic step, not a solution to those governance questions.

Recommendations for players, builders, and sysadmins​

  • If you play competitive or high‑profile AAA multiplayer, treat Secure Boot and TPM as part of your compatibility checklist. Use Steam’s System Information as a quick check and verify via msinfo32 and tpm.msc for detailed state.
  • If you build or buy a PC and want future compatibility, prefer UEFI/GPT configurations and ensure firmware upgrades are available for your motherboard. Most modern boards can enable TPM (fTPM or Intel PTT) and Secure Boot, but some older systems will not. Firmware updates can add or improve fTPM support on certain vendor boards.
  • For Steam Deck and Linux users, be aware that kernel‑level, Secure Boot–dependent anti‑cheat systems may block certain games. Keep expectations realistic: some publishers have explicitly confirmed non‑support for Steam Deck when anti‑cheat requires Secure Boot.
  • Maintain security hygiene: enabling Secure Boot and TPM is generally a net positive for platform security, but users should keep firmware, drivers, and anti‑cheat components up to date. If you have privacy concerns, consult publisher statements and independent security reporting about what telemetry (if any) a given anti‑cheat system collects.

Critical analysis: strengths and potential harms​

Strengths​

  • Lowering friction for compatibility checks. Surfacing Secure Boot and TPM in Steam is a pragmatic UX improvement that helps players quickly determine if they’ll be blocked by firmware checks. That’s useful, avoids wasted purchases or surprise launch failures, and reduces support overhead for publishers.
  • Encouraging better security posture. If major titles push Secure Boot/TPM and platform tooling makes it easy to check and enable them, a large portion of the PC population will gain stronger boot‑time protections and better disk encryption hygiene. That can materially reduce certain classes of rootkit and pre‑boot compromise.

Potential harms and unresolved problems​

  • Access fragmentation. Requiring firmware features fragments the player base across OSes and device types. Linux and Steam Deck players, plus users of older hardware, face a growing list of incompatible titles. Valve’s change helps identify the problem, but does not solve the core compatibility loss.
  • Concentration of power and trust. Kernel‑level anti‑cheat drivers with early boot presence concentrate enormous power in private vendors’ hands. While vendors point to audits, bounties, and limited data collection, the combination of privileged software and opaque decision logic is a legitimate security and consumer‑rights concern. Independent security review and transparent governance remain vital.
  • Risk of creeping DRM use. Any system that attests device state can be repurposed for DRM or restrictive platform rules. Presently vendors frame Secure Boot/TPM as anti‑cheat and security features; in the wrong hands they could enable more invasive checks. The community should watch for scope creep and demand transparent, narrowly defined usage policies. (This is a cautionary statement: claims of specific repurposing should be verified against publisher practices.)

Bottom line​

Valve’s Steam beta change to show Secure Boot and TPM status is a small but meaningful UX improvement that reflects a larger shift: firmware security is now a real compatibility requirement in modern PC gaming. The change will save time for players and support teams, and Steam’s planned Hardware Survey inclusion could illuminate how widespread adoption already is. At the same time, the industry’s movement toward kernel‑level anti‑cheat backed by Secure Boot and TPM raises important questions about platform access, compatibility for alternative OSes, and how privileged code is audited and governed. Valve’s UI tweak helps players navigate the immediate practicalities, but the deeper tradeoffs — security vs. openness, protection vs. exclusion — remain unresolved and demand continued scrutiny from players, developers, and security researchers.

Quick checklist: what to do right now​

  • Open Steam (beta channel), go to Help → System Information → Operating System and check Secure Boot / TPM status.
  • If either is off and you need them, consult your motherboard/PC vendor for the exact BIOS steps and, if necessary, update UEFI firmware.
  • Verify in Windows with msinfo32 and tpm.msc to confirm state after reboot.
Enabling these settings usually takes only a few minutes on modern hardware, but on older rigs it can require firmware updates or disk conversion, so plan accordingly.

Source: Tom's Hardware Check that you're ready for invasive DRM with new feature built right into Steam — Secure Boot and TPM status now listed right in the app
 
Valve has quietly added a small but consequential check to the Steam client on Windows: the Steam beta now reports whether a PC has Secure Boot enabled and whether a Trusted Platform Module (TPM) is present and which version it exposes, surfacing firmware‑level compatibility details that have become central to modern anti‑cheat and platform security policies.

Background​

Modern PC security and platform integrity increasingly rely on two firmware‑anchored features: Secure Boot (a UEFI feature that enforces signed early‑boot components) and TPM 2.0 (a hardware or firmware module that stores cryptographic keys and records measured‑boot values). Microsoft elevated TPM 2.0 to a core requirement for Windows 11, and Secure Boot is a common requirement for protected boot chains. Together they form the foundation for measured and attested boot sequences used by BitLocker, Windows Hello, and other platform protections.
Why this matters now: several major publishers and anti‑cheat vendors are moving to require or strongly recommend Secure Boot and TPM for some multiplayer titles and anti‑cheat stacks, arguing that hardware‑backed attestation reduces sophisticated kernel‑level cheat techniques. Activision, EA, and other publishers have publicly discussed or rolled out checks tied to these platform features, which creates real compatibility pressure on players who want to run affected games.

What Valve changed — the practical update​

Where you’ll see it​

In the Steam beta channel, the client’s System Information dialog (Help → System Information) now lists:
  • Secure Boot: On / Off / Unsupported
  • TPM: presence and specification version (e.g., TPM 2.0)
This information appears under the Operating System block alongside BIOS Mode and OS version, offering a quick, one‑stop check inside the client instead of forcing users to open msinfo32 or tpm.msc.

What Valve says about telemetry​

Valve has indicated the same Secure Boot and TPM fields are intended to be added to Steam’s Hardware Survey in the near future, which would enable visibility into how many Steam users have these features active. That telemetry would be useful to publishers planning rollouts of Secure Boot/TPM‑dependent anti‑cheat measures. Note: Valve’s intent to include this data was described in reporting and community threads; readers should treat the timing and exact rollout plan as subject to change.

Why this change matters​

Low friction for users, high value for publishers​

Surfacing Secure Boot and TPM status inside Steam reduces a common support friction: players buying or launching a game only to find it blocked by a firmware setting they didn’t know existed. A quick check in Steam avoids wasted purchases, reduces ticket volume for publishers, and makes compliance straightforward for non‑technical users. This small UX tweak is pragmatic and directly responsive to the industry’s shift toward firmware‑anchored anti‑cheat.

It signals industry normalization​

When a platform as central as Steam treats Secure Boot and TPM as first‑class compatibility attributes — on the same level as GPU, CPU, and RAM — it signals normalization. Publishers can rely on population telemetry and user expectations to make enforcement decisions. Multiple outlets reporting the change framed it as Steam acknowledging firmware state as a standard compatibility check for modern PC gaming.

Reinforces an existing trend: anti‑cheat at the boot level​

Game publishers are increasingly adopting anti‑cheat systems that require kernel‑level presence or early‑loader attestation. Secure Boot protects the boot chain by allowing only signed components to run, while TPM stores keys and measured‑boot hashes that can be used to assert a machine’s state to remote services. Publishers argue these features materially improve fairness in competitive online games by denying cheat tools low‑level footholds. Activision and EA have publicly tied upcoming or future releases to Secure Boot and TPM checks as part of their anti‑cheat roadmaps.

Technical primer: how Secure Boot and TPM work (short and practical)​

  • Secure Boot: a UEFI firmware mechanism that validates digital signatures on bootloaders and pre‑OS components. If a component is unsigned or tampered, the firmware can refuse to execute it. Secure Boot requires UEFI boot mode and GPT partitioning on the boot disk in many cases.
  • Trusted Platform Module (TPM): a hardware or firmware module that stores cryptographic keys and records measurements taken during the boot process (measured boot). TPM 2.0 is the modern specification used by Windows 11 and relevant anti‑cheat systems for attestation. TPM can be implemented as:
  • dTPM: a discrete chip on the motherboard
  • fTPM: firmware TPM implemented in CPU microcode
  • Intel PTT: Platform Trust Technology on Intel platforms that behaves like an fTPM
  • Measured boot vs. Secure Boot: Secure Boot verifies signatures at each stage; TPM records hashes of those stages so later attestation or remote services can verify the machine started in a known state. Publishers combine both to make early‑loader anti‑cheat components difficult to circumvent.

Who this affects — compatibility and access implications​

Windows desktops (majority of Steam users)​

Most modern Windows PCs — particularly those that meet the Windows 11 baseline — already have TPM 2.0 and Secure Boot available or enabled. For users on older hardware, enabling these features may require firmware updates, toggling BIOS/UEFI settings, or changing disk partitioning from MBR to GPT (a non‑destructive conversion is possible but must be approached carefully). Microsoft provides tools and guidance for converting to GPT and enabling TPM/Secure Boot when supported.

Steam Deck and Linux users​

Secure Boot–dependent anti‑cheat stacks have been problematic for Steam Deck and other Linux‑based systems because some anti‑cheat drivers and kernel components are tied to Windows‑centric kernel models. Publishers have confirmed that certain titles will not run on Steam Deck when their anti‑cheat requires Secure Boot and Windows kernel drivers. Valve’s Steam change helps identify non‑compliant systems but does not solve the underlying compatibility break.

Owners of legacy or custom rigs​

Systems built around legacy BIOS, MBR disks, older CPUs without fTPM/PTT support, or motherboards without dTPM headers may require hardware upgrades or a clean install of Windows in UEFI/GPT mode. That can create real cost and access hurdles for some players; publishers and vendors should plan help flows and outreach accordingly.

Security benefits — what’s genuinely improved​

  • Stronger boot‑time guarantees: Secure Boot raises the bar for unsigned bootkits and firmware tampering; TPM adds verifiable measurements that reduce the risk of stealthy pre‑OS compromises.
  • Lower cheat vector surface: By elevating the integrity of the boot chain and providing hardware‑backed attestation, anti‑cheat vendors get a more trustworthy environment in which kernel components can register and operate.
  • Encourages modern configurations: As players and PC builders prioritize UEFI/GPT and TPM availability, the overall user base trends toward stronger default platform security settings.

Security risks and trade‑offs — what to watch out for​

  • Privileged attack surface: Kernel‑level anti‑cheat drivers and early‑loader components operate with the highest system privileges. Bugs, backdoors, or misconfigurations in that code can be catastrophic. While vendors point to audits and bug bounties, the risk of elevated‑privilege vulnerabilities remains real.
  • Gatekeeping and DRM creep: Attestation mechanisms can be repurposed for restrictive DRM or platform gating. Publishers currently frame Secure Boot/TPM checks as anti‑cheat and security measures; continued vigilance is needed to prevent scope creep into consumer‑unfriendly territory.
  • Privacy and telemetry concerns: TPM and Secure Boot provide attestation about device state. Even if anti‑cheat vendors promise minimal telemetry, users may distrust opaque checks that influence access to purchased content. Clear limits on data collection and transparent policies are essential.
  • Fragmentation of the ecosystem: Requiring firmware features can exclude Linux users, Steam Deck owners, and those on older hardware, increasing fragmentation and potentially shrinking communities around cross‑platform titles.

Practical guide: how to check and enable Secure Boot and TPM​

Steam’s new System Information fields are the fastest first step for Steam users: open Steam (beta), go to Help → System Information, and inspect the Operating System block for Secure Boot and TPM status. That’s a useful shortcut, but it is not the canonical system view. For full verification:
  • Open the Windows System Information tool: press Windows+R, run msinfo32, and check BIOS Mode (should be UEFI) and Secure Boot State (On/Off/Unsupported).
  • Open TPM management: press Windows+R, run tpm.msc, and check presence and specification version (e.g., TPM 2.0).
  • If TPM is absent or disabled: enter UEFI/BIOS and look for settings named TPM, fTPM, Intel PTT, or Security Device Support and enable them. On many motherboards these are disabled by default.
  • If Secure Boot is unavailable or greyed out: ensure your system boots in UEFI mode and that the boot disk is GPT. Some firmware require restoring Secure Boot keys or changing the Secure Boot mode to Standard. Convert MBR to GPT only after backing up and following Microsoft’s guidance if needed.
Important safety notes:
  • Suspend BitLocker or decrypt drives before converting partition styles or making major firmware changes.
  • Firmware menus, labels, and vendor workflows vary widely; consult your OEM or motherboard manual for manufacturer‑specific steps.

Recommendations — what Valve, publishers, and the community should do next​

For Valve / Steam​

  • Keep the UI addition but preserve choice: Steam’s System Information check is a pragmatic transparency tool — continue to surface the data while avoiding any automatic enforcement.
  • Publish clear privacy and telemetry rules: If Secure Boot/TPM data flows into the Hardware Survey, Valve should publish exactly what is collected, how it’s aggregated, and how long it’s retained. Transparency will reduce distrust.

For publishers and anti‑cheat vendors​

  • Adopt transparent attestation policies: Publish narrow, auditable policies that show exactly what is checked and what data (if any) is collected. Limit collection to the minimum needed for functionality and allow independent audit.
  • Provide fallbacks and support pathways: For players on older hardware or alternative OSes, provide detailed mitigation guides, grace periods, and customer support workflows to reduce surprise blocks.

For Microsoft and hardware vendors​

  • Maintain clear upgrade guidance: Microsoft and vendors should keep public documentation and easy tools for enabling TPM and Secure Boot, including safe instructions for converting disks to GPT where possible.

For players and builders​

  • Treat Secure Boot and TPM as modern baseline compatibility checks: If you play competitive or AAA multiplayer titles, verify these settings proactively to avoid launch failures.
  • Backup before making changes: Image your system before converting partition styles or toggling firmware settings. Follow vendor guidance, and if in doubt, seek help from trusted forums or official support.

Critical analysis — balancing security with openness​

Valve’s decision to surface Secure Boot and TPM in Steam is a practical response to a growing reality: hardware‑anchored platform security is central to how several large publishers intend to preserve integrity in competitive games. The change itself is unobjectionable and user‑friendly; it reduces friction and increases transparency for consumers.
However, the trend it reflects is more consequential. When anti‑cheat moves into the pre‑OS and kernel levels and ties itself to firmware attestation, it raises a fundamental governance question: who gets to decide platform eligibility, and under what oversight? Kernel‑level drivers with early‑boot presence are effective at stopping cheats, but they also concentrate enormous trust in private vendors and platform owners. That concentration of power demands stronger independent auditing, narrow data‑use limits, and explicit redress mechanisms for false positives or unjustified exclusions.
There is also an equity problem: players who favor Linux, use Steam Deck, or maintain older or custom rigs face exclusionary pressure. Industry actors should balance the immediate security gains against the long‑term costs of fracturing the PC gaming ecosystem. Pragmatic mitigations — transparent policies, transition windows, and robust support — can reduce harm while preserving the security benefits.

What’s verifiable, and what we should watch​

  • Verifiable: Steam’s beta client displays Secure Boot and TPM status in System Information; multiple outlets confirmed the UI change and reported Valve’s intent to include the fields in the Hardware Survey. Readers can verify this by opening Steam beta and by checking msinfo32/tpm.msc.
  • Verifiable: Major publishers (Activision/EA) are requiring or planning Secure Boot/TPM checks as part of anti‑cheat roadmaps; publisher support pages and public statements corroborate this.
  • Cautionary: Specific future enforcement dates, telemetry retention policies, and precise Hardware Survey rollout timing are subject to change and should be confirmed against official publisher, Valve, or vendor announcements before making any irreversible system changes. If a particular game or title enforces these checks at launch, consult that game’s official support documentation for exact requirements.

Conclusion​

Steam’s addition of Secure Boot and TPM indicators is a smart, low‑friction improvement that helps players check compatibility for a new class of platform‑anchored anti‑cheat and DRM checks. It’s a clear signal that firmware state is now a routine part of the PC gaming compatibility checklist, and the information will be particularly useful as more publishers adopt Secure Boot/TPM requirements.
At the same time, the industry must manage the trade‑offs carefully. Kernel‑level anti‑cheat backed by Secure Boot and TPM can materially reduce cheating, but it also concentrates trust, risks ecosystem fragmentation, and raises privacy and governance questions that require transparent policies and independent review. Valve’s UI change helps gamers navigate immediate practicalities; the broader debate about security, openness, and consumer rights around platform attestation is only beginning — and it will matter for the future shape of PC gaming.

Source: Neowin Valve adds Secure Boot and TPM checks to Steam on Windows
 
Valve has quietly added a small but consequential check to the Steam client on Windows: the Steam beta now reports whether a machine’s Secure Boot is enabled and whether a Trusted Platform Module (TPM) is present and which version it exposes — surfacing firmware-level compatibility details that have become central to modern anti‑cheat and platform-security policies.

Background​

Modern PC platform integrity increasingly depends on two firmware‑anchored features: Secure Boot (a UEFI mechanism that enforces signed early‑boot components) and TPM 2.0 (a discrete or firmware module that stores cryptographic keys and records measured‑boot values). Microsoft made TPM 2.0 a baseline expectation for Windows 11, and Secure Boot is a routine part of a trusted boot chain; together they enable attestation and protections used by BitLocker, Windows Hello, and other security stacks.
Those features were largely invisible to the average gamer until publishers and anti‑cheat vendors began tying enforcement or strong recommendations to firmware state. Big publishers such as Activision and Electronic Arts have publicly incorporated Secure Boot and TPM 2.0 into their PC anti‑cheat roadmaps, creating real compatibility pressure on players who encounter launch blocks and in‑game warnings.

What Valve changed — the practical update​

In the Steam beta channel, the System Information dialog (Help → System Information) now lists:
  • Secure Boot: On / Off / Unsupported
  • TPM: Presence and (when available) specification version (for example, TPM 2.0)
That information appears under the Operating System block alongside BIOS Mode and OS version, giving users the same basic data Windows exposes via msinfo32 and tpm.msc without leaving the Steam client. Multiple outlets observed the update in the Steam beta changelog and UI.
Valve also appears to be preparing to include these fields in the Steam Hardware Survey so that population metrics for Secure Boot and TPM adoption can be seen by the ecosystem. The timing and scope of that Hardware Survey addition remain subject to change and should be treated as a near‑term plan rather than a fully committed rollout.

Why this matters now​

The change is small in code but large in context. Steam surfacing firmware state directly addresses a common and growing support pain point: players buy or try to launch a game and find it blocked because a UEFI setting is disabled or a motherboard uses an older TPM version. By making those details visible in the client gamers use every day, Steam reduces friction and gives support teams and publishers a single, consistent first check.
More strategically, the UI shift signals normalization: when Steam treats Secure Boot and TPM as compatibility attributes — on par with GPU and RAM — the industry can reasonably expect publishers to rely on population telemetry and user expectations when deciding enforcement policies. That, in turn, accelerates the migration of anti‑cheat to boot‑time and kernel‑level attestation models.

The anti‑cheat angle: who’s already rolling this out?​

Major publishers have moved from experimental to production stages with hardware‑anchored checks:
  • Activision: Ricochet anti‑cheat began a phased rollout of TPM 2.0 and Secure Boot checks during a recent season and has warned that Call of Duty: Black Ops 7 will require both at launch. Activision published support guidance and in‑game notifications during the phased rollout.
  • Electronic Arts: Battlefield’s system requirements and publisher guidance include explicit notes about TPM 2.0 and UEFI Secure Boot, and EA has confirmed that some builds and anti‑cheat stacks expect these features to be enabled for modern releases.
Independent reporting and community threads corroborate that both publishers are pushing firmware‑anchored attestation as part of their anti‑cheat defenses, citing the need to deny kernel‑level footholds to cheat tools. That realignment of anti‑cheat is the proximate reason Steam’s little UI tweak becomes relevant to everyday players.

How to see it in Steam and in Windows​

If you are running the Steam beta client, Steam’s System Information is the fastest first step:
  • Open Steam (make sure you’re in the beta branch if the feature hasn’t reached stable).
  • Go to the menu: Help → System Information.
  • Scroll to the Operating System block and look for Secure Boot and TPM entries.
This view replicates the facts you can verify in Windows tools:
  • Open System Information (Win + R → msinfo32) — check BIOS Mode (UEFI) and Secure Boot State (On/Off/Unsupported).
  • Open TPM Management (Win + R → tpm.msc) — the console reports presence and the specification version (e.g., TPM 2.0).

How to enable Secure Boot and TPM — high level, safe steps​

Enabling these features is usually straightforward on modern hardware but must be done carefully to avoid data loss or boot issues. The following is a general checklist; firmware menus vary by vendor and model:
  • Confirm your disk partition style: GPT is required for UEFI Secure Boot (MBR typically requires conversion).
  • If your disk is MBR and you must convert, backup first (create a full system image). Use Microsoft’s MBR2GPT utility following vendor guidance to avoid a destructive conversion when possible.
  • Reboot into UEFI/BIOS (use Windows Advanced startup → Troubleshoot → UEFI Firmware Settings → Restart, or manufacturer hotkey at POST).
  • Under Security / Trusted Computing / Advanced, enable TPM, fTPM, or Intel PTT as appropriate for your platform. Save and reboot.
  • Ensure BIOS Mode is set to UEFI and enable Secure Boot. If required, restore factory Secure Boot keys or set Secure Boot Mode to Standard.
  • Reboot and verify Secure Boot State and TPM status in msinfo32 and tpm.msc. Re‑enable BitLocker only after confirming the system boots normally.
Important safety notes: suspend BitLocker or decrypt drives before partition‑style conversion; verify firmware updates from your motherboard or OEM before attempting to change TPM firmware settings; and consult your vendor’s documentation for exact menu labels (terms like fTPM, Intel PTT, Security Device Support, or dTPM are commonly used).

Compatibility consequences and fragmentation​

Requiring firmware features fragments the PC gaming ecosystem in predictable ways:
  • Linux and Steam Deck: Secure Boot–dependent anti‑cheat stacks have already created compatibility breakages for Proton/SteamOS environments and handhelds that either do not implement the necessary Secure Boot semantics or for which Windows kernel drivers and attestation schemes are incompatible. Valve’s Steam UI addition helps users identify non‑compliant systems but does not resolve the underlying cross‑OS compatibility problem.
  • Older and custom rigs: Systems that rely on legacy BIOS, MBR partitioning, or motherboards without TPM 2.0 support may require firmware updates, disk conversion, or hardware upgrades. That imposes real cost and complexity on a small but non‑zero group of players.
These are not hypothetical problems: community threads and publisher support boards are filled with troubleshooting posts — particularly around AMD fTPM firmware versions and BIOS updates — where players hit TPM‑attestation failures that block gameplay until vendors ship firmware fixes.

Valve and 32‑bit Windows: a separate but related compatibility note​

Valve recently confirmed it will stop supporting 32‑bit Windows 10 installations in the Steam client beginning January 1, 2026. The company reports that Windows 10 32‑bit usage on Steam is vanishingly small (the Hardware Survey puts it at roughly 0.01% of users), and continuing client development on that 32‑bit SKU is no longer viable. Existing installations may still launch after the cutoff but will not receive updates, security patches, or technical support. Valve urges users to migrate to 64‑bit Windows to remain supported.
This separate move underscores the industry momentum away from legacy platform support and toward 64‑bit, UEFI, and hardware‑rooted security baselines. For a player who must enable TPM and Secure Boot to run a modern anti‑cheat, the 32‑bit end‑of‑life announcement is another signal that remaining on legacy OS builds incurs increasing operational risk.

Privacy, telemetry, and governance concerns​

Two distinct but related governance issues arise when attestation becomes a prerequisite for content access:
  • Telemetry and transparency: If Valve adds Secure Boot / TPM fields to the Steam Hardware Survey, players and publishers will gain useful population metrics. But that telemetry must be narrowly defined, aggregated, and governed with transparency. Users are rightly wary of opaque device attestation: even metadata about boot state can feel invasive if retention and sharing policies are unclear. Valve should publish a clear privacy statement about what is collected, how long it’s retained, and how it may be used by publishers.
  • Concentration of trust: Kernel‑level anti‑cheat drivers coupled with boot‑time attestation concentrate very high privilege in a few private vendors. While anti‑cheat vendors cite audits, bug bounties, and limited telemetry, the combination of privileged software and opaque decision logic raises legitimate questions about security, oversight, and redress for false positives. Independent audits, narrowly scoped policies, and formal mechanisms to report and rectify errors should be required parts of any attestation‑backed anti‑cheat program.
Publishers and platform owners must balance the operational benefit of hardware‑anchored attestation with the long‑term health of an open, cross‑platform ecosystem. Without transparent governance, the door opens to potential misuse of attestations for DRM or other restrictive practices. That risk is real enough that it deserves explicit guardrails.

Practical recommendations​

For Valve / Steam:
  • Keep the UI addition but document what’s collected and why. If the Hardware Survey will include the fields, publish an explicit telemetry policy and retention schedule.
For publishers / anti‑cheat vendors:
  • Publish precise, auditable attestation policies, limit telemetry to the minimum needed, and provide transition windows and fallback options for users on alternative OSes or older hardware.
For Microsoft and OEMs:
  • Maintain clear, up‑to‑date guidance and safe conversion tools for migrating from MBR to GPT, and ensure firmware updates for fTPM/dTPM where possible. Document exact BIOS labels and steps for common consumer motherboards and OEMs.
For players:
  • Use Steam’s System Information as a first check and verify with msinfo32 and tpm.msc.
  • Backup system images before converting partition styles or toggling firmware features.
  • If you rely on Linux or Steam Deck, be prepared for some titles to be blocked if publishers enforce Secure Boot/TPM requirements; follow official publisher and Valve guidance before changing your primary OS.

Critical analysis — strengths and risks​

Strengths
  • Lower friction for gamers. Surfacing Secure Boot and TPM in Steam is a pragmatic UX improvement that reduces wasted purchases and lowers support load. Gamers can confirm compliance in one place instead of hunting through UEFI menus or Windows consoles.
  • Encourages modern security hygiene. As more players and builders prioritize UEFI/GPT and TPM, the overall base will trend toward stronger boot‑time protections, reducing certain classes of rootkit and pre‑OS compromise.
Risks
  • Fragmentation. The move accelerates the exclusion of alternative OS users (including Proton/SteamOS and the Steam Deck) and owners of older hardware who cannot enable TPM 2.0 or Secure Boot. That creates a real community and accessibility problem.
  • Concentration of power and opaque telemetry. Kernel‑level anti‑cheat with attestation concentrates high privilege and decision‑making in private vendors; without independent audits and tight limits, the model risks abuse or irreparable errors.
  • Operational friction and vendor variability. BIOS labels, fTPM firmware versions (especially on AMD platforms), and vendor update cadence mean some users will need nontrivial intervention—BIOS reflash, private beta firmware, or vendor support—to become compliant. Community troubleshooting threads already show these failure modes.
Where verification is solid and where to be cautious
  • Verifiable: Steam’s beta client displays Secure Boot and TPM state in System Information; publishers such as Activision and EA have documented TPM/Secure Boot requirements in player support and system requirement pages. These facts are publicly observable in the Steam beta and in publisher guidance.
  • Cautionary: precise telemetry retention, Hardware Survey rollout timing, and how publishers will enforce checks (grace periods, exception handling, or fallbacks) are often described as “planned” or “phased” and may change. Treat schedule and policy details as provisional and confirm against official Valve or publisher notices before making irreversible changes.

Conclusion​

Steam’s addition of Secure Boot and TPM indicators is a tasteful, user‑facing update that reflects a bigger shift: firmware state is now a routine compatibility factor for major PC gaming releases. For players, it’s a welcome troubleshooting shortcut — the difference between an immediate "blocked by anti‑cheat" error and a five‑minute settings fix. For the industry, it’s another signal that hardware‑backed attestation is moving from experimental to standard practice.
That standardization brings concrete security benefits: stronger boot‑time guarantees, fewer kernel‑level cheat footholds, and a clearer compatibility baseline. But the tradeoffs are real: fragmentation for Linux and handheld players, operational cost for owners of legacy rigs, and governance questions about privileged anti‑cheat code and telemetry. Those tradeoffs will demand policy, transparency, and independent oversight if the PC gaming ecosystem is to preserve both fairness and openness.
This small Steam UI tweak will help many players avoid the immediate pain of a broken launch. The larger policy choices — who decides platform eligibility, how attestation telemetry is governed, and how the industry supports those left behind — are decisions that will shape PC gaming for years to come.

Source: Neowin Valve adds Secure Boot and TPM checks to Steam on Windows
 
Valve has quietly added a small but consequential item to the Steam beta: a visible check for TPM status and Secure Boot in the client’s System Information pane, and those values will soon be captured in the Steam Hardware Survey—an unobtrusive change with outsized implications for PC players, platform compatibility, and the future of anti‑cheat and DRM enforcement on Windows.

Background​

The PC gaming industry has been moving steadily toward hardware‑level protections to combat increasingly sophisticated cheating and tampering. Two firmware/processor features have risen to the top of that effort: Secure Boot, a UEFI capability that prevents unsigned or tampered boot components from loading, and Trusted Platform Module (TPM) 2.0, a hardware or firmware-backed cryptographic module used for attestation and secure storage. Game publishers and anti‑cheat vendors are starting to require or recommend these features because they raise the bar against kernel‑level cheats and boot‑time tampering.
At the same time, platform vendors and publishers are tightening compatibility rules and telemetry. Valve’s move to surface TPM and Secure Boot status in the Steam beta is both pragmatic and strategic: pragmatic because players need easy ways to verify whether their PC meets new anti‑cheat checks, and strategic because Steam’s Hardware Survey data will provide publishers and Valve with a clearer picture of the installed base that supports these defenses.

What Valve changed in the Steam beta​

What you’ll see in the client​

In the Steam beta, navigate to Help > System Information and scroll to the Operating System or firmware block. New lines now report:
  • Secure Boot — On / Off / Unsupported
  • TPM — Presence and version (for example, TPM 2.0, firmware TPM, or “not found”)
This mirrors the information Windows already exposes via msinfo32 and tpm.msc, but putting it inside Steam makes verification immediate for gamers who don’t want to leave the client before launching a title.

What Valve will collect​

Valve has indicated that these fields will be added to the optional Steam Hardware Survey. That means aggregated data about how many Steam users have Secure Boot enabled and which TPM versions are present will be available to Steam and to partner publishers. The collection is optional for users who opt into the Hardware Survey, but for developers this telemetry will be invaluable for planning minimum requirements and rollout strategies for anti‑cheat enforcement.

Why this matters: the anti‑cheat and DRM context​

Modern anti‑cheat systems increasingly rely on signals that are only available at the firmware or kernel level. That includes:
  • Detecting kernel‑mode cheats that load before anti‑cheat drivers;
  • Verifying boot integrity to detect tampering or rootkits;
  • Using TPM attestation to bind keys or measurements to hardware to detect spoofed identities.
Publishers have started to integrate these protections. Several high‑profile multiplayer shooters have announced or rolled out requirements or recommendations for Secure Boot and TPM as part of new anti‑cheat measures. The practical effect: players with these protections disabled may be blocked from joining certain servers or running multiplayer matches, and publishers can gain forensic signals that are harder for cheat developers to spoof.
This trend has two immediate consequences:
  • Compatibility pressure on PC owners to enable or support TPM 2.0 and Secure Boot.
  • Platform fragmentation where Linux installations, older hardware, or non‑UEFI configurations may be excluded from some new titles.

What Secure Boot and TPM 2.0 actually do (quick primer)​

Secure Boot (UEFI)​

  • Secure Boot is a UEFI feature that allows only cryptographically signed bootloaders, drivers, and OS components to run during system startup.
  • It prevents unsigned or tampered kernel modules and boot processes from executing, which blocks many rootkits and early‑loader cheats.
  • Secure Boot requires UEFI firmware and a GPT boot disk; legacy BIOS/MBR configurations are incompatible.

TPM 2.0 (Trusted Platform Module)​

  • TPM 2.0 is a hardware or firmware module that provides secure key storage and attestation capabilities.
  • It can store cryptographic keys and measurements that help the operating system and applications verify platform integrity.
  • TPM is required for certain OS features (for example, Windows 11 requires TPM 2.0) and enables features like BitLocker key protection and measured boot attestation.
Both systems are complementary: Secure Boot defends the boot sequence, while TPM provides a trusted anchor to prove what happened during boot and to securely store secrets.

How Steam’s checks will affect players right now​

  • Players can verify readiness inside the Steam beta client via Help > System Information without tools or BIOS dives.
  • If a publisher enforces Secure Boot/TPM checks at game launch, Steam’s preflight visibility reduces the classic “it won’t launch” blindspot.
  • The Hardware Survey telemetry will give publishers roll‑out confidence; if only a tiny fraction of players are missing the features, mandating them becomes less risky.
This is not purely theoretical. Several multiplayer titles and anti‑cheat systems have already tied functionality to these protections, and other publishers are publicly discussing plans to do the same. For players, the time to check and prepare is now—especially for those running older or non‑standard configurations.

Step‑by‑step: check and enable Secure Boot and TPM (practical guide)​

Before you change firmware settings, back up your system and ensure you understand the risks. Mistakes with boot mode or disk conversions can render a system unbootable.
  • Check current state in Windows:
  • Press Windows + R, type msinfo32, press Enter. Look for BIOS Mode (should say UEFI) and Secure Boot State (On/Off/Unsupported).
  • Press Windows + R, type tpm.msc, press Enter. Check Status and Specification Version to confirm TPM 2.0.
  • If TPM or Secure Boot is disabled but supported:
  • Reboot and enter UEFI/BIOS (commonly Del, F2, F10 or via Advanced Startup → Restart Now → Troubleshoot → UEFI Firmware Settings).
  • Enable TPM/Intel PTT/AMD fTPM in Security/Trusted Computing menus.
  • Set Boot Mode to UEFI and enable Secure Boot in the Boot or Security menu.
  • If your drive is MBR (Secure Boot requires GPT):
  • Use Microsoft’s mbr2gpt tool from an elevated command prompt: validate first with mbr2gpt /validate /allowFullOS, then convert with mbr2gpt /convert /allowFullOS.
  • Back up first. Converting will change partition tables and can fail on complex multi‑boot setups.
  • After firmware changes:
  • Reboot to Windows and re‑check msinfo32 and tpm.msc.
  • If BitLocker is enabled, suspend it before BIOS changes and resume afterward to avoid recovery prompts.
  • If you’re uncomfortable:
  • Consult motherboard or OEM documentation. Firmware menu names and flows vary widely.
  • Seek professional help if you’re using a business or shared system.

Compatibility landmines and who gets left behind​

Linux and Proton users​

Kernel‑level anti‑cheat systems that rely on Secure Boot and TPM frequently break compatibility with Linux and compatibility layers such as Proton. Where a publisher requires Secure Boot, native Linux players and many Proton‑based configurations may be blocked.

Steam Deck and handhelds​

Handhelds and Linux‑based devices that rely on Proton or custom firmware face uncertain support. Where anti‑cheat requires Secure Boot in Windows, Proton/SteamOS workarounds may not be feasible, and native support could be intentionally blocked.

Older hardware and custom builds​

Many pre‑2018 CPUs and motherboards either lack TPM 2.0 support, require firmware updates, or cannot enable Secure Boot without hardware tweaks. Users running legacy systems, single‑board computers, or systems with MBR disks face real barriers.

Virtual machines and emulators​

Anti‑cheat systems that use TPM attestation or Secure Boot may refuse VMs or sandboxes since virtualization often exposes different firmware traits. This will impact streamers, testers, and cloud‑based setups.

Privacy, telemetry and data collection concerns​

Adding TPM and Secure Boot status to Steam’s Hardware Survey raises important privacy questions. Even if the fields are collected in aggregate and opt‑in, the information is sensitive because it:
  • Reveals whether a system has a hardware root of trust enabled.
  • Can be combined with other telemetry (OS version, hardware IDs) to create more unique device fingerprints.
Two practical points for players:
  • Participation in Steam’s Hardware Survey is optional; if you prefer not to share, you can decline.
  • When telemetry is used to set enforcement policies, publishers may justify stricter requirements based on population measurements—so choosing not to share can indirectly slow adoption visibility.
Publishers and platform operators must balance operational needs (reducing cheating) against user privacy and inclusivity. The industry has not yet settled on standard policies for what anti‑cheat attestation may collect in the future.

Security gains versus new risks​

Notable strengths​

  • Higher barrier for cheat developers: Kernel‑level and boot‑time cheats become much harder to deploy when systems enforce Secure Boot and attest via TPM.
  • Better forensic signals: TPM-based attestation can help anti‑cheat teams detect hardware spoofing and persistent tampering.
  • Reduced attack surface: System integrity checks reduce the number of vectors cheat authors can exploit.

Potential risks and downsides​

  • Kernel‑level anti‑cheat has broad access: Anti‑cheat drivers with kernel privileges are powerful and, if compromised or poorly implemented, pose security and stability risks.
  • User friction and fragmentation: Players with legitimate reasons to run unsigned drivers, custom kernels, or alternative OSes may be excluded.
  • Accidental damage: Users unfamiliar with UEFI/BIOS changes risk misconfiguring boot options, losing data, or encountering BitLocker recovery screens.
  • Potential mission creep: Once hardware attestation is in the anti‑cheat toolbelt, publishers or DRM vendors could request or require additional enforcement (for example, deeper attestation or remote checks), raising governance questions.

What publishers are doing — a concise snapshot​

Several high‑profile publishers and anti‑cheat vendors are moving toward Secure Boot and TPM‑dependent enforcement in either mandated or phased rollouts. Those measures have included:
  • Requiring Secure Boot as a gate to launch certain multiplayer modes.
  • Requiring TPM 2.0 (or at least TPM presence) for full anti‑cheat function.
  • Rolling out phased enforcement to give players time to enable features before they become blocking requirements.
These actions are presented as necessary trade‑offs to restore fair play in competitive ecosystems; they are not presented as performance boosters, but rather as integrity and enforcement tools.
Note: Implementation details, launch dates, and exact enforcement levels vary by title and by publisher. Where publishers have said a title “will require” features at launch, they have sometimes allowed temporary grace periods or phased rollouts in earlier seasons or test windows.

Recommendations for players and system admins​

  • Check now: Use msinfo32 and tpm.msc or the Steam beta System Information to verify Secure Boot and TPM status before a game blocks you.
  • Back up: Always back up critical data before changing UEFI/BIOS settings or converting disk layouts.
  • Update firmware: Motherboard OEM BIOS updates can add or fix TPM/fTPM and Secure Boot capabilities—check vendor support pages.
  • Use the Hardware Survey consciously: If privacy concerns matter, remember the Hardware Survey is optional.
  • Mind BitLocker: If BitLocker is active, suspend it before BIOS changes or you may be forced into recovery mode.
  • If you rely on Linux/Proton/Steam Deck: Track publisher statements carefully—some titles may not be playable until native Linux or Proton-compatible anti‑cheat evolves.
  • Avoid hacks: Avoid registry hacks or third‑party tools that “bypass” TPM/Secure Boot checks; these can create unsupported and potentially insecure configurations.

Four practical checklists​

Quick pre‑play checklist (before launching new multiplayer titles)​

  • Update Windows to latest recommended version (some publishers require recent Windows 10 builds or Windows 11).
  • Open msinfo32 and confirm Secure Boot State = On.
  • Run tpm.msc and confirm TPM is present and Specification Version = 2.0.
  • If either is missing, consult OEM documentation before changing BIOS settings.

BIOS checklist when enabling Secure Boot/TPM​

  • Suspend BitLocker and back up recovery keys.
  • Reboot into UEFI/BIOS and enable TPM (Intel PTT or AMD fTPM).
  • Switch Boot Mode to UEFI (if currently Legacy) and convert disk to GPT if needed.
  • Enable Secure Boot and install default Secure Boot keys if prompted.

Troubleshooting checklist​

  • If Secure Boot option is greyed out, ensure UEFI mode and correct disk partition style (GPT).
  • If TPM says “Compatible TPM cannot be found,” check BIOS settings and firmware updates.
  • If BitLocker recovery pops up, use your saved recovery key to resume and then re‑enable BitLocker.

Decision checklist for privacy‑minded users​

  • Opt out of the Steam Hardware Survey if you prefer not to share TPM/Secure Boot data (if you value privacy over contributing telemetry).
  • Favor publishers with clear transparency about anti‑cheat collection and telemetry policies.
  • Monitor community and official channels for policy changes or enforcement updates.

The broader industry question: assurance versus access​

The move to surface Secure Boot and TPM flags in Steam underscores a growing industry reality: platform operators and publishers are choosing assurance (proof of system integrity) over absolute access (playing anywhere on any configuration). That choice advances security and fairness for competitive play, but it also imposes a gate that many historically open PC ecosystems—Linux, older hardware, and custom setups—must confront.
The path forward will involve trade‑offs and concessionary policies. Essential design questions remain open: how to make anti‑cheat attestation transparent and auditable, how to preserve access for legitimate users with non‑standard setups, and how to prevent legitimate anti‑cheat tools from becoming overly intrusive or misused for DRM.

Conclusion​

Steam’s beta addition of TPM and Secure Boot checks is more than a UX nicety: it’s a concrete signal that the PC gaming ecosystem is entering an era where firmware‑level security will influence who can play and how publishers protect multiplayer integrity. The change helps players avoid last‑minute surprises before launching a match, and gives developers the data they need to decide whether and when to enforce stricter anti‑cheat checks.
That said, the industry still faces serious questions about compatibility, privacy, and the balance between security and openness. Enabling TPM and Secure Boot will improve the security posture of many systems and raise the bar against cheats—but it will also exclude some users and complicate alternative operating environments. Players and system administrators should prepare now: verify their system state, update firmware, back up data, and approach BIOS changes deliberately. The era of hardware‑anchored anti‑cheat is arriving; Steam’s new checks simply make it easier to see that change coming.

Source: Windows Report Steam Beta Adds TPM and Secure Boot Checks on Windows