Valve's Steam beta now surfaces whether your PC has Secure Boot and TPM enabled, making it trivial for gamers to see if their system will pass the new breed of anti‑cheat checks that many publishers are rolling out. The status shows up under Help → System Information in the Steam client (look under the Operating System section), and the Steam beta already exposes both the Secure Boot state and the TPM details so you can confirm compliance without digging through UEFI or Windows tools.
Windows 11 raised the profile of two firmware‑level defenses: Secure Boot and Trusted Platform Module (TPM) 2.0. Microsoft treats TPM 2.0 as a necessary building block for many of its platform protections and recommends Secure Boot for device integrity. TPM stores cryptographic keys and measured‑boot values that higher‑level Windows features (BitLocker, Windows Hello, Device Health Attestation) use to prove a machine’s integrity; Secure Boot prevents unsigned or tampered boot components from loading during startup. Together they form a hardware‑anchored foundation for defending against boot‑level malware and kernel tampering.
In the last 12–36 months the PC gaming industry has increasingly leaned on those platform features to strengthen kernel‑level anti‑cheat approaches. High‑profile publishers now require Secure Boot and TPM for some titles or anti‑cheat subsystems, meaning players without those features active can be blocked at launch. That shift is what makes Valve’s small but practical Steam client change notable: it reduces friction for gamers who need to check compliance quickly.
Valve also indicated this information will eventually be included in Steam’s Hardware Survey, which would let the platform show population numbers for how many Steam users have Secure Boot enabled and what TPM versions are in use. For publishers and the community, that’s an important telemetry data point as anti‑cheat and DRM policies make use of these features.
That industry momentum is the proximate reason Valve’s Steam client change matters: it gives gamers an immediate, one‑click way to check whether they will be blocked by these new checks before they buy or try to join a match. Steam surfacing Secure Boot and TPM is a small UI change with outsized utility for an audience being asked to flip firmware switches to play certain games.
Source: Tom's Hardware Check that you're ready for invasive DRM with new feature built right into Steam — Secure Boot and TPM status now listed right in the app
Background
Windows 11 raised the profile of two firmware‑level defenses: Secure Boot and Trusted Platform Module (TPM) 2.0. Microsoft treats TPM 2.0 as a necessary building block for many of its platform protections and recommends Secure Boot for device integrity. TPM stores cryptographic keys and measured‑boot values that higher‑level Windows features (BitLocker, Windows Hello, Device Health Attestation) use to prove a machine’s integrity; Secure Boot prevents unsigned or tampered boot components from loading during startup. Together they form a hardware‑anchored foundation for defending against boot‑level malware and kernel tampering. In the last 12–36 months the PC gaming industry has increasingly leaned on those platform features to strengthen kernel‑level anti‑cheat approaches. High‑profile publishers now require Secure Boot and TPM for some titles or anti‑cheat subsystems, meaning players without those features active can be blocked at launch. That shift is what makes Valve’s small but practical Steam client change notable: it reduces friction for gamers who need to check compliance quickly.
What Valve added to Steam and why it matters
What the Steam change actually shows
In the Steam beta, the System Information page — accessible from the menu bar at Help → System Information — lists a number of hardware and firmware details. Scroll to the Operating System block and you’ll now find lines for Secure Boot (On / Off / Unsupported) and TPM (presence and version), alongside the usual BIOS Mode and OS version fields. This mirrors the same basic data Windows provides in msinfo32 and tpm.msc, but surfacing it in Steam means players can confirm readiness from the client they already run every day.Valve also indicated this information will eventually be included in Steam’s Hardware Survey, which would let the platform show population numbers for how many Steam users have Secure Boot enabled and what TPM versions are in use. For publishers and the community, that’s an important telemetry data point as anti‑cheat and DRM policies make use of these features.
Why game publishers pushed this
Kernel‑level cheats and early‑loader exploits are a persistent problem in modern competitive multiplayer. Anti‑cheat solutions often need to start before user‑level games or drivers can be tampered with, and Secure Boot gives anti‑cheat vendors a trusted launch environment to register and protect their kernel components. TPM augments that by recording boot measurements and safeguarding keys used for disk encryption and attestation. Publishers like EA and Activision have publicly tied Secure Boot/TPM to their anti‑cheat roadmaps for flagship series, which in turn creates real compatibility pressure on players.How Secure Boot and TPM work (concise technical primer)
- Secure Boot is a UEFI firmware feature that checks digital signatures of firmware, bootloaders, and other early startup components so the system only runs trusted code before Windows loads. If signatures don’t match, the firmware can refuse to boot that component. This is signed‑code enforcement at the earliest stage of the boot chain.
- TPM (Trusted Platform Module) is a hardware or firmware device that stores cryptographic keys and records measured‑boot hashes. TPM 2.0 is the version Microsoft requires for modern Windows 11 features. TPM can be a discrete chip, embedded in the CPU package, or implemented as firmware (fTPM), but its security model separates sensitive operations from the host OS.
- Measured boot: Secure Boot checks signatures; TPM can record boot‑time hashes so the OS or remote services can later verify that the platform started in a known good state. This measured chain of trust is why anti‑cheat vendors rely on both features for kernel protection and attestation.
How to check and enable Secure Boot / TPM (practical steps)
If Steam’s System Information shows Secure Boot or TPM as disabled or unsupported, the typical steps to bring a modern PC into compliance are:- Confirm current state in Windows:
- Run System Information (Win + R → msinfo32) and look for BIOS Mode (should be UEFI) and Secure Boot State (On/Off/Unsupported).
- Run the TPM management console (Win + R → tpm.msc) to see whether a TPM is present and the specification version.
- Enter UEFI/BIOS settings:
- Use Windows Advanced startup → Troubleshoot → Advanced options → UEFI Firmware Settings → Restart, or press the manufacturer-specified key at boot (F2/DEL/F12 etc.). TPM and Secure Boot options are commonly under Security, Advanced, or Trusted Computing menus.
- Enable TPM and/or fTPM / Intel PTT:
- On many motherboards the switch is labeled TPM, AMD fTPM, Intel PTT, or Security Device Support. Enable it and save/exit. Firmware TPMs are often off by default on DIY motherboards.
- Enable Secure Boot and set Platform to UEFI:
- Ensure Disk partition style is GPT (not MBR) and that BIOS Mode is set to UEFI. Then enable Secure Boot and (in some firmware) restore factory keys or set the Secure Boot mode to Standard. Save and reboot.
- Verify in Windows again:
- Re‑open msinfo32 and tpm.msc to confirm Secure Boot State is On and TPM Specification Version is 2.0 (if supported). Many anti‑cheat systems require the TPM to be present and active, not merely available.
The gaming angle: which titles and anti‑cheats are pushing Secure Boot / TPM
In 2024–2025 a number of major multiplayer titles and publishers publicly tied Secure Boot and TPM requirements to their anti‑cheat strategies. Activision announced phased enforcement for its Ricochet system and Call of Duty entries, while EA’s Battlefield franchise integrated Javelin — a kernel‑level anti‑cheat that requires Secure Boot — and confirmed Steam Deck and Linux compatibility concerns as a result. These moves aren’t hypothetical: publishers have started to display in‑game prompts and launch checks that require firmware compliance.That industry momentum is the proximate reason Valve’s Steam client change matters: it gives gamers an immediate, one‑click way to check whether they will be blocked by these new checks before they buy or try to join a match. Steam surfacing Secure Boot and TPM is a small UI change with outsized utility for an audience being asked to flip firmware switches to play certain games.
Risks, pushback, and why some users are uneasy
Kernel‑level anti‑cheat and privileged software
Anti‑cheat systems that insist on kernel‑level drivers and pre‑boot presence (loaded early at system start) raise two clear concerns: security attack surface and platform access control. Kernel‑level components run with the highest privileges; a flaw there can be devastating. That’s the argument critics make about systems like Riot’s Vanguard and EA’s Javelin, even as developers counter that kernel privileges are needed to outpace cheat authors who themselves operate at low levels. Several publications and security researchers documented the debate and vendor responses, including expanded bug bounties and security reviews from anti‑cheat teams.Privacy and telemetry worries
TPM and Secure Boot are attestation tools: they help prove a machine's state, which is useful for device security but can be spun into a form of gatekeeping if used for DRM or strict platform checks. Publishers say these checks do not exfiltrate personal user data and only verify boot state; however, distrust remains among communities worried about opaque decisions, telemetry collection, and the mixing of platform security with DRM or anti‑consumer restrictions. Independent reporting about how publishers framed the rollout highlights both assurances and skepticism from users.Compatibility impact: Steam Deck, Linux, and older hardware
The Secure Boot requirement breaks compatibility for some Linux installations, Proton‑based compatibility layers, and handheld PCs that either do not support Secure Boot emulation or where the anti‑cheat stack refuses to run. EA confirmed Battlefield 6 would not operate on Steam Deck because Javelin depends on Windows Secure Boot and a kernel driver model incompatible with Valve’s Linux‑based compatibility layer. This is not theoretical: several outlets documented Steam Deck and Linux exclusions tied to that enforcement. The result is fragmentation: gamers on alternative OSes or older machines may be locked out of AAA releases.What Valve’s small UI change reveals about the bigger trend
Valve surfacing Secure Boot and TPM status is an acknowledgement that firmware‑level settings are now part of the normal compatibility checklist for modern PC games. The change:- Reduces friction: players can check in the Steam client without hunting through UEFI menus or Windows consoles.
- Signals adoption: Steam is preparing to treat Secure Boot/TPM as first‑class compatibility attributes alongside GPU, CPU, and RAM. Valve’s plan to add these to the Hardware Survey will make adoption visible to the community and industry.
- Highlights a governance problem: when platform security primitives become prerequisites for entertainment, questions about access, vendor responsibility, and user choice move from the margins to the mainstream. The UI change is a pragmatic step, not a solution to those governance questions.
Recommendations for players, builders, and sysadmins
- If you play competitive or high‑profile AAA multiplayer, treat Secure Boot and TPM as part of your compatibility checklist. Use Steam’s System Information as a quick check and verify via msinfo32 and tpm.msc for detailed state.
- If you build or buy a PC and want future compatibility, prefer UEFI/GPT configurations and ensure firmware upgrades are available for your motherboard. Most modern boards can enable TPM (fTPM or Intel PTT) and Secure Boot, but some older systems will not. Firmware updates can add or improve fTPM support on certain vendor boards.
- For Steam Deck and Linux users, be aware that kernel‑level, Secure Boot–dependent anti‑cheat systems may block certain games. Keep expectations realistic: some publishers have explicitly confirmed non‑support for Steam Deck when anti‑cheat requires Secure Boot.
- Maintain security hygiene: enabling Secure Boot and TPM is generally a net positive for platform security, but users should keep firmware, drivers, and anti‑cheat components up to date. If you have privacy concerns, consult publisher statements and independent security reporting about what telemetry (if any) a given anti‑cheat system collects.
Critical analysis: strengths and potential harms
Strengths
- Lowering friction for compatibility checks. Surfacing Secure Boot and TPM in Steam is a pragmatic UX improvement that helps players quickly determine if they’ll be blocked by firmware checks. That’s useful, avoids wasted purchases or surprise launch failures, and reduces support overhead for publishers.
- Encouraging better security posture. If major titles push Secure Boot/TPM and platform tooling makes it easy to check and enable them, a large portion of the PC population will gain stronger boot‑time protections and better disk encryption hygiene. That can materially reduce certain classes of rootkit and pre‑boot compromise.
Potential harms and unresolved problems
- Access fragmentation. Requiring firmware features fragments the player base across OSes and device types. Linux and Steam Deck players, plus users of older hardware, face a growing list of incompatible titles. Valve’s change helps identify the problem, but does not solve the core compatibility loss.
- Concentration of power and trust. Kernel‑level anti‑cheat drivers with early boot presence concentrate enormous power in private vendors’ hands. While vendors point to audits, bounties, and limited data collection, the combination of privileged software and opaque decision logic is a legitimate security and consumer‑rights concern. Independent security review and transparent governance remain vital.
- Risk of creeping DRM use. Any system that attests device state can be repurposed for DRM or restrictive platform rules. Presently vendors frame Secure Boot/TPM as anti‑cheat and security features; in the wrong hands they could enable more invasive checks. The community should watch for scope creep and demand transparent, narrowly defined usage policies. (This is a cautionary statement: claims of specific repurposing should be verified against publisher practices.)
Bottom line
Valve’s Steam beta change to show Secure Boot and TPM status is a small but meaningful UX improvement that reflects a larger shift: firmware security is now a real compatibility requirement in modern PC gaming. The change will save time for players and support teams, and Steam’s planned Hardware Survey inclusion could illuminate how widespread adoption already is. At the same time, the industry’s movement toward kernel‑level anti‑cheat backed by Secure Boot and TPM raises important questions about platform access, compatibility for alternative OSes, and how privileged code is audited and governed. Valve’s UI tweak helps players navigate the immediate practicalities, but the deeper tradeoffs — security vs. openness, protection vs. exclusion — remain unresolved and demand continued scrutiny from players, developers, and security researchers.Quick checklist: what to do right now
- Open Steam (beta channel), go to Help → System Information → Operating System and check Secure Boot / TPM status.
- If either is off and you need them, consult your motherboard/PC vendor for the exact BIOS steps and, if necessary, update UEFI firmware.
- Verify in Windows with msinfo32 and tpm.msc to confirm state after reboot.
Source: Tom's Hardware Check that you're ready for invasive DRM with new feature built right into Steam — Secure Boot and TPM status now listed right in the app