• Thread Author
Microsoft’s upgrade machinery is currently offering Windows 11 24H2 to machines that, on paper, fail the company’s minimum security requirements — including systems with TPM 2.0 disabled — and multiple independent reports suggest this is happening to both consumer and enterprise devices, creating a practical and policy gap between what Microsoft says is required and what some users are actually seeing.

Blue cyber-security scene: laptop shows 'TPM disabled' beside a glowing shield with a processor.Background / Overview​

When Windows 11 launched, Microsoft set a clear minimum baseline that included a requirement for TPM 2.0, UEFI with Secure Boot, and a list of supported CPUs. That baseline was intended to raise the platform’s resistance to modern threats by anchoring core features (BitLocker, Windows Hello, virtualization-based security) to hardware-backed protections. Microsoft’s official stance has remained firm: TPM 2.0 is a mandatory requirement for supported Windows 11 devices.
Still, in spring and summer 2025 a sequence of user reports and forum threads described Windows Update offering the Windows 11 24H2 (the “2024 Update”) upgrade to machines where TPM was either absent, incompatible, or explicitly disabled. Observers documented offers arriving on consumer laptops (for example, certain Lenovo IdeaPad models) and in corporate environments that use WSUS and other management tools — in at least some cases appearing to initiate without explicit administrator approval. Those independent reports and community threads paint a consistent picture of sporadic upgrade offers that contradict the public compatibility checklist.
This article unpacks what those reports mean, why TPM 2.0 matters, the plausible technical explanations for the odd rollout behavior, associated security and management risks, and practical steps administrators and power users should take right now.

Why TPM 2.0 is central to the Windows 11 story​

What TPM 2.0 does (in plain terms)​

  • TPM (Trusted Platform Module) is a hardware component — either a discrete chip or firmware-based (fTPM/Intel PTT) — that securely stores cryptographic keys and performs isolated cryptographic operations.
  • Windows 11 uses TPM to enable core security features such as BitLocker drive encryption, Windows Hello biometric protections, and parts of virtualization-based security (VBS) and Credential Guard. These features rely on a hardware anchor that is much harder for malware to tamper with than purely software-based keys.
  • Microsoft has repeatedly framed TPM 2.0 as a non-negotiable part of the modern Windows security baseline. That justification underpins the company’s insistence that unsupported devices may not be eligible for future updates and could miss critical protections.

The official compatibility posture vs. reality​

  • Official documentation and the PC Health Check tool continue to list TPM 2.0 and related platform capabilities as required for a machine to be supported on Windows 11.
  • The crucial distinction is between officially supported devices (Microsoft’s position) and what will actually install. Multiple independent channels now report the latter — that Windows Update is sometimes offering the 24H2 upgrade to devices that lack an enabled TPM 2.0 or whose CPUs are outside the published supported list. This mismatch is the practical problem we’re dealing with.

The evidence: what has been reported so far​

Community and journalist accounts​

  • Several tech outlets and community forum threads recorded instances where Windows 11 upgrade prompts appeared on systems with TPM disabled in UEFI / BIOS and on hardware thought to be unsupported. One widely shared summary came through a German tech blog and spread to mainstream publications. These reports include consumer notebooks and enterprise PCs managed with WSUS or similar tools.
  • Administrators reported devices moving toward 24H2 in environments where update management was expected to prevent such feature updates, suggesting anomalous behavior in the distribution pipeline.

Microsoft’s status pages and official guidance​

  • Microsoft’s release-health documentation for Windows 11 24H2 documents known compatibility issues and describes the use of safeguard holds (compatibility holds) to keep affected devices from being offered feature updates until the issues are resolved. That mechanism indicates Microsoft actively manages which devices receive feature updates for compatibility and driver concerns. The existence of these safeguard holds demonstrates Microsoft has fine-grained control over rollout targeting — which makes unexpected offers all the more notable.

Technical hypotheses: why are unsupported machines being offered 24H2?​

No single smoking-gun explanation is public, but several plausible technical mechanisms — some benign, some concerning — could produce the observed behavior:

1) Detection/rollout bug in the upgrade eligibility logic​

Update rollout is driven by server-side logic that matches devices to eligibility criteria. If a bug or misconfiguration exists in that detection logic, the server could incorrectly mark incompatible devices as eligible and enqueue them for the Windows Update offer. Past incidents (historically) have shown Microsoft can inadvertently offer upgrades when detection logic fails. Multiple news pieces and community threads call this possibility out as a top suspect.

2) OEM/firmware interactions: firmware updates can flip eligibility​

Some vendors push UEFI/firmware updates through Windows Update. In several reported cases a firmware update enabled an fTPM or changed platform reporting such that the device suddenly passed the compatibility check. That activity could explain why otherwise-identical machines receive different outcomes: an OEM firmware push can change the machine’s reported security posture without the user consciously enabling TPM. That interplay is documented in community reports and technical analyses.

3) Gradual or opaque policy change / A-B testing​

Microsoft sometimes treats parts of the upgrade rollout as an A/B test or staged flighting; it’s conceivable the company is quietly widening the eligibility window to accelerate migration from Windows 10 ahead of its end-of-support. However, there’s been no official public policy change relaxing TPM 2.0 as a requirement; the evidence here is circumstantial rather than confirmed. If true, that would be a major policy shift and Microsoft would normally announce it.

4) Remnant or deliberate bypass code paths in installers​

Tools and registry keys — once public — have historically allowed in-place installs on unsupported hardware (registry AllowUpgradesWithUnsupportedTPMOrCPU, Rufus options, etc.). Microsoft removed or tightened official guidance for those workarounds in prior updates, but remnants of bypass logic or new installer code paths could still be exercising different checks in certain contexts. Community testing with ISOs and installation tools has shown that behavior can differ depending on how the upgrade is initiated (e.g., Setup.exe from mounted ISO vs. Windows Update server-driven upgrade).

Risks and trade-offs of installing Windows 11 without TPM 2.0​

Security implications (the most important)​

  • A Windows 11 install on hardware without TPM 2.0 (or with TPM disabled) loses the hardware anchor for many protections. That increases exposure to:
  • Firmware-level attacks and credential exfiltration.
  • Less robust protection for BitLocker keys and other cryptographic secrets.
  • Weaker guarantees for virtualization-based security features that rely on a hardware TPM to seal keys and attest state.
  • Microsoft’s official position warns that unsupported hardware configurations may not be eligible for all updates in the future; that could result in missed security patches or degraded protection over time. (theverge.com, techradar.com)

Stability and driver compatibility​

  • Unsupported devices can face driver incompatibilities or device-specific stability problems. Microsoft and some OEMs use safeguard holds precisely to prevent upgrades that would break a broad set of devices due to driver/firmware incompatibilities. The removal of a hold or an incorrect eligibility decision could expose a machine to such issues.

Management and compliance risks for organizations​

  • Enterprises relying on WSUS, SCCM, or Windows Update for Business expect predictable control. Reports of devices being offered or even upgraded without admin consent are alarming and create compliance headaches — especially where regulatory or security policies require a specific platform baseline. Some administrators reported surprise offers in environments that had configured safeguards. Those anecdotes imply an inconsistent enforcement of management boundaries in the wild.

Practical recommendations: what to do now (by role)​

For home users — safe checklist​

  • Do not accept the upgrade offer if your system is failing the PC Health Check or you have TPM disabled and you do not intentionally want to run an unsupported configuration.
  • Check TPM status: open tpm.msc from the Start menu or use Settings → Security → Device Security to see if TPM is present and enabled.
  • Back up everything before you proceed with any feature update. Create a full disk image or at minimum a current file backup.
  • If you intentionally want Windows 11, prefer a clean path: enable TPM in UEFI when available, update firmware from the OEM, and then run the upgrade tool. Avoid bypass workarounds unless you accept the unsupported state and its risks.

For IT administrators and organizations — containment & auditing​

  • Audit any unexpected offers immediately. Check Update history and Windows Update logs; verify whether devices were offered or installation actually started. Correlate with Windows Update for Business reporting and WSUS logs.
  • Use Group Policy / WUfB to block or defer feature updates:
  • Configure Windows Update for Business policies (via GPO or MDM) to defer feature updates (up to 365 days) or pause them. This is the recommended way to retain control over when a machine may attempt to move to a new feature build.
  • Check safeguard holds and compatibility IDs on Microsoft’s release-health pages and your Windows Update for Business reports. Microsoft publishes safeguard IDs for known issues; those holds can explain why a device may or may not be offered 24H2.
  • Lock down automatic installation behavior: ensure devices managed by WSUS/SCCM are assigned to the correct classification and deployment rings so that Microsoft-pushed offers don’t reach end-user machines unexpectedly. If you are seeing offers despite WSUS controls, investigate whether a misapplied setting or an OEM firmware update delivered via Windows Update could have changed device eligibility reporting.

For vendors and OEMs — coordination points​

  • If OEM firmware updates are enabling fTPM or changing platform reporting, make sure customers and admins are clearly notified. Firmware pushes that change upgrade eligibility should be accompanied by release notes and guidance.
  • Work with Microsoft to clarify which update pathways can change eligibility state (firmware via Windows Update, OEM update packages, or WWPS flights).

How to check if your device is being targeted and how to opt out​

  • On a single device, use Settings → Windows Update → Update history to inspect recent activity and whether the “Feature update to Windows 11, version 24H2” was offered.
  • For mass environments, Windows Update for Business reporting and Intune provide telemetry for feature update status and safeguard IDs. Group Policy-managed devices can be verified via registry keys and the Windows Update client policy settings. Microsoft documents the relevant policy keys and how to defer/pause updates.
  • Where necessary, pause feature updates (up to 35 days via local settings, up to 365 days via policy settings) while you investigate. This prevents an unexpected upgrade during your audit.

Analysis: what this moment means for Microsoft and customers​

This set of incidents (sporadic upgrade offers to devices without TPM 2.0 enabled) exposes a tension between two competing priorities:
  • Microsoft’s security-first message — that Windows 11 requires TPM 2.0 to deliver a uniformly higher security baseline.
  • The practical reality that tens of millions of Windows 10 machines remain in the wild, many reaching end-of-support, and Microsoft (or ecosystem partners) are pressed to avoid leaving large populations exposed.
If the observed behavior is a bug in Microsoft’s rollout logic, it is fixable and should be rolled back quickly; if it is a deliberate but quiet expansion of eligibility, then transparency and clear guidance are overdue. Either way, the mismatch between policy and behavior raises legitimate accountability, support, and compliance questions that enterprise customers and privacy-conscious consumers will rightly press Microsoft to answer.

Bottom line and recommended posture​

  • The conservative stance remains correct: TPM 2.0 should be treated as mandatory for supported Windows 11. Installing Windows 11 on hardware without TPM 2.0 (or with TPM disabled) is possible in some cases today, but it is not endorsed and carries security, update, and support risks. (theverge.com, techradar.com)
  • Organizations should immediately audit upgrade offers, pause feature updates where necessary using Windows Update for Business or Group Policy, and verify WSUS/SCCM settings to ensure no unexpected feature deployments slip through.
  • Home users who do not want the risk of unsupported configurations should decline unexpected upgrade prompts, confirm TPM status via tpm.msc or Settings → Security, and only proceed with an upgrade after confirming the device is on a supported path (firmware updated, TPM enabled, drivers current).
  • Be especially cautious with any automatic upgrades reported in managed environments — if devices controlled by WSUS or similar systems are being offered upgrades unexpectedly, treat that as a high-priority incident and investigate logs, policy assignments, and recent firmware pushes.
The gap between Microsoft’s public compatibility policy and what some users are being offered complicates the transition to Windows 11. It also creates a narrow window for manufacturers, administrators, and security teams to reassert control: confirm device state, hold unexpected upgrades, and demand clarity from software and hardware vendors about what the upgrade offer actually entails before authorizing any mass migration away from Windows 10. (learn.microsoft.com, techradar.com)

Conclusion
Windows 11’s requirement for TPM 2.0 still stands as Microsoft’s security position, but real-world upgrade behavior has begun to diverge in ways that matter to ordinary users and enterprise teams. Whether the current upgrade offers to older or TPM-disabled systems are the result of a bug, an OEM-driven firmware change, or a deliberate but undisclosed policy shift, the immediate imperative is the same: treat unexpected upgrade offers as a high-priority operational and security issue, verify device states before consenting to any migration, and defensively apply update controls until Microsoft provides clear, authoritative guidance. (theverge.com, techradar.com, learn.microsoft.com)

Source: Notebookcheck Windows 11 upgrade possible for older models: TPM 2.0 apparently not mandatory
 

Back
Top