Gaming’s latest blockbusters, like the highly anticipated Battlefield 6 and Call of Duty Black Ops 7, are raising the stakes not just with graphics, but with their rigorous anti-cheat systems. Beyond your typical CPU and GPU specifications, these titles demand specific PC security features. If you’ve been scratching your head over acronyms like TPM 2.0, Secure Boot, HVCI, and VBS, you’re not alone. This comprehensive guide will walk you through enabling these essential security settings, ensuring your PC is fully prepared for the battlefield.
For many, these security requirements might ring a bell – TPM 2.0 and Secure Boot are prerequisites for installing Windows 11. If your system is already running a legitimate copy of Windows 11, there’s a strong possibility you’re already good to go for Battlefield 6 and Black Ops 7. Windows 10 users, however, might find themselves needing to take a few extra steps.
Understanding and Enabling TPM 2.0 and Secure Boot
First up is TPM 2.0, or Trusted Platform Module. This critical hardware-based security component is built into most modern motherboards. If your current board lacks it, you might find a dedicated slot for a TPM 2.0 expansion card – a quick search for your motherboard model plus ‘TPM 2.0’ can confirm this. Should you need a motherboard upgrade, ensure you choose one that meets your gaming needs and security requirements.
Before diving deep, let’s confirm if your PC already has Secure Boot and TPM 2.0 enabled. The Steam beta client offers a convenient way to check. If you’re not already on the beta, open Steam, click the ‘Steam’ menu (top-left), go to ‘Settings’, then ‘Interface’. Under ‘Client Beta Participation’, select ‘Steam Beta Update’ to enroll.
After the beta update and Steam restart, navigate to the ‘Help’ menu and choose ‘System Information’. Scroll to the ‘Operating System’ section, where you’ll find the current status of Secure Boot and TPM 2.0.
You can also verify these features directly within Windows. For TPM 2.0, a hardware component, simply type ‘Device Manager’ into the Windows search bar. Expand ‘Security devices’ to see if a TPM 2.0 module is listed.
To check Secure Boot in Windows, type ‘System Information’ into the Windows search bar. Look for ‘Secure Boot State’; if it says ‘On’, you’re all set.
For a more detailed overview, search for ‘Device security’ in Windows. Here, Secure Boot will show a green checkmark if active, with an optional ‘Learn more’ link. Your TPM 2.0 module’s status can be found under the ‘Security Processor’ section, also indicated by a green check for proper function.
If any of these features are disabled, you’ll likely need to activate them within your motherboard’s BIOS/UEFI settings (assuming you have a modern board). To access this, repeatedly press the ‘Del’ key (or your specific motherboard’s key, often F2, F10, or F12) immediately after powering on your PC, before Windows begins loading. Once in the BIOS, locate the Secure Boot and TPM 2.0 controls and ensure they are enabled with their default settings.
On an Asus motherboard, for example, Secure Boot is typically found in the ‘Boot’ menu, while TPM 2.0 is usually under ‘Advanced\Trusted Computing’. Keep in mind that menu names and locations can vary between motherboard manufacturers, so you might need to explore your specific BIOS’s boot and security sections.
For an MSI motherboard, both Secure Boot and TPM 2.0 controls are often located within the ‘Security’ section, under their respective ‘Secure Boot’ and ‘Trusted Computing’ subsections. Regardless of your motherboard, the goal is to confirm both Secure Boot and the TPM 2.0 device are switched on.
Ensuring Your PC Uses UEFI Mode
For these advanced security features to function correctly, Windows must be running in UEFI mode with a GUID Partition Table (GPT). It’s important not to assume this is always the default, as even with a UEFI-compatible motherboard, Windows can sometimes be installed in a legacy mode (Master Boot Record or MBR) via a Compatibility Support Module (CSM).
If your motherboard’s BIOS has CSM enabled (often found in the ‘Boot’ section), it needs to be disabled. If your Windows installation is currently running in a non-UEFI mode, you might need to reinstall the operating system in UEFI mode to ensure full compatibility.
Activating Hypervisor-Protected Code Integrity (HVCI)
Despite its complex name, Hypervisor-Protected Code Integrity (HVCI) – often simply called ‘Memory integrity’ in Windows – is straightforward to manage. This feature is crucial for preventing malicious code from infiltrating Windows’ security processes. To enable or check its status, type ‘core isolation’ into the Windows search bar. ‘Memory integrity’ will appear as the primary option; ensure it’s toggled ‘On’.
Verifying Virtualization-Based Security (VBS)
Lastly, Virtualization-Based Security (VBS) is another software-level security layer in Windows. Its status can be checked similarly to Secure Boot: type ‘system information’ into the Windows search bar. If ‘Virtualization-based security’ shows as ‘Running’, you’re all set. If not, double-check that HVCI is enabled, then re-verify VBS.
With your PC now fortified with the latest security features, you’re ready to dive into the action! Have you encountered any hurdles getting your games to run, or do you appreciate the added security measures to combat cheaters? Share your experiences and thoughts with the community.










