{"id":30195,"date":"2025-05-04T07:41:32","date_gmt":"2025-05-04T11:41:32","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=30195"},"modified":"2025-05-04T07:41:32","modified_gmt":"2025-05-04T11:41:32","slug":"what-is-tpm-2-0-and-why-does-windows-11-require-it","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/what-is-tpm-2-0-and-why-does-windows-11-require-it\/","title":{"rendered":"What is TPM 2.0 and Why Does Windows 11 Require It?"},"content":{"rendered":"<p><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\"><strong>What is TPM 2.0 and Why Does Windows 11 Require It?<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" alignleft\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2025\/tpm.png\" alt=\"What is TPM 2.0 - Cloudeight InfoAve\" width=\"168\" height=\"168\" \/><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As most of you know by now, one of the main reasons that older PCs cannot run Windows 11 is that older computers don&#8217;t support TPM 2.0. But what the heck is TPM 2.0 anyway, and why does Microsoft think it&#8217;s so important?<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">That&#8217;s a good question, and while the answer is quite geeky, we&#8217;ll try to answer that question without getting too technical.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>So, what is TPM 2.0 and why is it so important?<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0, or Trusted Platform Module version 2.0, is a hardware-based security chip that resides on a computer&#8217;s motherboard or is integrated into the processor (CPU). It acts as a secure cryptoprocessor designed to perform cryptographic operations to securely store sensitive information.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Here are some of the things TPM 2.0 does:<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">One of its primary functions is to securely store cryptographic keys, such as those used for drive encryption (like BitLocker), user authentication (like Windows Hello), and digital certificates. These keys are protected within the TPM and are much harder for malware or attackers to access compared to software-based storage. \u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">During the boot process, the TPM can take measurements of the system&#8217;s firmware, bootloader, and operating system components. These measurements are stored securely within the TPM. This allows the system to verify its booting with trusted and untampered software. This process is often referred to as &#8220;Measured Boot.&#8221;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The TPM 2.0 has a unique, hardware-bound key called the Endorsement Key (EK). This key can be used to cryptographically identify the specific hardware. This allows the platform to prove its identity to other systems and services in a secure manner.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 includes a high-quality hardware random number generator, which is crucial for many cryptographic operations.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>How TPM 2.0 benefits the user<\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 can securely store the encryption keys for your hard drive. This ensures that if your computer is stolen, the data on the drive remains inaccessible without the correct authentication, which is tied to the TPM. It can also ensure that the system boots into a trusted environment before unlocking the drive.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">By measuring the boot components, TPM 2.0 helps ensure that the operating system hasn&#8217;t been tampered with before it loads. This protects against bootkit and rootkit malware. \u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 enhances the security of biometric authentication, like facial recognition and fingerprint scanning, by securely storing the biometric data and cryptographic keys used for authentication. \u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Credential Guard is supported by TPM 2.0. This Windows feature uses virtualization-based security to isolate and protect sensitive credentials, leveraging the TPM for secure storage of encryption keys. \u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 can contribute to creating isolated and secure environments for sensitive computations. \u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">While controversial for some users, TPM 2.0 can be used to enforce DRM policies by securely managing keys and verifying the integrity of content playback paths.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 can be used as a secure access point for passwordless authentication methods, reducing the reliance on traditional passwords.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TPM 2.0 acts as a hardware root of trust, providing a secure foundation for various security features. By performing cryptographic operations in dedicated hardware and securely storing sensitive information, it greatly enhances the overall security of a computer against software-based attacks and physical tampering.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The requirement for TPM 2.0 in Windows 11 highlights its importance in modern operating system security. It provides a crucial hardware-backed layer of protection that software alone cannot achieve.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">So, you can see that the TPM 2.0 requirement in Windows 11 is more than a Microsoft ploy to get you to upgrade to Windows 11. On the other hand, Windows PCs from Windows 1.0 through Windows 10 didn&#8217;t have TPM 2.0, and nobody seemed to care.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">But anyway, now at least you know what TPM 2.0 is and what it does. If your current Windows 10 computer won&#8217;t run Windows 11, will you rush out and buy a new computer with TPM 2.0 to run Windows 11? Or will you stick with Windows 10 and use something like <a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/keep-windows-10-secure-beyond-2025-with-0patch\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">0patch<\/span><\/a> to keep security patches up-to-date after Microsoft ends support for Windows 10 on October 14, 2025?<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is TPM 2.0 and Why Does Windows 11 Require It? As most of you know by now, one of the main reasons that older PCs cannot run Windows 11 is that older computers don&#8217;t support TPM 2.0. But what the heck is TPM 2.0 anyway, and why does Microsoft think it&#8217;s so important? That&#8217;s a good question,\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/what-is-tpm-2-0-and-why-does-windows-11-require-it\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1678,4353,4221],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30195"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=30195"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30195\/revisions"}],"predecessor-version":[{"id":30198,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30195\/revisions\/30198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13597"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=30195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=30195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=30195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}