In the realm of competitive gaming, the latest installment of Battlefield 6 has introduced a robust anti-cheat system that necessitates more than just the usual CPU and GPU specifications. Gamers will need to ensure their systems meet several advanced security requirements, including TPM 2.0, Secure Boot, HVCI, and VBS, to gain access to the game. This guide aims to assist players in verifying that their PCs are equipped for the latest shooter experiences.
TPM 2.0 and Secure Boot
TPM, or Trusted Platform Module, is a hardware-based security feature that is standard on most modern motherboards. If your system lacks this component, it may still have a slot for a TPM 2.0 card, making it worthwhile to research your motherboard model alongside “TPM 2.0” for potential upgrades. Should you find yourself in need of a new motherboard, consider consulting our comprehensive guide on selecting the best gaming motherboard tailored to your needs.
To determine if your PC already has Secure Boot and TPM 2.0 enabled, you can utilize the latest beta version of the Steam client. If you haven’t installed it yet, simply open your Steam client, navigate to the Steam menu in the top left corner, select Settings, and proceed to the Interface tab. Scroll down to Client Beta Participation and opt for Steam Beta Update to join the beta program.
After the beta installation and a restart of the Steam client, head to the Help menu and select System Information. By scrolling to the Operating System section, you can check whether Secure Boot and TPM 2.0 are enabled.
Alternatively, you can verify these features through the Device Manager. By typing “device manager” into the Windows search bar, you can navigate to Security devices to see if a TPM 2.0 device is present. For Secure Boot, access the System Information panel by searching “system information.” If it indicates “On” next to Secure Boot State, you’re in good shape.
For those seeking further details, typing “Device security” into the Windows search bar will reveal a green tick next to Secure Boot if it is active. Information regarding your TPM 2.0 module can be found in the Security Processor section, which will also display a green tick if functioning correctly.
If either feature is disabled and your motherboard is relatively modern, you should be able to enable them via the BIOS/EFI system. Access this by repeatedly pressing the Del key during startup, prior to Windows booting. From there, locate the Secure Boot and TPM 2.0 settings, ensuring they are enabled at their default configurations.
For example, on an Asus motherboard, Secure Boot can be found in the Boot menu, while TPM 2.0 is located in the Advanced > Trusted Computing menu. Conversely, on an MSI motherboard, both features reside within the Security section under Secure Boot and Trusted Computing.
UEFI
For these security features to function correctly, Windows must operate in UEFI mode with the latest GUID partition table (GPT). It’s important to note that even if a UEFI motherboard is present, Windows might still be installed in legacy mode using a master boot record partitioning scheme. If your motherboard has Compatibility Support Module (CSM) enabled, it will need to be disabled. In cases where Windows is not running in UEFI mode, a reinstallation may be necessary.
HVCI
Hypervisor-Protected Code Integrity (HVCI), often referred to as “memory integrity,” is designed to prevent malicious code from infiltrating Windows security processes. To check or enable this feature, type “core isolation” into the Windows search bar. The top option will lead you to memory integrity settings, where you can ensure it is activated.
VBS
Virtualization Based Security (VBS) is another essential software security feature in Windows. To verify its status, perform a search for “system information” in the Windows search bar. If it indicates “Running” next to Virtualization-based security, you are all set. If it is not running, ensure that HVCI is enabled and check again.
With your PC now equipped with the necessary security features, you are ready to dive into the action. For those looking to optimize their gameplay, exploring our guide on the best Battlefield 6 weapons and classes will help you refine your strategy and enhance your performance in the field.
If you encounter any challenges while launching Battlefield 6, or if you have thoughts on the necessity of these security measures to combat cheating, feel free to share your insights in our community Discord server.