Install Windows 11 on Any PC: Make Bootable USB Without TPM

Rufus version 3.2 and above allows you to create a tweaked Windows 11 bootable media. While creating the bootable USB drive, you can remove the 4GB RAM, TPM 2.0, Secure Boot, and Microsoft Account sign-in requirements.

Install Windows 11 on Any PC: Make Bootable USB Without TPM

Windows 11 system requirements

Windows 11 is the most popular Windows operating system as Microsoft will discontinue Windows 10 support in October 2025. Althougt Microsoft offered a free Windows 11 upgrade for Windows 10 users, most computers will fail to upgrade due to Windows 11 system requirements. Below are the official Windows 11 system requirements:

  • Processor 1 gigahertz (GHz) or faster with two or more cores on a compatible 64-bit processor or system on a chip (SoC)
  • RAM 4 gigabytes (GB) or greater
  • Storage 64 GB or greater free storage space is required to install Windows 11
  • System firmware UEFI, Secure Boot capable
  • TPM Trusted Platform Module (TPM) 2.0
  • Graphics card Compatible with DirectX 12 or later and a WDDM 2.0 driver
  • Display High-definition (720p) display, 9-inch or large monitor, 8 bits per color channel

Internet connection Internet connectivity is necessary to perform updates, and to download and use certain online features

Make Your USB Bootable (Easy Method)

  • Plug in your USB drive – Make sure it’s empty or backed up. (Download)
  • Open Rufus – Click “Select” and choose your Windows 11 ISO file.

Set Options –

  • Partition: GPT
  • Target system: UEFI
  • File system: NTFS
  • Bypass TPM & Secure Boot – Tick the option in Rufus if your PC doesn’t have TPM.
  • Click Start – Rufus will create the bootable USB. Wait until it finishes.
  • Done! – Safely remove your USB. It’s ready to install Windows 11.

 Tip: Follow the steps exactly, and you can install Windows 11 on PCs without TPM or Secure Boot safely.

If your PC does not meet the official Windows 11 system requirements, don’t worry. With the help of a free tool called Rufus, you can easily create a bootable USB drive and install Windows 11 on unsupported hardware. Rufus now comes with built-in options to bypass requirements like TPM 2.0, Secure Boot, and the 4GB RAM limit.

Why Use Rufus?

  • Rufus is free and safe.
  • It can create bootable USB drives in just a few clicks.
  • The latest versions include automatic bypass settings for Windows 11.
  • It saves time by skipping unnecessary setup screens.

Once your USB drive is created, open it from within Windows and run Setup. Again, you should not need to boot off the USB drive. Finish setup and your OS will be updated.

The latest final version of Rufus launched a few hours ago. The new update, version 3.22, which had came out last week as beta, adds the option to disable BitLocker encryption from within the Windows User Experience window. Previously, Rufus had added bypass for Windows 11 RAM, Secure Boot, TPM 2.0, and Microsoft Account (MSA) requirements too.


A Windows User Experience window will appear. Make sure to check the options to remove the Secure Boot and TPM 2.0 requirements. Additionally, you can disable the requirement to use an online Microsoft account. Click the "OK" button to start creating the USB installer.

What is TPM and TPM 2.0?

The Trusted Platform Module (TPM) is a specialized chip on a computer's motherboard designed to enhance hardware security by securely storing cryptographic keys, passwords, and certificates. TPM 2.0, the latest version, offers a more robust and flexible architecture compared to its predecessor, supporting a wider range of cryptographic algorithms. It plays a critical role in enabling security features such as Windows BitLocker drive encryption and ensures a secure system boot, helping to protect against unauthorized access and tampering.

The TPM is used to make authenticating via a local PIN or biometric authentication method more secure, as no application running in the operating system (including a malicious kernel driver or a rootkit) can access the private data in their decrypted form.

The TPM, combined with Secure Boot, offer a function called measured boot. This thing verifies that all components in the chain of trust during the system boot are unaltered; if any is, boot up will fail.

TPM may be used (but currently isn't used) for increased security in regular applications. You can do Bitlocker encryption of the system drive with no password and, on new enough CPUs, with overhead so small it’s hard to measure and basically impossible to notice without an actual measurement.

Previous Post Next Post

نموذج الاتصال