User Guide

Microsoft Pluton
Designed by Microsoft, Pluton is integrated into the latest
CPUs to deliver built-in, next-generation security, including
Trusted Platform Module 2.0. Made for today’s ever-
changing security landscape, Pluton supports zero trust
and helps ensure system integrity from the moment the
device starts with nonstop protection of data, credentials,
and applications. Pluton is always up to date, helping
protect against current and emerging threats.
Continuous up-to-date protection. Security at the very
core, built into the CPU and designed by Microsoft, helps
ensure code integrity and the latest protection with
updates delivered by Microsoft
Physical attack mitigation (on-die to main CPU). Pluton
helps protect against physical attacks — protecting
credentials, identities, personal data, and encryption keys
even if an attacker has installed malware encryption keys
or has complete physical possession of the PC
Streamline security management and deploy with
confidence across diverse locations — including the
cloud. Help protect devices, data, apps, and identities
anywhere, knowing that 99.6% of applications are
compatible with Windows 11.*
AMD PRO security
Take advantage of cutting-edge security features with
AMD PRO security: a multilayered set of security features
at the hardware, OS, and system level ready to help defend
against the sophisticated attacks of today and tomorrow.
AMD Secure Processor. Enables root-of-trust secure boot-
up, creating a safe handshake from the silicon to the BIOS
to the operating system
AMD Modern Security Architecture. Engineered to
validate silicon-level instructions and expose attack
vectors before they can be executed; locks out known
threats and requires fewer patches
AMD Shadow Stack. Robust security approach to help
detect and thwart control-flow attacks; checks the normal
program stack against a hardware-stored copy and
enables Microsoft Hardware-Enforced Stack Protection
as part of a comprehensive set of AMD security features
helping secure PCs
AMD Control-Flow Enforcement Technology. Provides
the processor alignment required to enable Microsofts
shadow stack technology, which blocks return-oriented
programming
AMD Memory Guard. Scrambles encryption keys stored
in system memory so hackers can’t use them to unencrypt
the hard drive
ThinkPad Z16