The main security feature that involves hardware capabilities is called TPM. Trusted Platform Module can be provided via a hardware module that attaches to TPM pins on a motherboard or via CPU.
Windows uses TPM for "...services like BitLocker drive encryption , Windows Hello, and others, to securely create and store cryptographic keys, and to confirm that the operating system and firmware on your device are what they're supposed to be, and haven't been tampered with."
- support.microsoft.com/en-us/topic/what-is-tpm-705f241d-025d-4470-80c5-4feeb24fa1ee
- docs.microsoft.com/en-us/windows/security/information-protection/tpm/trusted-platform-module-overview
However, TPM 2.0 (current standard) isn't bulletproof. There have been multiple exploits discovered in recent years that allow attackers to bypass security provided by TPM.
2018 - darkreading.com/security-management/encryption/exploitable-flaws-found-in-trusted-platform-module-20/a/d-id/745759
2019 - zdnet.com/article/tpm-fail-vulnerabilities-impact-tpm-chips-in-desktops-laptops-servers/
2021 - arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/