Windows 10: Verify Trusted Platform Module (TPM) Chip on Windows PC

Discus and support Verify Trusted Platform Module (TPM) Chip on Windows PC in Windows 10 Tutorials to solve the problem; How to: Verify Trusted Platform Module (TPM) Chip on Windows PC How to Check if Windows PC has a Trusted Platform Module (TPM) Chip Trusted... Discussion in 'Windows 10 Tutorials' started by ARC1020, Oct 3, 2016.

  1. ARC1020 Win User

    Verify Trusted Platform Module (TPM) Chip on Windows PC


    How to: Verify Trusted Platform Module (TPM) Chip on Windows PC

    How to Check if Windows PC has a Trusted Platform Module (TPM) Chip


    Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. The chip includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM. Some of the key advantages of using TPM technology are that you can:
    • Generate, store, and limit the use of cryptographic keys.
    • Use TPM technology for platform device authentication by using the TPM’s unique RSA key, which is burned into itself.
    • Help ensure platform integrity by taking and storing security measurements.
    The most common TPM functions are used for system integrity measurements and for key creation and use. During the boot process of a system, the boot code that is loaded (including firmware and the operating system components) can be measured and recorded in the TPM. The integrity measurements can be used as evidence for how a system started and to make sure that a TPM-based key was used only when the correct software was used to boot the system.

    TPM-based keys can be configured in a variety of ways. One option is to make a TPM-based key unavailable outside the TPM. This is good to mitigate phishing attacks because it prevents the key from being copied and used without the TPM. TPM-based keys can also be configured to require an authorization value to use them. If too many incorrect authorization guesses occur, the TPM will activate its dictionary attack logic and prevent further authorization value guesses.

    Different versions of the TPM are defined in specifications by the Trusted Computing Group (TCG).

    Windows can automatically provision and manage the TPM. Group Policy settings can be configured to control whether the TPM owner authorization value is backed up in Active Directory. Because the TPM state persists across operating system installations, TPM information is stored in a location in Active Directory that is separate from computer objects. Depending on an enterprises security goals, Group Policy can be configured to allow or prevent local administrators from resetting the TPMs dictionary attack logic. Standard users can use the TPM, but Group Policy controls limit how many authorization failures standard users can attempt so that one user is unable to prevent other users or the administrator from using the TPM. TPM technology can also be used as a virtual smart card and for secure certificate storage. With BitLocker Network Unlock, domain-joined computers are not prompted for a BitLocker PIN.

    For more details about TPM, see:
    This tutorial will show you how to check if your Windows PC has a Trusted Platform Module (TPM) security hardware chip, and to see your TPM details and version if available.


    Contents
    • Option One: To See if PC has a TPM in Device Manager
    • Option Two: To See if PC has a TPM in TPM Management snap-in console
    • Option Three: To See if PC has a TPM in BIOS or UEFI Firmware Settings
    • Option Four: To See if PC has a TPM in Windows Security





    OPTION ONE [/i] To See if PC has a TPM in Device Manager
    1 Open Device Manager.

    2 Look to see if you have Security devices listed. If you do, then expand it open to see if you have a Trusted Platform Module device listed with a version number (ex: 1.2).


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]






    OPTION TWO [/i] To See if PC has a TPM in TPM Management snap-in console
    1 Press the Win+R keys to open Run, type tpm.msc, and click/tap on OK to open the TPM Management snap-in.

    2 Look to see if the TPM Management console shows your PC having a TPM available or not.


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]






    OPTION THREE [/i] To See if PC has a TPM in BIOS or UEFI Firmware Settings
    1 Boot the computer to BIOS or UEFI firmware settings.

    2 Look to see if you may have a Trusted Platform Module (TPM) or PTT type setting to enable or disable.


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]






    OPTION FOUR [/i] To See if PC has a TPM in Windows Security
    This option is only available starting in Windows 10 build 17093.


    1 Open the Windows Security, and click/tap on the Device Security icon. (see screenshot below)

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    2 If you have a TPM, you will now see general information about it. To see more detailed information about the TPM, click/tap on the Security processor troubleshooting link. (see screenshot below)

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    3 Click/tap on the Collect logs button. (see screenshot below)

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    4 A TPM_Logs folder will now be created on your desktop. Open the TPM_Logs folder, and open the TPMInformation.txt file in the folder.

    5 You will now see detailed TPM device information. (see screenshot below)

    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]

    6. When finished, you can close the Windows Defender Security Center, and can safely delete the TPM_Logs folder if wanted.

    That's it,
    Shawn

    :)
     
    ARC1020, Oct 3, 2016
    #1
  2. RichardEiler, Oct 3, 2016
    #2
  3. Allan Mej Win User
    TPM enabled but not found?

    Hi Roberto,

    This issue occurs because the TPM is using the OEM driver and not the Windows built-in Trusted Platform Module driver. To address your issue, we suggest reinstalling the Trusted Platform Module driver by uninstalling the TPM driver and restarting your
    PC.

    Let us know how things goes.

    Regards.
     
    Allan Mej, Oct 3, 2016
    #3
  4. Verify Trusted Platform Module (TPM) Chip on Windows PC

    @ARC1020, v2.0 is new and is firmware based They want people to have the ability to purchase firmware that has fTPM 2.0 so one doesn't have to go out and buy a motherboard with a TPM header, swap all the internals of their PC, install drivers, etc. Having fTPM is superior in every way to TPM 1.2 using a daughter card.

    I will simply not use daughter card TPM (1.2). I will only use fTPM 2.0. That said, Black Hat was able to crack TPM years ago, and people with a good know-how about semiconductors can "unlock" them, so it's never wise to just rely on even the fTPM.

    For my office desktop, I use 2 SED (self-encrypting drives) that encrypts any and all data on-the-fly with FIPS 140-2 certification utilizing a Secure Erase feature that destroys the drive if tampered with when it's physically put in a locked state.

    For those who do not have a TPM mobo, it's very easy to self-assign a certificate with a Yubikey so Windows recognizes it as a PIV (smart card), trust the certificate and have your own portable TPM. I issue myself a certificate from my server's CA and use my Yubikey in unison with my SED with TPM 2.0 chipset integration (more on this below in the "**EDIT**." For my work laptop, I also use a SED + TPM + Yubikey. Per most of what I'm contracted out to do, I'm always given smart cards for encryption/access, but I can't stand the size of smart cards and the reader you use with them, so I have them load the certificates on my Yubikey 4, which I then transfer to my backup Yubikey.

    **EDIT**

    Also, daughter card TPMs are, in my opinion, wastes of money if you are truly trying to keep things safe on your PC. Sure, cryptography sticks even if someone removes the daughter card from the TPM header on the mobo, but they run on Low Bus Count (LBC), making them EXTREMELY easy to manipulate. If you are going for TPM, you want chipset integration. Intel's does this with their vPro technology, which utilizes the TPM to run as an application within the Management Engine on the new architecture's Platform Control Hub.
     
    DrEmpiricism, Oct 5, 2016
    #4
  5. lx07 Win User
    TPM 2.0 isn't really new (2014) and you are aware I suppose that you can use bitlocker with hardware based encryption.

    Are you suggesting you could pull out the TPM daughter card replace it and then somehow unlock the drive? Or are you saying TPM isn't secure at all?

    Surely if it was an issue someone would have mentioned it. Should I give up on encryption then as it is all so easily bypassed?

    Or is using bitlocker with hardware encryption still the way forward?
     
    lx07, Oct 5, 2016
    #5
  6. 2.0 is new in respect to how it works, which is eons ahead of what 1.2 did/does. Even now, the majority of motherboards simply use a TPM header and require you to purchase a daughter board, which, yes, can come in either 1.2 or 2.0 versions; however, the versions are irrelevant when it comes to the fact they all run in LBC, greatly increasing the ability of semiconductor and pin manipulation and duplication. fTPM 2.0 relies on a backup method of the cryptography of its already significantly better firmware engaged TPM by having it act within the Management Engine on the Platform Control Hub. That in itself is substantial since there are constant and erratic fluctuations in the resistivity of the conductor material. This can be due to factors built in, owner/user changes, etc. Even in itself, with a daughter card TPM 1.2, or soldered TPM module, semiconductor manipulation is extremely difficult, and why machine code/electronic code algorithms are the most difficult types to interpret and code. It's also not something you can just take up in a few classes, either. This kind of manipulation needs to be oriented towards and takes years to learn, and even then, you have firmware updates to accommodate.

    I never suggested you could pull out the TPM daughter card in any way and thus access the drive as if TPM never existed. The cryptography has already been processed and the encryption has already been done. Just like if you use Bitlocker on a USB drive, simply unplugging it from the host system and plugging it in elsewhere does not remove the encryption. Encryption like that would be worse than open-source software encryption.

    You should never give up on encryption, but always remember that encryption is only as good as the methods used to encrypt. To simply have encryption on something is all well and good for moderate sensitive material; however, for critical information, processes, databases, etc. encryption is simply a layer of solid data security. It is not solid data security in itself.

    Bitlocker is mediocre. It works, yes, but it's just your basic encryption, even if you adjust the cipher settings in User/Group Policies. As an example, formatting a Bitlocked drive can be done without any backup verification. Formatting a Bitlocked drive most ways is like not using Bitlocker period because that data/partition will be easily rendered readable by many, many types of software (and a lot of freeware). An average person with the right software from the internet could format a Bitlocked drive to clear the encryption, then use a recovery tool to re-initialize that partition in an unlocked state or simply batch extract all files on the drive. Bitlocker is simply encryption designed to make you feel warm and cozy at night. A much better encryption type, that's free, is VeraCrypt. Its algorithms are robust, it uses containers (including hidden containers). Using something like VeraCrypt to create an encrypted container on a drive that has been encrypted with Bitlocker increases the safety of your material astronomically.

    As stated before, though, hardware encryption will ALWAYS supersede software encryption. Always. Using Bitlocker in conjunction with hardware-based authentication greatly increases Bitlocker's viability and security. Hardware encryption can be pricey, but you have to gauge the cost with how confident you feel about the security of your data.

    Conclusively, for the average user, Bitlocker does what it's suppose to, is fully integrated into the OS, and works (all things considering). For any user out of that aforementioned range of "average," I would investigate additional methods of encryption (like I said with using a high-cipher encrypted container with something like Veracrypt in combination with Bitlocker). If you're dealing with such things as HIPPA, medical dictations, lists of passphrases you use to access an outside secure environment, etc., you need to start looking at pure hardware encryption and not Bitlocker with TPM or Smart Card, or Heaven forbid, just Bitlocker alone.
     
    DrEmpiricism, Oct 5, 2016
    #6
  7. Let me be clear here: I do not want people to think Bitlocker is worthless. Bitlocker works well for what it's designed to do: Safekeep what sound-minded people would keep on a personal computer. Its creation was never intended to be a concrete safety "vault."

    Using hardware + Bitlocker is the route one should go when using Bitlocker outside the range of just storing their porn folder or "warez." Hardware cryptography + encryption is a great combination. For those who have a motherboard lacking a TPM header, a Yubikey 4 can be purchased for $40 and work better because it's removable and not just a perepherial added to the motherboard.

    Even using Bitlocker in conjunction with 7zip's AES-512 to protect a collection of files works well, and again, it's free.

    I personally use a VeraCrypt container on a Bitlocked drive that is Yubikey unlocked for safe keeping moderate personal records and documents. It's an excellent combination. VeraCrypt alone surpasses 99% of paid encryption software. Features like TRULY hidden containers work exceptionally well: You will never find them, a format removes the encrypted container holding encrypted information, so the data is unrecoverable (by the great majority of software the public has access to). Even when I have done a low-level format of a Bitlocked partition with an encrypted VeraCrypt container, then used the means I have to restore the encrypted files, 99% of them were corrupt upon restoration. Using Bitlocker alone, though? I can restore a partition you format over 200+ times. write zeros to, 2-3 pass "wipers," etc. with very little data corruption.

    If you want something hardware exclusive that's cheaper, take at hardware encrypted flash drives. You can find AES-256+ units, or FIPS 140-2 validated USB 3.0 flash drives that are not that expensive. From there you get all the way up into what I use for my home office (due to the work I do).

    Sidenote: Always use a nice, long PIN to secure anything software locked. They're always more secure, no matter how obnoxious your password was going to be.
     
    DrEmpiricism, Oct 5, 2016
    #7
  8. Brink
    Brink New Member

    Verify Trusted Platform Module (TPM) Chip on Windows PC

    Yeah, it's only available starting with Windows 10 build 17093.
     
    Brink, Apr 4, 2018
    #8
  9. Cliff S New Member
    Maybe an addition, unless you have it somewhere else for the Windows Defender Security Center


    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]



    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]



    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]



    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]



    Verify Trusted Platform Module (TPM) Chip on Windows PC [​IMG]
     
    Cliff S, Apr 12, 2018
    #9
  10. Brink
    Brink New Member
    Thank you Cliff. Added as Option Four. *Smile
     
    Brink, Apr 12, 2018
    #10
  11. lx07 Win User
    Only available from 1803? I don't see Device Security on 1709.
     
Thema:

Verify Trusted Platform Module (TPM) Chip on Windows PC

Loading...
  1. Verify Trusted Platform Module (TPM) Chip on Windows PC - Similar Threads - Verify Trusted Platform

  2. Trusted Platform Module TPM

    in Windows 10 Customization
    Trusted Platform Module TPM: Hello, I have a TPM in my system which is for hardware security i want to know that am i gonna lose all of my data if at all the TPM Chip fails.. pls advice on thisThanks...
  3. Trusted Platform Module

    in Windows 10 Drivers and Hardware
    Trusted Platform Module: I am on a Windows 10 PC. I reset my PC and this shows up and I can't press or do anything. https://answers.microsoft.com/en-us/windows/forum/all/trusted-platform-module/b4e4e7de-af20-4978-bb4c-97404187bed1
  4. Trusted Platform Module

    in Windows 10 Drivers and Hardware
    Trusted Platform Module: I reset my computer and this showed up, but I can't do anything or press anything? https://answers.microsoft.com/en-us/windows/forum/all/trusted-platform-module/8f2891ce-04a0-4194-abbc-2d21aa6de826
  5. Initialisation of the Trusted Platform Module (TPM) failed

    in AntiVirus, Firewalls and System Security
    Initialisation of the Trusted Platform Module (TPM) failed: When I booted the laptop yesterday I was no longer able to login using my windows pin. I had to login using the password, can't get the pin to work again. In event viewer under windows logs>system have continuously: event ID 27 'The initialisation of the Trusted Platform...
  6. Initialisation of the Trusted Platform Module (TPM) failed

    in Windows 10 Support
    Initialisation of the Trusted Platform Module (TPM) failed: When I booted the laptop yesterday I was no longer able to login using my windows pin. I had to login using the password, can't get the pin to work again. In event viewer under windows logs>system have continuously: event ID 27 'The initialisation of the Trusted Platform...
  7. trusted platform module (tpm)

    in AntiVirus, Firewalls and System Security
    trusted platform module (tpm): windows defender is showing error msgunder security processor troubleshooting can't get tpm information please contact your system contact you device manufacturer. please help me on this . I am unable to use tpm functions in tpm.msc module. how to get it back....
  8. What is Trusted Platform Module? How to check if you have TPM chip?

    in Windows 10 News
    What is Trusted Platform Module? How to check if you have TPM chip?: [ATTACH] [ATTACH]Ever wondered which devices support Windows Hello, Fingerprint verification, and critical biometric data – and where they store that data? Storing this data on your computer or phone can be risky. This is where TPM or Trusted Platform Module comes [...] This...
  9. TPM Trusted Platform Module Issue

    in AntiVirus, Firewalls and System Security
    TPM Trusted Platform Module Issue: After updating to windows 10 version 1803 this comes up after I log in. A configuration change was requested to clean this computers TPM( trusted platform module). Warning clearing erases information started on the TPM. You will lose all created keys and access data...
  10. Trusted Platform Module (TPM)

    in Windows 10 Support
    Trusted Platform Module (TPM): I just installed windows 10-1511 on my pc en it works perfect.Verry happy with it. But soon there will be come the anniversary update of windows 10.My motherboard supports TPM 1.0 but not TPM 2.0. For the anniversary update you need TPM 2.0.Does this mean that my computer...

Users found this page by searching for:

  1. nu vot