TPM Chip: What It Is and How to Check Your PC's Security Module

Learn what a TPM chip is, how it secures encryption keys and supports Windows 11, and how to verify and enable TPM 2.0 on your computer.

What is a TPM Chip?

A TPM (Trusted Platform Module) chip is a dedicated security processor built into a PC’s motherboard that handles cryptographic operations such as generating and storing encryption keys, verifying digital signatures, and attesting to the integrity of the boot process. TPM 2.0 is a mandatory requirement for Windows 11 and underpins core OS security features including Secure Boot and BitLocker drive encryption. By keeping sensitive cryptographic material inside a tamper-resistant hardware boundary, a TPM ensures that even if a drive is physically removed from a stolen laptop, the encrypted data remains inaccessible.

In-Depth

How a TPM Chip Works

The TPM stores encryption keys in a tamper-resistant area that is designed to resist physical probing and side-channel attacks. Keys generated inside the TPM never leave the chip in plaintext form. During boot, the TPM measures the integrity of the UEFI firmware, bootloader, and OS kernel, creating a chain of trust. If any component has been tampered with, the TPM can refuse to release the decryption keys, preventing the compromised system from accessing protected data.

TPM 1.2 vs. TPM 2.0

TPM 1.2, standardized in 2011, supports only the SHA-1 hash algorithm and RSA-based cryptography. TPM 2.0, finalized in 2014, adds support for SHA-256, ECC (Elliptic Curve Cryptography), and additional algorithm agility that future-proofs it against evolving threats. Windows 11 requires TPM 2.0, which is the primary reason many older PCs cannot upgrade. Most PCs manufactured since 2016 include TPM 2.0 support in some form.

Discrete TPM vs. Firmware TPM

TPMs come in two forms. A discrete TPM is a standalone chip soldered to the motherboard, offering the highest level of physical isolation and security. A firmware TPM (fTPM) is implemented in software running inside the CPU or chipset – Intel’s PTT (Platform Trust Technology) and AMD’s fTPM are the most common examples. Both meet the TPM 2.0 specification and satisfy the Windows 11 requirement. Discrete TPMs are preferred in high-security enterprise environments, while fTPMs are standard on consumer PCs and require only a UEFI/BIOS setting to enable.

How to Choose

1. Check Your Current PC’s TPM Status

On Windows, press Win + R, type tpm.msc, and press Enter. The TPM Management console will display the TPM version and status. If it reports “Compatible TPM cannot be found,” the TPM may simply be disabled in your UEFI settings. Enabling fTPM in BIOS often resolves this.

2. Verify TPM on a New PC Purchase

Virtually every PC made since 2016 ships with TPM 2.0 support, but it may be disabled by default on some desktop motherboards. When buying a new PC or building one, confirm fTPM or discrete TPM support in the motherboard specifications and enable it in UEFI setup.

3. Enable BitLocker for Full-Disk Encryption

With TPM 2.0 active, Windows Pro and Enterprise editions allow you to turn on BitLocker drive encryption with just a few clicks. The TPM manages the encryption keys transparently, unlocking the drive automatically at boot without requiring a separate password. This is especially valuable for laptops that travel outside the office.

The Bottom Line

The TPM chip is a foundational security component that quietly protects your PC’s encryption keys, verifies boot integrity, and enables features like BitLocker and Windows Hello. Whether it is a discrete chip or a firmware implementation, ensuring TPM 2.0 is enabled is essential for running Windows 11 and for safeguarding your data. Check your TPM status today, enable it if it is off, and activate BitLocker to put that security hardware to work protecting your files.