TPM in Windows XP

Posted on 2011-10-21
Last Modified: 2012-05-12
how do i activate tpm in bios?
Question by:InmanHQ
    LVL 8

    Expert Comment

    by:Amit Khilnaney
    TPM is Trusted Platform Module.

    There should be a chip on the motherboard and your system/bios and operating system must support it.

    Go to BIOS menu and then you can try different options to enable it.

    If you can let me know the motherboard manufacurer/model and bios make/version. I may be able to assist further.

    Is it somewhat related to Bitlocker...i mean why you need to use TPM..
    LVL 3

    Expert Comment

    by:Marc Smets
    we need a bit more info:

    - which motherboard? or type of desktop/laptop

    Author Comment

    laptop model is Dell Latitude D630
    LVL 8

    Accepted Solution

    How do I activate my Trusted Platform Module (TPM) security feature?

    Table of Contents
    1. Install the Trusted Platform Module (TPM) 1.2 software and driver.
    2. Enable the TPM Security Feature in the System Setup
    3. Set up the TPM 1.2 software for use.

    1. Install the Trusted Platform Module (TPM) 1.2 software and driver.

    To install the Embassy Trust Suite by Wave Systems software perform the following steps:

    NOTE: If a custom image has been loaded or the operating system has been reinstalled, the software needs to be downloaded from the Dell File Library.

    NOTE: The Embassy Trust Suite by Wave Systems software package contains drivers for the Trusted Platform Module and the TouchChip Fingerprint Coprocessor .

    1. Connect to the internet and browse to
    2. On the Dell support webpage, enter the system service tag or select the product model.
    3. Select the Drivers and Downloads from the Select a Tool drop down menu.
    4. Click Go.
    5. Select the operating system.
    6. Click Find Downloads.
    7. Click the Chipset heading.
    8. Click the Broadcom Trusted Platform Module v1.2 device name.
    9. Click Download now.
    The file download window appears, click Save.
    10. Choose a location on your hard drive to save the file.
    11. Once download is complete, double-click on the file.
    The Chipset: Embassy Trust Suite by Wave Systems window appears.
    12. Click the Continue button.
    The message Select the folder where you want to unzip the files to appears.
    13. Click the OK button.
    A message appears asking if you want to create a folder.

    NOTE: If a message appears asking to overwrite the folder, click the Yes to All button.

    14. Click the Yes button.
    The message All files were successfully unzipped appears.
    15. Click the OK button.
    The Embassy Trust Suite by Wave Systems - InstallShield Wizard window appears.
    16. Click the Next button.
    The message InstallShield Wizard Complete appears.
    17. Click the Finish button.

    The Embassy Trust Suite by Wave Systems software is now installed.

    Return to Overview

    2. Enable the TPM Security Feature in the System Setup

    To enable TPM security features in the System Setup (BIOS), perform the following steps:

    1. Reboot the system.
    2. When the message “Press to enter Setup” appears, press the key.
    The System Setup screen will display.
    3. Navigate to the Security group using the Down arrow key.
    4. Press the <+> key to expand the group.
    5. Verify that TPM Security is listed under Security.
    6. Navigate to the TPM Security section using the Down arrow key.
    7. Press the key.
    8. Press the Right Arrow key to change the setting to On.
    The TPM is now enabled.
    9. Press the key.
    10. Using the Down Arrow key, highlight Exit and press key.
    The system will reboot.

    Return to Overview

    3. Set up the TPM 1.2 software for use.

    To establish an owner and set up the TPM software for use, perform the following steps:

    1. Double-click on the Embassy Security Center icon on the desktop.
    2. Accept the licensing agreement.
    3. Click on the Owner tab.
    4. Click Establish and create an owner password.

    NOTE: The password must be at least 8 characters.

    5. Click the User tab.
    6. Click Initialize and create a user password.

    NOTE: The user password and authentication settings can be established on this tab as well.

    7. Click the Secure Login screen to enable a secure windows login prompt and select authentication settings.
    8. Click Apply.
    9. Click OK to restart the computer

    LVL 8

    Assisted Solution

    by:Amit Khilnaney
    Dell Support Manual Page 74-75


    Open in new window

    LVL 59

    Expert Comment

    This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
    Recently Microsoft released a brand new function called CONCAT. It's supposed to replace its predecessor CONCATENATE. But how does it work? And what's new? In this article, we take a closer look at all of this - we even included an exercise file for…
    Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now