To get TPM 2.0 and enable secure boot, you will need to follow a few steps. Please note that the exact process may vary slightly depending on your specific computer model and BIOS version. Here’s a detailed guide:
1. Check compatibility: First, ensure that your computer supports TPM 2.0 and secure boot. Most modern computers have TPM 2.0 built-in, but older models might not. To check, you can visit your computer manufacturer’s website or refer to your computer’s user manual.
2. Access BIOS/UEFI settings: Restart your computer and enter the BIOS/UEFI settings. The exact key combination or method to access the BIOS/UEFI settings can vary. Common keys include F2, F10, Del, or Esc. Typically, you will see a message during startup indicating which key to press to enter the BIOS/UEFI.
3. Enable TPM: Once inside the BIOS/UEFI settings, navigate to the Security or Advanced tab. Look for an option related to TPM or Trusted Platform Module. It might be named differently, such as “TPM Configuration” or “Security Chip.” Enable the TPM feature and set it to TPM 2.0. Save the changes and exit the BIOS/UEFI settings.
4. Enable secure boot: In the BIOS/UEFI settings, locate the Boot or Security tab. Look for an option called “Secure Boot” or “UEFI Boot.” Enable secure boot if it’s not already enabled. Secure boot helps protect your computer from unauthorized operating systems or malware during startup.
5. Save and exit: After enabling TPM and secure boot, save the changes you made in the BIOS/UEFI settings and exit. Your computer will restart.
6. Verify TPM and secure boot: Once your computer restarts, you can verify if TPM 2.0 and secure boot are enabled. Open the Windows Start menu, type “tpm.msc” (without quotes), and press Enter. The TPM Management console should open, indicating that TPM is enabled and functioning properly. To check if secure boot is enabled, you can go back to the BIOS/UEFI settings and confirm that the option is still enabled.
By following these steps, you should be able to get TPM 2.0 and enable secure boot on your computer. These security features help protect your system from tampering and ensure a more secure computing environment. Remember to consult your computer’s documentation or manufacturer’s website for specific instructions related to your device.