TPM 2.0 has been around since 2013, but vendors have been required to provide their machines with TPM 2.0 since July 28, 2016. The TPM chip, or Trusted Platform Module, is a hardware component on the motherboard, providing physical-level security for Windows 10.
This blog post explains how to upgrade HP TPM Firmware from version 1.2 to 2.0 using HP TPM Configuration Utility. The TPM version derives from the firmware version of the chip. Most modern chips support both versions 1.2 and 2.0.
The TPM chip is required for features such as:
The only feature at this point that I am aware of that requires TPM 2.0 is Device Encryption (Not Bitlocker). TPM 2.0 was also required for Credential Guard in Windows 10 1507, but this is not currently the case.
This blog post describes how to upgrade the TPM chip firmware from 1.2 to 2.0 for HP machines using SCCM and HP TPM Configuration Utility.
If you are interested in downgrading TPM from 2.0 to 1.2, refer to my other blog post.
TPM 2.0 vs. TPM 1.2
TPM 2.0 adds additional security benefits compared to TPM 1.2.
Read more about it on Microsoft Docs.
Verify TPM version
You can verify which the current TPM firmware version on the device:
The different version properties on the chip are as follows:
- Manufacturer version
- Specification version
Alternative 1 – Windows Security settings
Alternative 2 – Powershell
Get-WmiObject -Namespace rootcimv2securitymicrosofttpm -Class Win32_TPM | Select Specversion
Alternative 3 – TPM.MSC
The last alternative is by using TPM.msc
How to upgrade HP TPM from 1.2 to 2.0
Configure HP BIOS settings
In the below sections, I reference some BIOS settings that are to be automatically configured.
To read about how I do this, please refer to my blog post on How to use HP BIOS Configuration Utility to set BIOS settings.
Download HP TPM Configuration Utility
The best way to update the TPM firmware is by using TPM Configuration Utility. Start by downloading the HP Softpaq utility and follow the instructions below:
Find available Softpaqs
Open the HP Softpaq Utility. Press Find Model and search for the model that you are looking for. End by pressing Find Available SoftPaqs.
Download HP TPM Configuration Utility
In the list, look for the HP Trusted Platform (TPM) Configuration Utility and press Download.
Create an encrypted password file
- Open <filename>
- Enter password
- Save file
Place source files on a source
Place the source files on a share accessible by SCCM.
Create a package in SCCM
Select Create Package in the SCCM console.
Give the package a name and browse to the UNC path of the source files.
Select Do not create a program.
Finalize the wizard.
Add a step to the Task Sequence
In this example, we will be running the TPM Upgrade steps in the Operating System Deployment Task Sequence. It is, however, possible to run an independent Task Sequence with these scripts.
In order to use the correct firmware, the TPM Configuration Utility will need to know the Manufacturer version of the TPM script.
With previous versions of the tool, you are required to either create a script to check the manufacturer version and apply the appropriate firmware file or to create one Task Sequence step for each Manufacturer Version.
However, in the later versions of the HP TPM Configuration Utility, this can be done automatically, using a switch.
In order to upgrade TPM, you might need to disable virtualization, or more specifically, VT-X.
Configure the Update TPM to 2.0 step Options tab to only run with the following WMI query:
|WQL Query||Select * from Win32_TPM Where SpecVersion Like "%1.2%"|
Add command line step
Tpmconfig64.exe -s –a2.0 -ppassword.bin
Note: There should be no space between -p and the password file!
To be compliant with the newest security baselines, you should upgrade existing machines to TPM 2.0.
How many devices do you still have that run TPM 1.2? Please answer in the comments below 🙂