How and when to enable hardware-based TPM security on servers | TechTarget (2024)

Tip

Most servers include a Trusted Platform Module, but you only want to turn it on and manage TPM when the server handles high-value encrypted workloads.

How and when to enable hardware-based TPM security on servers | TechTarget (1)

By

  • Stephen J. Bigelow,Senior Technology Editor

Published: 11 Oct 2013

Trusted computing adds security to server hardware and operating systems. So take the time to learn how -- and when -- to deploy it.

Servers have received comparatively little attention from security, which obsesses about protecting data. The not-for-profit industry collaboration Trusted Computing Group developed a set of security standards to protect encryption keys and ensure the integrity of hardware platforms and host OSes. These standards are routinely available on modern servers as the Trusted Platform Module (TPM).

Many IT organizations, however, don't enable TPM security; some simply don't understand how to fully deploy the technology, while others fear an accidental loss of access to protected data.

The purpose of the Trusted Platform Module

Hardware tampering can expose encryption keys. The purpose of the TPM is to implement a hardware controller on the server motherboard. This acts as a repository for keys, passwords and digital certificates, which are all protected through the TPM's subsystem. In effect, the physical TPM becomes an integral part of the encryption keys. As a hardware device, the TPM is immune to malware and forgery.

Remember, Trusted Computing technology protects sensitive data, but it also requires specific hardware components. And hardware can fail. Enable TPMs only where most appropriate, manage passwords vigilantly and be sure to test TPM behaviors thoroughly.

The TPM is secured with a unique key created by taking a baseline "fingerprint" of the server and its components as it boots, and comparing that baseline against periodic measurements of the system's parameters. If the boot characteristics change and the fingerprint no longer matches actual system parameters, hardware tampering may be indicated, and system access denied.

Once the TPM-compliant BIOS hands off system control to a TPM-enabled operating system, such as Windows 8 or Windows Server 2012, the OS can also compare the BIOS TPM fingerprint to previous boot cycles to check for potential tampering. When a system boots successfully with TPM enabled, the system is generally regarded as trusted.

After boot, TPM supports additional security features such as BitLocker drive encryption. One popular example is the measured boot feature of Windows 8 and Windows Server 2012, which share a log of boot components with anti-malware tools. If the boot components don't match the log of trusted components, the server could be under attack.

Basic TPM requirements and issues

TPM deployment requires a server hardware platform fitted with a TPM and compliant BIOS, which virtually every server vendor offers. Systems ship with TPM disabled, putting the onus on administrators to enable and activate the Trusted Platform Module.

TPM primarily protects encryption keys, so it might not be necessary on non-critical platforms with workloads running unencrypted data. However, enable it on systems that use file or folder encryption, or rely on local password management, run S-MIME email, need authentication for VPN or PKI, or use wireless interfaces such as 802.1x or LEAP.

If your current servers are not TPM-capable, put Trusted Platform Module on your next technology refresh cycle's must haves -- TPM cannot be added as an aftermarket upgrade.

TPM does not necessarily require a TPM-aware OS, but it does enhance security by enabling cryptographic functions and checking the system's footprint. Major OS releases -- Windows Server 2008 and 2012, Oracle Solaris 11, the Linux kernel -- support TPM.

The Trusted Computing approach to encryption isn't foolproof. Any keys created in concert with the TPM (not necessarily just managed by the TPM) are completely unrecoverable if the TPM fails or critical server components, such as the motherboard, are replaced. Look for the system or TPM software utilities to create backup or archival keys that can be restored from emergency media like a flash drive. Test recovery before TPM rolls out on production servers.

TPM implementation requires careful hardware management and attention to emergency recovery data. If a server motherboard fails, it is not possible to move the old TPM to the motherboard; the motherboard will have a TPM. Any data encrypted under the old TPM will be inaccessible and the OS may not even boot. The system will halt and ask for that recovery key that you have saved on emergency media. The recovery key will re-enable the TPM and restore encrypted disk access. Then, re-create a set of keys for the TPM.

Starting up TPM

TPM implementation varies with different server BIOS versions, TPM standards, OSes and TPM utility versions.

Basically, IT administrators enable TPM in the server BIOS's security menu, and reboot. Servers do not allow changes to the TPM state remotely, so the administrator needs to actually be in the data center. Remember this when you're managing secure remote servers.

Once the TPM is enabled in BIOS, activate it at the OS level to "take ownership." Some systems use a TPM management utility such as Intel's Embassy Security Center. TPM-enabled operating systems manage TPM through PowerShell cmdlets. Always refer to TPM utility or OS documentation for exact procedures, but you usually manually set a TPM password and verify the TPM configuration. Again, you must be present to perform the tasks. Otherwise, your tasks could be seen as nefarious malware.

Always record or save backup copies of TPM-related passwords and keys in a secure physical location offsite.

Stopping a TPM

After the TPM is enabled and activated, it will run without direct intervention from administrators unless you need to manage TPM commands --an exceedingly rare occurrence. The exception is when administrators need to turn off or even clear the TPM.

Some servers are decommissioned then repurposed within the enterprise, and no longer need TPM functionality. With TPM off, applications and data can process on the server without TPM support.

You can deactivate through the OS, using PowerShell cmdlets for example. If the OS does not support disabling TPM, manually intervene via the same BIOS menu used to enable or clear the feature.

Administrators can clear the TPM through the BIOS. If you clear the TPM entirely, you'll restore the factory default settings, resetting all keys and passwords in the TPM and rendering any encrypted data inaccessible. Clear the TPM if you lose the password or if you're recycling or selling the server. Do not clear TPM on a production server!

Some motherboards include a TPM clear jumper -- set it prior to clearing the TPM and reset after. This protects against tampering because it requires an administrator with additional physical access and knowledge of the server's internal layout. However, Windows Server 2012 allows administrators to clear the TPM through PowerShell cmdlets.

Dig Deeper on IT systems management and monitoring

  • beep codeBy: GavinWright
  • How to fix Windows 11 when Secure Boot and TPM don't workBy: GaryOlsen
  • Windows Server 2022 security hardening guide for adminsBy: BrienPosey
  • BitLockerBy: AlexanderGillis
How and when to enable hardware-based TPM security on servers | TechTarget (2024)

FAQs

How do I enable hardware TPM? ›

Turn on or turn off the TPM
  1. Open the TPM MMC (tpm. msc).
  2. In the Action pane, select Turn TPM On to display the Turn on the TPM Security Hardware page. Read the instructions on this page.
  3. Select Shutdown (or Restart), and then follow the UEFI screen prompts.
Nov 17, 2023

Should TPM be enabled or not? ›

TPMs are efficient alternatives to older methods of securing Windows PCs. In fact, since July 2016 Microsoft has actually required TPM 2.0 support on all new PCs that run any version of Windows 10 for desktop (Home, Pro, Enterprise, or Education). Likewise, Windows 11 will only run on PCs that have TPM capabilities.

What is TPM security hardware? ›

A TPM, or a trusted platform module, is a physical or embedded security technology (microcontroller) that resides on a computer's motherboard or in its processor. TPMs use cryptography to help securely store essential and critical information on PCs to enable platform authentication.

Do I need TPM on my server? ›

A Trusted Platform Module (TPM) chip is required in order to use certain features such as BitLocker Drive Encryption. If your computer uses TPM, it must meet these requirements: Hardware-based TPMs must implement version 2.0 of the TPM specification.

How to know if TPM is enabled? ›

To Verify that the TPM is detected, perform the following steps.
  1. Log in to Windows.
  2. Right-click the Windows Start Button.
  3. Click Device Manager.
  4. Expand the Security Devices Node.
  5. You should see the Trusted Platform Module 2.0.
Apr 16, 2024

How do I enable TPM embedded security? ›

During the server startup sequence, press the F9 key to access System Utilities. From the System Utilities screen, select System Configuration > BIOS/Platform Configuration (RBSU) > Server Security. Select Trusted Platform Module Options and press the Enter key.

Is hardware TPM better? ›

The TPM standard defines a hardware root of trust (HRoT) widely accepted as more secure than software that can be more easily breached by attackers. The TPM is used with software to enable features; open source APIs are available and custom software can be developed.

Does enabling TPM reduce performance? ›

no, tpm and secure boot alone don't affect gaming performance.

What is the difference between TPM and secure boot? ›

Secure boot makes sure that your server starts with trusted software by verifying the signatures for all code in the boot process. So, your images need to support secure boot with a signed boot loader. Trusted Platform Module (TPM) provides hardware-based security functions.

What is the difference between hardware security module and TPM? ›

An HSM is a removable unit that runs on its own, while a TPM is a chip on your motherboard that can encrypt an entire laptop or desktop disk.

Is TPM enabled by default? ›

Operating systems

On many systems TPM is disabled by default which requires changing settings in the computer's UEFI to enable it.

Can Windows run without TPM? ›

How can you run Windows 11 without TPM? As it will refuse to install without at least TPM version 2 being present and enabled on the machine, you won't be able to run it. Sometimes, TPM 1.2 can be upgraded to TPM 2.

How do I check my TPM on Windows Server? ›

Procedure
  1. Press Windows + R to open the Run dialog window. Type tpm. msc into it and press Enter.
  2. This opens the built-in utility – Trusted Platform Module (TPM) Management. If TPM is installed, you can see the Status and TPM Manufacturer Information about the TPM in the PC.
Apr 27, 2022

Should TPM state be enabled? ›

So, if you're a Windows 10 user and want to utilize the BitLocker data encryption feature, you must enable the TPM. For Windows 11, you won't even be able to install it unless the TPM is enabled.

Can I enable TPM in BIOS? ›

How to enable TPM. If you need to enable TPM, these settings are managed via the UEFI BIOS (PC firmware) and vary based on your device. You can access these settings by choosing: Settings > Update & Security > Recovery > Restart now.

How do I enable then activate TPM? ›

Power on your system while tapping the F2 key to enter the system BIOS. Expand the 'Security' section then select 'TPM Security'. Check the box to enable TPM Security, then click 'Apply'. Select 'Activate', then 'Exit'.

Why can't i enable TPM? ›

Platform Trust Technology (PTT) is enabled on these systems by default, causing the TPM to be greyed out in the BIOS (Only one of these trust technologies can be enabled at a time). To enable TPM, PTT protection must be removed from the encryption keys.

How to enable TPM in Windows 11? ›

How to Enable TPM 2.0
  1. Enter UEFI/BIOS using your motherboard manufacturer's entrance key.
  2. Search for the TPM toggle in a tab called Security or Advanced. ...
  3. Toggle TPM to On, Enabled, or Firmware TPM depending on your manufacturer's particular UEFI/BIOS.
Jan 4, 2024

Top Articles
New World Mining Luck Guide | TechRaptor
What happens when all 21 million Bitcoins are mined?
Craigslist Livingston Montana
Section 4Rs Dodger Stadium
Unit 30 Quiz: Idioms And Pronunciation
O'reilly's Auto Parts Closest To My Location
Ross Dress For Less Hiring Near Me
Rondale Moore Or Gabe Davis
Miss Carramello
Green Bay Press Gazette Obituary
My Vidant Chart
Lantana Blocc Compton Crips
Mercy MyPay (Online Pay Stubs) / mercy-mypay-online-pay-stubs.pdf / PDF4PRO
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Jayah And Kimora Phone Number
Blue Rain Lubbock
Cincinnati Adult Search
Evil Dead Rise Showtimes Near Pelican Cinemas
Dragonvale Valor Dragon
Teekay Vop
Hdmovie2 Sbs
Idle Skilling Ascension
Afni Collections
APUSH Unit 6 Practice DBQ Prompt Answers & Feedback | AP US History Class Notes | Fiveable
404-459-1280
No Hard Feelings Showtimes Near Tilton Square Theatre
Helloid Worthington Login
Police Academy Butler Tech
Craigslist West Seneca
CVS Near Me | Somersworth, NH
Ewwwww Gif
Craigs List Jonesboro Ar
Weapons Storehouse Nyt Crossword
Hingham Police Scanner Wicked Local
Craiglist Hollywood
Colorado Parks And Wildlife Reissue List
Differential Diagnosis
Paul Shelesh
Costco Gas Foster City
Levi Ackerman Tattoo Ideas
Citroen | Skąd pobrać program do lexia diagbox?
Juiced Banned Ad
Fatal Accident In Nashville Tn Today
Unblocked Games - Gun Mayhem
Rise Meadville Reviews
Learn4Good Job Posting
Lebron James Name Soundalikes
Paradise leaked: An analysis of offshore data leaks
Used Sawmill For Sale - Craigslist Near Tennessee
Blippi Park Carlsbad
15:30 Est
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 5571

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.