An administrator must complete a series of steps before the Trusted Platform Module (TPM) can be used to protect your system or to encrypt your data.
This section includes the following topics:
An administrator must complete a series of steps before the Trusted Platform Module (TPM) can be used to protect your system or to encrypt your data.
This section includes the following topics: