An administrator must complete a series of steps before the Trusted Platform Module (TPM) can be used to protect your system or to encrypt your data.

This section includes the following topics: