-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
- HP Community
- Archived Topics
- Notebooks Archive
- Pavilion dv6 and TPM

Create an account on the HP Community to personalize your profile and ask a question

10-29-2012 10:12 AM
Recently purchased the Pavilion dv6 which I have upgraded to Ultimate. When trying to install Bitlocker I get the message TPM must be present. I've had a go at 'Start'- 'All programs'- 'Accessories'-'Run'- tpm.msc. This states: TPM not found verify tpm 1.2 is present and turned on in BIOS (or words to that effect). How do I check if TPM is present, and how do I turn it on within the BIOS?
What I find really puzzling is that the HDD is partitioned to C, D (Recovery), E (HP Tools), and Bitlocker is available on D and E, but not C!
Hope someone can help me on this.
Solved! Go to Solution.
Accepted Solutions
11-07-2012 09:37 AM
http://goo.gl/VhspQ
The Fn + Esc screenshot you provided earlier lists your current BIOS as F.1A. This is the most current BIOS, so you are good to go on that front.
10-30-2012 10:24 AM
Based on the message being received, I would say this notebook does not have TPM. However, provide the full product model and I will be able to look further into the TPM for this noteook.
NOTE: Do not provide the serial number.
In any event, BitLocker can be used without TPM. This will require some changes to be made.
The following information was found at this link from Microsoft.
http://goo.gl/zEAky
To turn on BitLocker Drive Encryption on a computer without a compatible TPM
Click Start, type gpedit.msc in the Start Search box, and then press ENTER.
If the User Account Control dialog box appears, verify that the proposed action is what you requested, and then click Continue. For more information, see Additional Resources later in this document.
In the Group Policy Object Editor console tree, click Local Computer Policy, click Administrative Templates, click Windows Components, and then double-click BitLocker Drive Encryption.
Double-click the setting Control Panel Setup: Enable Advanced Startup Options. The Control Panel Setup: Enable Advanced Startup Options dialog box appears.
Select the Enabled option, select the Allow BitLocker without a compatible TPM check box, and then click OK.
You have changed the policy setting so that you can use a startup key instead of a TPM.
Close the Group Policy Object Editor.
To force Group Policy to apply immediately, you can click Start, type gpupdate.exe /force in the Start Search box, and then press ENTER.Wait for the process to finish.
Click Start, click Control Panel, click Security, and then click BitLocker Drive Encryption.
If the User Account Control message appears, verify that the proposed action is what you requested, and then click Continue. For more information, see Additional Resources later in this document.
On the BitLocker Drive Encryption page, click Turn On BitLocker on the operating system volume.
On the Set BitLocker Startup Preferences page, select the Require Startup USB Key at every startup option. This is the only option available for non-TPM configurations. This key must be inserted each time before you start the computer.
Insert your USB flash drive in the computer, if it is not already there.
On the Save your Startup Key page, choose the location of your USB flash drive, and then click Save.
On the Save the recovery password page, you will see the following options:
Save the password on a USB drive. Saves the password to a USB flash drive.
Save the password in a folder. Saves the password to a network drive or other location.
Print the password. Prints the password.
Use one or more of these options to preserve the recovery password. For each option, select the option and follow the wizard steps to set the location for saving or printing the recovery password.
When you have finished saving the recovery password, click Next.
Important
The recovery password will be required in the event the encrypted drive must be moved to another computer, or changes are made to the system startup information. This password is so important that it is recommended that you make additional copies of the password stored in safe places to assure you access to your data. You will need your recovery password to unlock the encrypted data on the volume if BitLocker enters a locked state (see Scenario 4: Recovering Data Protected by BitLocker Drive Encryption). This recovery password is unique to this particular BitLocker encryption. You cannot use it to recover encrypted data from any other BitLocker encryption session.
Important
Store recovery passwords apart from the computer for maximum security.
On the Encrypt the selected disk volume page, confirm that the Run BitLocker System Check check box is selected, and then click Continue.
Confirm that you want to restart the computer by clicking Restart Now. The computer restarts and BitLocker ensures that the computer is BitLocker-compatible and ready for encryption. If it is not, you will see an error message alerting you to the problem before encryption starts.
If it is ready for encryption, the Encryption in Progress status bar is displayed. You can monitor the ongoing completion status of the disk volume encryption by dragging your mouse cursor over the BitLocker Drive Encryption icon in the tool bar at the bottom of your screen or clicking on the Encryption balloon.
By completing this procedure, you have encrypted the operating system volume and created a recovery password unique to that volume. The next time you turn your computer on, the USB flash drive must be plugged into a USB port on the computer. If it is not, you will not be able to access data on your encrypted volume. Store the startup key away from the computer to increase security.
If you do not have the USB flash drive containing your startup key, then to access the data, you will need to use recovery mode and supply the recovery password.
10-30-2012 11:22 AM
Check device manager to confirm.
Go to Start and search for device manager. Open device manager and expand system devices.
Is any item listed as a trusted platform module? More than likely, it will have a brand listed in front of the TPM portion of the name.
If one is not listed, then it does not have it.
Also, what is your BIOS version? You can press the Fn + Esc keys to find out what the version is. If it is on the motherboard and BIOS does not support it, then it won't be listed in device manager. Ensure your BIOS is the most recent.
In any case, the steps listed above to enable BitLocker without TPM should do the trick. You will just need to use a USB flash drive, print out, or save the key on the hard drive. TPM allows the key to be safely hidden away without the worry of keeping track of a print out, a file, or a USB flash drive to unlock the hard drive should it be needed.
10-31-2012 01:55 PM
However, the steps listed above should work for systems without a TPM chip.
Have you tried those steps? If so, what happened at each step?
If not, go ahead and try those steps as they should get BitLocker going for you. The document linked is from Microsoft and it indicates the steps to enable BitLocker will need to be a little different on a system without a TPM chip rather than one that has a TPM chip. The original post indicates the steps for a TPM chip were used and that is why you would get the message you are getting.
11-02-2012 02:59 PM
Hi,
I've followed the instruction as for as 'In the Group Policy Object Editor console tree, click Local Computer Policy, click Administrative Templates, click Windows Components, and then double-click BitLocker Drive Encryption', but there after it does not seem to relate to the instructions anymore. Rather than trying to explain it, I've captured the menu.
11-04-2012 06:40 AM
Hi,
Since my last message, I came across this site which also shows the Bitlock enable steps http://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/ and thisnoption seem to work, though I have not yet installed Bitlock
Thank for your effort.
11-07-2012 07:40 AM
Let me know if the steps at howtogeek worked for you or not.
