/
/

How to Enable or Disable Clear TPM button in Windows Security in Windows 11

How to Enable or Disable Clear TPM button in Windows Security in Windows 11 blog banner image

A Trusted Platform Module (TPM) is specifically tailored to enhance a device’s security by storing encryption keys. It enables access to protected features like BitLocker drive encryption, user authentication, and files encrypted with the Encrypting File System (EFS).

If not properly configured, end users in an environment may accidentally access and press Clear TPM through the Windows Security app, triggering multiple security-related errors, such as BitLocker drive access errors, lost biometric sign-in credentials, and critical data loss. To avoid this, administrators can enforce strict and consistent TPM management policies across an environment by leveraging administrative tools.

If you want to know more about locking down TPM settings, read on. We’ll walk you through different ways to configure Clear TPM access, discuss additional considerations to remember when implementing such a change, and answer some FAQs.

Different methods to configure the Clear TPM button

Before making any changes, ensure that your system meets the following prerequisites to ensure a smooth and successful application of the changes you want to make:

  • Administrator privileges. You’ll need administrator rights to enforce who can access TPM settings, especially when applying this as a system-wide change using the Local Group Policy Editor or the Windows Registry.
  • Windows edition. The Registry Editor is available across all editions of Windows 11. On the other hand, the Local Group Policy Editor is only accessible using Windows 11 Pro, Enterprise, and Education editions.
  • TPM 2.0. Ensure that TPM 2.0 is present and enabled in your system’s UEFI/BIOS firmware for a smooth configuration process. To ensure you have the right version, press Win + R, type tpm.msc, and press Enter. The Specification Version under TPM Manufacturer Information should say 2.0.
  • Configuration scope. The steps outlined in this guide are applied system-wide and are not automatically deployed across a domain or network environment.

Method 1: Disable the Clear TPM button via the Local Group Policy Editor

In domain-joined or enterprise environments, access to the TPM should be regulated. Averting end user access to clear the TPM can prevent accidental presses that can potentially compromise an endpoint’s security functions.

  1. Press Win + R, enter gpedit.msc in the dialog box, and press Ctrl + Shift + Enter.
  2. This launches the Local Group Policy Editor as an administrator.
  3. Inside the Local Group Policy Editor, navigate the following path: Computer Configuration > Administrative Templates > Windows Components > Windows Security > Device Security.
  4. On the right pane, find and double-click Disable the Clear TPM button.Local Group Policy Editor-double-click Disable the Clear TPM button
  5. Set the policy according to your preferred accessibility:
    • Select Not Configured: Sets the policy to its default and shows the Clear TPM button.Disable the Clear TPM button-select Not Configured
    • Select Enabled: Sets the policy to hide the Clear TPM button.Disable the Clear TPM button-select Enabled
  6. After setting the policy, press Apply, then OK, which is located below the window.
  7. Restart the system to apply the changes.
    • Alternatively, you can open a Command Prompt and enter gpupdate /force.Open Command Prompt

🥷 Quick tip: Although this method only applies to a local machine when done using the Local Group Policy Editor (gpedit.msc), this can be deployed centrally as part of a Group Policy Object in Active Directory by using the Group Policy Management Console (GPMC).

Method 2: Configure Clear TPM accessibility via Registry Editor

When making this configuration for Windows 11 Home machines or environments where the Local Group Policy Editor is inaccessible, the Windows Registry provides an alternative way to prevent access to the Clear TPM button in the Windows Security app.

⚠️ Caution: Unlike the Local Group Policy Editor, the Windows Registry doesn’t have templates to follow during configuration, which can lead to incorrect changes that may result in device instability. That said, it is recommended that you back up your registry settings before proceeding.

  1. Press Win + R, type regedit, and press Enter.
  2. Navigate the following path inside the Registry Editor: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\TPM
  3. If the TPM key doesn’t exist, right-click Microsoft, press New > Key, and name it TPM.
  4. Find the HideClearTPM DWORD (32-bit) value inside the TPM registry key.
    • If HideClearTPM doesn’t exist, right-click TPM and click New > DWORD (32-bit) value.
    • Name the newly-created DWORD HideClearTPM.
  5. Double-click HideClearTPM and change its value data to match the change you want:
    • Changing the value data to hides the clear TPM button.
    • Changing the value data to shows the button.
  6. Restart the device or sign out of your account to apply the change.

Optional method: Use PowerShell to automate configuration

Having to manually apply the registry method outlined above across multiple endpoints can be tedious and time-consuming. It can also introduce human errors, such as typographical errors when creating the proper registry keys, which can cause the configuration to fail.

To address this challenge, the same registry changes can be adapted as a PowerShell script, eliminating the need for manual Windows registry configuration. In addition, PowerShell enables a precise and predictable standardization of registry changes, eliminating human error when repeatedly applying the change for multiple endpoints.

  1. Press Win + R, type PowerShell, and press Ctrl + Shift + Enter.
  2. This step allows you to open an elevated PowerShell prompt.
  3. Enter the following commands according to the change you want to implement:
    • To hide the Clear TPM button:
      New-ItemProperty -Path “HKLM:\SOFTWARE\Policies\Microsoft\TPM” -Name “HideClearTPM” -PropertyType DWord -Value 1 -Force
    • To show the Clear TPM button:
      Set-ItemProperty -Path “HKLM:\SOFTWARE\Policies\Microsoft\TPM” -Name “HideClearTPM” -Value 0
  4. Close the PowerShell prompt.

📝 Note: These PowerShell commands applies on for all users in a local system. To effectively deploy this for multiple endpoints, you can set it as a logon script through Group Policy or use an automated scripting engine.

Easily deploy scripts rapidly and at scale.

→ Explore NinjaOne’s automated scripting solution.

Additional considerations when managing TPM settings

When managing access to the Clear TPM function, administrators should also account for TPM-dependent features, alternative access paths, and auditing procedures.

Consideration #1: BitLocker

Once you’ve enabled the Clear TPM function, make sure to suspend BitLocker protection before clearing the TPM. Failure to do so will lead to the loss of all stored keys inside the TPM, including BitLocker keys. This forces any encrypted drives to enter recovery mode, requiring the BitLocker recovery key to unlock the system at startup.

Consideration #2: Windows Security Center UI

The methods in this guide allow administrators to prevent the Clear TPM button from showing up in the Windows Security app. However, this doesn’t disable a device’s TPM management tool as a whole but only limits the GUI access of end users to prevent accidental TPM resets.

Consideration #3: TPM Management tool

As stated in Consideration #2, the methods outlined in this guide don’t disable the TPM management tool as a whole. Administrators can still access and clear it by entering tpm.msc in the Run dialog box. Additionally, the TPM can still be reset by entering the Clear-TPM command using an elevated PowerShell prompt.

Additional restrictions are required for a full lockdown of TPM settings, such as restricting tpm.msc using AppLocker and tighter control of administrative privileges in an environment.

Consideration #4: Monitor TPM usage using Event Viewer

Administrators can monitor changes in TPM settings through Event Viewer by navigating the path Application and Services > Microsoft > Windows > TPM > Operational. This allows for faster detection of unauthorized or accidental Clear TPM events. Active monitoring of the TPM can also help audit TPM ownership changes and accidental lockouts.

Safeguard encrypted keys by managing Clear TPM access

The Trusted Platform Module (TPM) stores all encryption keys in a device, providing access to encrypted programs and files in a system. However, end users may accidentally reset their device’s TPM without proper access management, leading to a plethora of security-related errors.

To prevent this from happening, you can disable the Clear TPM button via Local Group Policy Editor or Registry Editor, allowing stricter control on who can access this function. You can combine these methods with AppLocker and stricter administrative access policies to further lockdown TPM settings access.

FAQs

Clearing your TPM resets it to its factory default state, wiping all encryption keys and data within it. The loss of these keys can affect access to encrypted features and files inside the device, such as BitLocker encrypted drives, Windows Hello, and Encrypting File System (EFS).

In addition, Clearing the TPM makes it unconfigured due to the lack of secure ownership between it and the system, making it available but inactive to perform advanced operations and other processes that require owner credentials.

It’s possible to reset your TPM through BIOS, and it has the same effect as pressing the clear TPM button. This process is best fit for clearing all TPM contents of a device with a corrupted or broken OS. However, providing a step-by-step, one-size-fits-all instruction for this process is impossible, as BIOS settings vary per manufacturer.

You might also like

Ready to simplify the hardest parts of IT?
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).