TPM two.0: Suppliers cryptographic keys as well as information of elements loaded in the course of boot. Secure boot takes advantage of this knowledge as reference over the boot system. Any improve in the boot components is taken as an indication of tampering. Observe: If you are making use of protection only updates for these variations of Wind