No link to story available
https://technet.microsoft.com/en-us/itpro/windows/keep-secure/tpm-recommendations [microsoft.com] Details the requirements for the tpm, what features require its use and different ways it can be implemented. It also gives the option of a firmware based implementation which can use the security feature, such as trust zone and IME.