TCG Driver



FAQs

Here you’ll find frequently asked questions and solutions for your computing life upgraded with Samsung V-NAND SSD.

Click Update Driver Software Click Browse my computer for driver software Click Let my pick from a list of device drivers on my computer Choose the driver Click Next to update If this does not work, select Search automatically for the updated driver in place of Browse my computer for driver software Restart your computer.

  • How do I know Samsung NVMe M.2 SSDs are compatible with my PC?

    Please check whether your system satisfies the minimum system requirements specified below:
    CategoryMinimum Requirements
    Main-board
    (System)
    Intel Haswell Refresh or later client chipset based mainboard with an unallocated M.2 PCIe Gen3 x4 lane connector
    Processor64-bit processor (recommended) single, dual or higher number of processors can be used
    MemoryMore than 2 GB DRAM
    ConnectorM.2 (‘M’ Key) or third party adapter (AIC) for use with PCIe connector
    Form-FactorSpace for a single sided M.2 2280 (SSD with dimensions 22 mm x 80 mm), or use third party adapter (AIC) to connect to PCIe connector
    Power25 W compatible PCIe slot

    Please check whether your operating system is supported and note that some OS need installation of the proprietary Samsung NVMe driver:
    OSNotes
    Windows 7 32/64 bitSamsung NVMe driver required
    Windows 8 32/64 bitSamsung NVMe driver required
    Windows 8.1 32/64 bitSamsung NVMe driver recommended*
    Windows 10 32/64 bitSamsung NVMe driver recommended*

    * The Samsung NVMe driver ensures maximum compatibility between host and Samsung NVMe PCIe M.2 SSDs, and optimizes system performance.
  • Do Samsung NVMe M.2 SSDs work with any M.2 slot?

    There are different types of M.2 slots. A “B-Key” enables SATA or PCIe NVMe SSDs using up to 2 PCIe lanes, while an “M-Key” enables NVMe SSDs with the use of up to 4 PCIe lanes.
    Performance of PCIe NVMe M.2 SSDs leveraging PCIe x4 lanes is roughly twice as high as with PCIe x2 lanes, so the vast majority of mainboards today support ”M-Key” slots with 4 lanes. This is the solution supported by Samsung NVMe SSDs, and works in the majority of M.2 slots.
    Please check the type of M.2 (M or B Key) slots available on your mainboard by reading the user manual or contacting your system vendor.
  • Will Samsung NVMe M.2 SSDs work on Z97 Mainboards?

    Yes. Samsung NVMe SSDs will work on Haswell Refresh or newer chipsets that follow the standard mainboard requirements defined by Intel (note that some mainboards customized for certain PC makers might not offer the required M.2 slot). Should you have any doubt, please contact your mainboard or PC vendor for more information.
  • Do Samsung NVMe M.2 SSDs work with AMD Ryzen?

    Yes. Samsung NVMe M.2 SSDs will work with standard Ryzen chipsets.
  • Are there any issues with running Windows 7 on a Samsung NVMe M.2 SSD?

    Samsung NVMe SSDs are compatible with Windows 7, but for optimal performance and ease of use we recommend Win 8.1 or newer.
  • Do Samsung NVMe M.2 SSDs work under Linux?

    Samsung NVMe SSDs are compatible with Linux. Please note, however, that Samsung NVMe SSDs are optimized for use under Windows operating systems.
  • Which Generation PCIe does Samsung NVMe M.2 SSD use?

    Samsung NVMe SSDs use PCIe Gen 3.0. For more information please refer to Samsung NVMe SSD datasheets available at www.samsungssd.com

UEFI drivers or boot applications loaded separately. Variables associated with separately loaded UEFI Drivers or UEFI Boot applications. The above measurements are defined by the TCG EFI Platform specification TCG06b Sections 5.1 - 5.5 and are not referred to further herein. TCG PC Client Device Driver Design Principles for TPM 2.0 Version 1.0 Revision 0.27 8/9/2019 PUBLISHED © TCG 2019 Version 1.0. Moreover Windows 10 Home doesn't support such encryption but enables it anyway. As far as I understand that correctly this is the reason of the issue - during Windows 10 install the drive is switched to TCG Opal mode, it is ready to use TCG Opal commands issued by OS but the OS (let's say Windows 10 Home) doesn't support this state. Select the Security tab and perform a TCG Revert by entering in the 32-digit PSID value from step one, then selecting TCG Revert. Once complete, you will see TCG Revert completed successfully messaging. If the message is not present, please re-enter your PSID value and retry the revert.

  • How should a Samsung NVMe M.2 SSD be installed on a PC?

    Installation of Samsung NVMe M.2 SSDs is essentially plug-and-play. Simply insert the NVMe SSD in an M.2 PCIe slot, tighten the SSD in place with the screw and spacer provided by your mainboard manufacturer, and boot up your system from an external source before proceeding with a fresh install of your operating system. Windows has an in-box driver that ensures your Samsung NVMe SSD is operational from the start, but we recommend installing the Samsung NVMe Driver specifically designed for Samsung NVMe SSDs, to ensure optimal performance and to maximize compatibility with your system.
    For more information, please refer to: www.samsungssd.com
  • Are Samsung NVMe M.2 SSDs delivered with a screw?

    Samsung NMVe M.2 SSDs are not delivered with a screw. This is because mainboard manufacturers typically provide the specific screws and spacers that fit the proprietary needs of each mainboard.
  • Can I move data from an HDD or SATA SSD to a Samsung NVMe M.2 SSD?

    Yes. It is possible to clone a SATA HDD or SATA SSD to an NVMe SSD. Samsung, however, recommends performing a “clean install” of the OS and later transferring the desired non-executable files.
    Because the registry information needed for NVMe SSDs is different from those of SATA HDDs or SSDs, a clean install helps to avoid unnecessary compatibility and performance issues that may arise from simply cloning a storage device.
  • Can I plug a Samsung NVMe M.2 SSD in a traditional PCIe slot?

    Yes. Many add-in-card adapters exist, but for optimal performance and compatibility Samsung recommends using an original M.2 slot for your Samsung NVMe SSD.
DriversDriver
  • Can I use a Samsung NVMe M.2 SSD at the same time as a SATA SSD or HDD?

    Yes. There are no technical limitations in using an NVMe M.2 SSD concurrently with a SATA SSD or HDD. Please make sure your mainboard has a sufficient number of interfaces to accommodate multiple storage devices.
  • Can Samsung NVMe M.2 SSDs be RAIDed?

    Yes. Samsung NVMe M.2 SSDs can be grouped into a RAID formation. Please ensure that your mainboard has a sufficient number of NVMe M.2 slots and that sufficient PCIe lanes are available for maximal performance.
  • Can the OS be installed on a Samsung NVMe M.2 SSD?

    Yes. Samsung NVMe M.2 SSDs can be used as the primary storage device, with the Operating System installed on the SSD.
  • Are Samsung NVMe M.2 SSDs bootable when used in combination with an add-in-card (AIC)?

    Yes. An AIC is merely an adapter, and therefore does not change the inherent bootability or connectivity of a Samsung NVMe M.2 SSD. Please note that depending on the quality of the AIC, the performance of your Samsung NVMe M.2 SSD may, in rare cases, be below the performance specifications published by Samsung.
  • What is the difference between a Samsung NVMe M.2 SSD and a regular SSD?

    NVMe SSDs leverage a new type of interface and protocol – Non-Volatile Memory Express – to break through the bottleneck limitations of SATA based systems. Concretely, this means that whereas SATA SSDs’ maximal performance does not exceed 550MB/s, NVMe SSDs can achieve transfer speeds of about 3,500MB/s when connected via PCIe Gen.3 x4 lanes.
  • Why does my Samsung NVMe M.2 SSD not achieve its performance specs in benchmark tests?

    Benchmark test results may differ depending upon the system environment, host software and hardware configuration. Please see the data sheet for more information on the test conditions used by Samsung.
  • Do I need a heat sink for optimal performance of the Samsung NVMe M.2 SSD?

    Samsung NVMe SSDs rarely require a heat sink, yet maintain optimal performance thanks to Samsung’s advanced design and manufacturing capabilities coupled with an integrated, heat dissipating thermal label. In rare instances of extreme workloads (transfer of several hundreds of GB), performance may be throttled through Samsung’s dynamic thermal throttling algorithm to protect the SSDs integrity.
    Please be aware, however, that an external heat source such as a high-powered graphics card, or CPU placed in close proximity to a Samsung NVMe SSD, can adversely affect airflow around a Samsung NVMe SSD which may lead to performance degradation. Therefore, please ensure there is appropriate airflow around your Samsung NVMe SSD.
  • What is the physical size of a Samsung NVMe M.2 SSD? Will it fit my PC?

    Samsung NVMe SSDs use the M.2 (2280) form factor. M.2 is an industry standard, and M.2 SSDs typically measure 22mm in width. Various standardized lengths range between 30mm and 110mm, with the 80mm solution used by Samsung being the most common. This means that Samsung NVMe SSDs are 22mm wide and 80mm long, and should physically fit in the majority of M.2 slots on mainboards.
    It is also important to note that Samsung NVMe M.2 SSDs are “single sided” meaning that all components are mounted on just one side of the PCB, ensuring a relatively “flat” profile that fits in virtually all M.2 slots.
  • Do Samsung NVMe M.2 SSDs have hardware encryption?

    Samsung NVMe SSDs provide internal hardware encryption of all data stored on the SSD, including the operating system. Data is decrypted through a pre-boot authentication process.
    Because all user data is encrypted, private information is protected against loss or theft.
    Encryption is done by hardware, which provides a safer environment without sacrificing performance.
    The encryption methods provided by each Samsung NVMe SSD are: AES (Advanced Encryption Standard, Class0 SED) TCG/OPAL, and eDrive
    Please note that you cannot use more than one encryption method simultaneously.
  • Do Samsung NVMe M.2 SSDs support TCG Opal?

    TCG Opal is supported by Samsung NVMe SSDs (960EVO / PRO and newer). It is an authentication method that employs the protocol specified by the Trusted Computing Group (TCG) meaning that you will need to install TCG software supplied by a TCG OPAL software development company.
    User authentication is done by pre-boot authentication provided by the software. For more detailed information and instructions, please contact a TCG software company. In addition, TCG/opal can only be enabled / disabled by using special security software.
  • What is the difference between the 960PRO and 960EVO?

    The EVO series is designed for demanding mainstream users, while the PRO series is destined for users with very high workload requirements for their SSD, and the need for high capacities.
  • What is an AIC?

    AIC stands for Add-in-Card and it is essentially an adapter that allows connection of a Samsung NVMe M.2 SSD to a standard PCIe x16 slot, instead of an M.2 interface.
  • What is NVMe?

    NVMe (Non-Volatile Memory Express) is a new storage protocol designed to leverage the full performance potential of SSDs and the underlying NAND Flash technology, by eliminating the performance bottleneck imposed by the previous storage protocol – SATA – which had been optimized for far slower hard disk drives.
    Utilizing this new protocol, NVMe SSDs currently outperform SATA based SSDs by a factor of 6-7, with significant upward potential in the future.
  • What is PCIe?

    PCIe (Peripheral Component Interconnect Express) is a well-established and versatile interface. Because of its prevalence (used for Graphic Cards etc.) and high data throughput capability PCIe was adopted by the storage industry to replace the much older and constrained SATA interface for the next generation of SSDs.
    Adoption of PCIe, combined with other factors, enable NVMe SSDs to outperform SATA based SSDs by a factor of 6-7, with significant upward potential in the future thanks to the scalability of PCIe.
  • What is M.2?

    M.2 is a form-factor describing the physical dimensions and connector used for M.2 SSDs. It was primarily designed to incorporate the new PCIe interface and NVMe protocol in SSDs, and to reduce the overall footprint of storage media from the former HDD based 2.5 inch standard dimension.
  • Will a Samsung NVMe M.2 SSD function in a PCIe x1 slot?

    A Samsung NVMe SSD is not compatible with a PCIe x1 slot.
  • What is an “M-Key”? What is a “B-Key”?

    “M” and “B” are different connector types for M.2 slots. A “B-Key” enables SATA or PCIe NVMe SSDs using up to 2 PCIe lanes, and an “M-Key” enables using up to 4 PCIe lanes.
    Please note that Samsung NVMe SSDs use the “M-Key” (to leverage PCIe x4 for maximum performance) and cannot be plugged into an M.2 slot with a “B-Key”.
-->

This test determines whether the device has hit recovery during the firmware update process. BitLocker must be enabled before a firmware update, and the test should be run after an update.

Test details

Tcg drive
Specifications
  • Device.DevFund.Firmware.UpdateDriverPackage
Platforms
  • Windows 10, client editions (x86)
  • Windows 10, client editions (x64)
  • Windows Server 2016 (x64)
  • Windows 10, client editions (ARM64)
Supported Releases
  • Windows 10
  • Windows 10, version 1511
  • Windows 10, version 1607
  • Windows 10, version 1703
  • Windows 10, version 1709
  • Windows 10, version 1803
  • Windows 10, version 1809
  • Windows 10, version 1903
  • Next update to Windows 10
Expected run time (in minutes)5
CategoryScenario
Timeout (in minutes)300
Requires rebootfalse
Requires special configurationfalse
Typeautomatic

Additional documentation

Tcg River Oaks

Tests in this feature area might have additional documentation, including prerequisites, setup, and troubleshooting information, that can be found in the following topic(s):

Running the test

The test returns Pass or Fail.

Troubleshooting

For generic troubleshooting of HLK test failures, see Troubleshooting Windows HLK Test Failures.

If the test fails, it means that this system has hit BitLocker recovery. Please collect BitLocker events in Event viewer at two locations:

  • Application and Services Logs > Microsoft > Windows > BitLocker-API > Management

  • Filter Windows Logs > System by event sources started with BitLocker

The events should give detailed reasonS why recovery is hit. After the root cause of BitLocker recovery is understood and fixed, run the test on a system that has never hit a BitLocker recovery to get a passing result.

Tcg Mac Driver

If the system uses Secure Boot for integrity check (PCR[7]), please see the following steps for more diagnosis information.

Tcg Drivers

  1. The recovery might be triggered by the firmware update package.

  2. If the system has TPM2.0, PCR [7] support is required. Otherwise, PCR [7] support is optional. Tree EFI Protocol specification has details about PCR [7] support.

  3. Check to see if this system supports PCR [7] and is used by BitLocker/Device Encryption by issuing the following command from an elevated command prompt:

    If PCR validation profile shows PCR 7, 11 (Uses Secure Boot for integrity validation), the system is configured correctly.

    If PCR validation profile doesn't show that BitLocker uses Secure Boot for integrity validation (for example, PCR validation profile says PCR 0, 2, 4, 11), this indicates that BitLocker cannot use PCR [7] and one of the following events might be logged into the event log, which is found at Application and Services Logs > Microsoft > Windows > BitLocker-API > Management.

    • BitLocker cannot use Secure Boot for integrity because it is disabled.

    • BitLocker cannot use Secure Boot for integrity because the required UEFI variable X is not present.

    • BitLocker cannot use Secure Boot for integrity because the UEFI variable X could not be read. Error Message: X.

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log entry for variable X is missing or invalid.

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log entry for the OS Loader Authority is missing or invalid.

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log entry for the OS Loader Authority has invalid structure. The event is expected to be an EV_EFI_VARIABLE_AUTHORITY event. The event data must be formatted as an EFI_VARIABLE_DATA structure with VariableName set to EFI_IMAGE_SECURITY_DATABASEGUID and UnicodeName set to 'db'.

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log entry for the OS Loader Authority is invalid. The contents of the EFI_VARIABLE_DATA.VariableData field should be an EFI_SIGNATURE_DATA structure with SignatureOwner set to the GUID {77fa9abd-0359-4d32-bd60-28f4e78f784b} (Microsoft).

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log entry for the OS Loader Authority is invalid. The EFI_SIGNATURE_DATA structure contained in the OS authority event could not be found in the Secure Boot 'db' signature database.

    • BitLocker cannot use Secure Boot for integrity because the signature of the boot loader could not be validated as a Windows signature chained to a trusted Microsoft root certificate.

    • BitLocker cannot use Secure Boot for integrity because the TCG Log entry for the OS Loader Authority is invalid. The signature contained in the EFI_SIGNATURE_DATA structure from the OS authority event could not be found in the verified certificate chain for the boot loader.

    • BitLocker cannot use Secure Boot for integrity because the expected TCG Log separator entry is missing or invalid.

    • BitLocker cannot use Secure Boot for integrity because the TCG Log for PCR [7] contains invalid entries.

  4. If BitLocker/Device Encryption is using PCR [7] as reported by the manage-bde command in step 3 and the system hit recovery, you will see a BitLocker-Driver event in Windows Logs > System with Event ID 24658, stating that the Secure Boot configuration has changed unexpectedly. To diagnose the issue, find two most recent BitLocker-API events (Event ID 817) in Application and Services Logs > Microsoft > Windows > BitLocker-API > Management. Time stamp of one of the 817 events should be earlier than that of event 24658; time stamp of the other 817 event should be later. Event 817 is logged when BitLocker seals a key to TPM where PCR [7] is used. In the Details tab, you can find PCR [7] value for the boot session where this event is logged. Given the system hit a recovery during a reboot, PCR [7] values across these two boot sessions should be different. PCR [7] values logged in these two 817 events will tell the difference. In event 817, TCG log for that boot session is logged as well. If you have a tool to parse TCG log, that will reveal detailed information about PCR extension. If you don't have such a tool, you can do the following:

    1. Copy TBSLogGenerator.exe from the Windows HLK Controller to your test machine. It is located at %systemdrive%Program Files (x86)Windows Kits8.1Hardware Certification KitTests<architecture>NTTESTBASETESTngscb, where <architecture> is the architecture of your test machine. This can be amd64, x86 or ARM.

      TBSLogGenerator.exe dumps PCR values and TCG log in a human-readable format for the boot session when TBSLogGenerator.exe gets run.

    2. Repeat the steps that triggers BitLocker recovery. For both boot sessions across BitLocker recovery, use TBSLogGenerator.exe to dump PCR values and TCG logs.

    3. Analyze two sets of PCR values and TCG logs to find the difference.