Fixing TPM-WMI Error 1796 and Error 5 on Windows 10/11

You turn on your Windows 10 or 11 PC, ready to get some work done, boot into a game, or simply check your email — and suddenly, you’re greeted with an ominous error message in Event Viewer or during startup:

“TPM-WMI: Error 1796 — The specified resource type cannot be found in the image file.”

Or perhaps:

“TPM-WMI: Error 5 — Access is denied.”

These cryptic, system-level errors can appear out of nowhere. They might show up after a Windows Update, driver installation, BIOS upgrade, or seemingly no change at all. And while your PC may still boot and function, these errors can prevent critical features from working — BitLocker encryption, Windows Hello facial recognition or fingerprint login, Secure Boot, and even Microsoft Pluton security features on newer hardware.

Ignoring them isn’t wise. These errors indicate that Windows is failing to communicate properly with your Trusted Platform Module (TPM) through the Windows Management Instrumentation (WMI) layer — a core component of system management and security.

This comprehensive guide will walk you through:

  • What TPM and WMI are, and why they matter
  • What Errors 1796 and 5 actually mean
  • Step-by-step troubleshooting methods — from beginner to advanced
  • How to reset, reinitialize, or reinstall TPM components
  • BIOS/UEFI settings that can trigger or resolve these errors
  • Registry fixes, PowerShell commands, and command-line tools
  • Prevention strategies to avoid recurrence
  • When to seek professional help or consider hardware replacement

Whether you’re a home user, IT administrator, or tech enthusiast, this guide is designed to give you the knowledge and tools to permanently resolve TPM-WMI Errors 1796 and 5 — and restore full security and functionality to your Windows 10 or 11 system.


Chapter 1: Understanding TPM and WMI — The Foundation of Windows Security

Before diving into fixes, it’s essential to understand what TPM and WMI are, and why their failure causes system-level errors.

What Is TPM (Trusted Platform Module)?

The Trusted Platform Module (TPM) is a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. Think of it as a “vault” built into your motherboard (or CPU, in modern systems) that stores encryption keys, passwords, and certificates — safely isolated from the rest of the system.

TPM 1.2 vs. TPM 2.0

  • TPM 1.2: Older standard, limited cryptographic algorithms, still found on some legacy systems.
  • TPM 2.0: Modern standard, required for Windows 11, supports stronger encryption (RSA, ECC, SHA-256), and integrates with Windows Hello, BitLocker, Device Encryption, and more.

Where Is TPM Located?

  • On older systems: A discrete chip on the motherboard.
  • On modern systems (Intel 8th Gen+, AMD Ryzen 2000+): Often a “firmware TPM” (fTPM) embedded in the CPU or chipset, enabled via BIOS/UEFI.

Why TPM Matters

TPM enables:

  • BitLocker Drive Encryption: Encrypts your entire drive; keys stored securely in TPM.
  • Windows Hello: Biometric authentication (face, fingerprint) tied to hardware.
  • Device Health Attestation: Verifies system integrity for enterprise and Azure environments.
  • Secure Boot: Prevents unauthorized OS loaders from executing.
  • Credential Guard / Virtualization-Based Security (VBS): Isolates secrets from the OS kernel.

Without a functioning TPM, these features either fail or fall back to less secure methods.

What Is WMI (Windows Management Instrumentation)?

WMI is Microsoft’s infrastructure for managing data and operations in Windows. It’s the “central nervous system” for system administrators and Windows itself to query hardware status, configure services, monitor performance, and automate tasks.

TPM communicates with Windows through WMI classes like:

  • Win32_Tpm
  • Win32_EncryptableVolume
  • SecurityCenter2

When WMI fails to retrieve TPM information — due to permissions, corruption, or misconfiguration — you get errors like 1796 and 5.

The Relationship Between TPM and WMI

Think of it this way:

  • TPM = The secure hardware vault.
  • WMI = The Windows “receptionist” that asks the vault for keys or status updates.
  • Error 1796 or 5 = The receptionist can’t find the vault, or isn’t allowed to enter.

Chapter 2: Decoding the Errors — What Do 1796 and 5 Actually Mean?

Error 1796: “The specified resource type cannot be found in the image file.”

This error typically appears in Event Viewer > Applications and Services Logs > Microsoft > Windows > Tpm-WMI > Operational.

Technical Meaning:

Error 1796 usually indicates that the WMI repository — the database where WMI stores class definitions and provider information — is corrupted or missing TPM-related classes. Windows is trying to load a WMI class or method related to TPM, but the definition doesn’t exist in the repository.

This can happen after:

  • A failed Windows Update
  • Improper shutdown during WMI registration
  • Third-party software tampering with WMI
  • Malware infection
  • Manual deletion or corruption of WMI files

Common Triggers:

  • Upgrading from Windows 10 to 11
  • Installing or uninstalling security software
  • Enabling/disabling TPM in BIOS
  • Running winmgmt /resetrepository improperly

Error 5: “Access is denied.”

This error is more straightforward — but no less frustrating.

Technical Meaning:

Windows (or a process) attempted to access the TPM via WMI but was denied permission. This is typically a security context or privilege issue.

Possible causes:

  • User account lacks administrative privileges
  • WMI service running under wrong account
  • TPM ownership not taken or cleared
  • Group Policy or registry restrictions
  • Antivirus/security software blocking access
  • Corrupted system files or permissions

Common Triggers:

  • Switching user accounts
  • Domain-joined machines with restrictive GPOs
  • After sysprep or image deployment
  • Manual registry tweaks gone wrong

Chapter 3: Preliminary Checks — Don’t Skip These!

Before diving into complex fixes, perform these quick checks. Often, the solution is simpler than you think.

1. Verify TPM Is Enabled in BIOS/UEFI

Many “TPM errors” are simply because TPM is disabled in firmware.

How to Check:

  1. Reboot your PC.
  2. Press F2, Del, F10, or Esc (varies by manufacturer) to enter BIOS/UEFI.
  3. Navigate to Security, Advanced, or Trusted Computing.
  4. Look for:
    • TPM Device → Should be “Enabled” or “Available”
    • Security Device Support → Enable if present
    • PTT (Intel) or fTPM (AMD) → Enable firmware TPM
  5. Save and Exit (F10).

💡 On some systems, you may need to set “TPM State” to “Enabled” and “TPM Activation” to “Activated.”

Reboot and check if the error persists.


2. Check TPM Status in Windows

Windows includes built-in tools to check TPM health.

Method 1: TPM Management Console

  1. Press Win + R, type tpm.msc, press Enter.
  2. Look at the Status section.

✅ Healthy system shows:

“The TPM is ready for use.”

⛔ If you see:

“The TPM is not ready for use.”
“Compatible TPM cannot be found.”
“TPM is disabled.”

→ Then TPM is not properly initialized or accessible.

Method 2: PowerShell

Open PowerShell as Administrator and run:

powershell
Get-Tpm

Look for:

  • TpmPresent : True
  • TpmReady : True
  • ManagedAuthLevel : Full
  • OwnerClearDisabled : False

If TpmReady is False, or TpmPresent is False, Windows cannot communicate with TPM.


3. Check Windows Version and TPM Compatibility

Windows 11 requires TPM 2.0.

To check your TPM version:

  1. Open tpm.msc
  2. Look under “TPM Manufacturer Information” → Specification Version

Or in PowerShell:

powershell
Get-WmiObject -Namespace "root\cimv2\security\microsofttpm" -Class Win32_Tpm | Select SpecVersion

If you’re running Windows 11 with TPM 1.2, or no TPM at all, you’ll encounter persistent errors.

💡 Workaround: You can install Windows 11 without TPM 2.0 via registry edits or modified installers — but expect instability and errors like 1796/5. Not recommended.


4. Run Windows Update

Microsoft frequently releases fixes for TPM and WMI bugs via Windows Update.

  1. Go to Settings > Windows Update
  2. Click Check for updates
  3. Install all updates — including optional driver and firmware updates
  4. Reboot

💡 Especially important after major feature updates (e.g., 22H2, 23H2).


Chapter 4: Step-by-Step Fixes for TPM-WMI Error 1796

Now let’s tackle Error 1796 — the “resource not found” issue. This is typically a WMI repository corruption problem.


Fix 1: Rebuild the WMI Repository

This is the most common and effective fix for Error 1796.

⚠️ Warning: Rebuilding WMI will reset all WMI settings and providers. Third-party apps relying on custom WMI classes may need reconfiguration.

Step-by-Step:

  1. Boot into Safe Mode

    • Hold Shift while clicking Restart in Start Menu.
    • Go to Troubleshoot > Advanced Options > Startup Settings > Restart
    • Press F4 to enter Safe Mode
  2. Open Command Prompt as Administrator

    • Press Win + X > Command Prompt (Admin) or Windows Terminal (Admin)
  3. Stop WMI Service

    cmd
    net stop winmgmt
  4. Rename the WMI Repository Folder

    cmd
    ren C:\Windows\System32\wbem\Repository Repository.old
  1. Restart WMI Service

    cmd
    net start winmgmt

    → Windows will automatically rebuild the repository on next query.

  2. Reboot Normally

    Exit Safe Mode and reboot.

  3. Verify Fix

    Open PowerShell as Admin:

    powershell
    Get-WmiObject -Namespace "root\cimv2\security\microsofttpm" -Class Win32_Tpm

    If no errors, and TPM info displays — success!


Fix 2: Re-register All WMI Providers and DLLs

Sometimes, rebuilding the repository isn’t enough. You need to re-register all components.

Run these commands in Command Prompt (Admin):

cmd
cd /d %windir%\system32\wbem
for %i in (*.dll) do regsvr32 /s %i
for %i in (*.exe) do %i /RegServer

Then reboot.

💡 This re-registers all WMI-related DLLs and executables.


Fix 3: Use WMIDiag Tool (Legacy but Effective)

Microsoft’s WMIDiag.vbs script can diagnose and repair WMI issues.

  1. Download WMIDiag from Microsoft (search “WMIDiag download Microsoft” — official link may be archived).
  2. Extract and run in Command Prompt (Admin):
cmd
cscript WMIDiag.vbs
  1. Review the generated log file. It will suggest fixes — often including repository reset or service restarts.

Fix 4: Repair System Files with DISM and SFC

Corrupted system files can break WMI and TPM communication.

Run in Command Prompt (Admin):

cmd
DISM /Online /Cleanup-Image /RestoreHealth

Wait for completion (may take 10-20 minutes).

Then run:

cmd
sfc /scannow

Reboot after both complete.


Fix 5: Reset TPM via PowerShell (Clear and Reinitialize)

If WMI is fixed but TPM still inaccessible, reset the TPM module itself.

⚠️ Warning: This will clear all keys stored in TPM — including BitLocker recovery keys if not backed up. Ensure you have recovery keys saved before proceeding.

Step-by-Step:

  1. Open PowerShell as Administrator

  2. Check if TPM is ready for ownership:

    powershell
    Get-Tpm | Select IsReady

    → Must return True. If False, fix BIOS or driver issues first.

  1. Clear TPM:

    powershell
    Clear-Tpm

    → You may be prompted to confirm. Type Y and press Enter.

  1. Restart your PC.

  2. After reboot, reinitialize TPM:

    powershell
    Initialize-Tpm
  3. Take ownership (if not auto-assigned):

    powershell
    Enable-TpmAutoProvisioning
  4. Verify:

    powershell
    Get-Tpm

    → Should show TpmReady : True, OwnerAuthFull : True


Chapter 5: Step-by-Step Fixes for TPM-WMI Error 5 — “Access is Denied”

Error 5 is a permissions issue. Let’s fix it.


Fix 1: Run Services as Administrator / Check Service Logon

WMI or TPM services may be running under restricted accounts.

  1. Press Win + R, type services.msc, press Enter.

  2. Find these services:

    • Windows Management Instrumentation
    • TPM Base Services
  3. Double-click each.

  4. Go to Log On tab.

    → Should be set to “Local System account” with “Allow service to interact with desktop” unchecked.

  5. If changed, reset to Local System, Apply, OK.

  6. Restart both services (Right-click > Restart).

  1. Reboot.

Fix 2: Take Ownership of TPM via PowerShell

Sometimes, no user or system has “ownership” of the TPM — causing access denied errors.

In PowerShell (Admin):

powershell
# Check current owner
Get-Tpm | Select OwnerAuth

# If blank or "IsOwned : False", take ownership
Set-TpmOwnerAuth -NewOwnerAuth "YourPasswordHere"

💡 Replace "YourPasswordHere" with a strong password. Store it securely — you’ll need it for recovery.

Alternatively, let Windows auto-generate:

powershell
Set-TpmOwnerAuth -RandomLockoutAuth

Then reboot.


Fix 3: Modify Registry Permissions for TPM Keys

Advanced fix — only if other methods fail.

  1. Press Win + R, type regedit, press Enter.
  1. Navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TPM
  1. Right-click “TPM” > Permissions

  2. Click Advanced

  3. Ensure SYSTEM and Administrators have Full Control

  4. Check “Replace all child object permissions” → Apply → OK

  1. Repeat for:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\TPM
  1. Reboot.

Fix 4: Disable Third-Party Antivirus Temporarily

Some security suites (especially those with “advanced threat protection” or kernel-level drivers) block WMI access to TPM.

  1. Open your antivirus console.

  2. Temporarily disable real-time protection.

  3. Reboot.

  4. Check if error 5 is gone.

  5. If yes, add exceptions for:

    • C:\Windows\System32\wbem\
    • C:\Windows\System32\TPM\
    • winmgmt.exe
    • tpm.msc

Or switch to Windows Security.


Fix 5: Group Policy and Local Security Policy Fixes

On domain-joined or enterprise-managed PCs, Group Policy may restrict TPM access.

Check Local Group Policy:

  1. Press Win + R, type gpedit.msc, press Enter. (Not available on Windows Home)

  2. Navigate to:

    Computer Configuration > Administrative Templates > System > Device Guard

    → Ensure “Turn On Virtualization Based Security” is Not Configured or Disabled unless intentionally enabled.

  3. Also check:

    Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption

    → Ensure policies aren’t blocking TPM usage.

  1. Run in Command Prompt (Admin):

    cmd
    gpupdate /force
  2. Reboot.

For Windows Home Users:

Use Registry Editor to check equivalent keys under:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE

Delete restrictive values if present.


Chapter 6: BIOS/UEFI-Level Fixes — The Hardware Layer

Sometimes, the problem isn’t Windows — it’s your firmware.


Fix 1: Update BIOS/UEFI

Outdated BIOS can cause TPM 2.0 compatibility issues, especially after Windows 11 upgrades.

  1. Visit your motherboard or laptop manufacturer’s website.
  2. Search for your exact model.
  3. Download the latest BIOS.
  4. Follow their flashing instructions carefully.

💡 Use manufacturer utilities (e.g., ASUS EZ Flash, Dell SupportAssist) — not third-party tools.

⚠️ Ensure stable power during update. Laptops: 50%+ battery. Desktops: UPS recommended.


Fix 2: Clear TPM from BIOS

Most BIOS interfaces allow you to clear or reset TPM — equivalent to Clear-Tpm in Windows.

  1. Enter BIOS (reboot > Del/F2)
  2. Go to Security > TPM Configuration
  3. Look for:
    • Clear TPM
    • Reset to Factory
    • Take Ownership → Set to “Allow”
  4. Save and Exit.

After reboot, Windows should auto-reinitialize TPM.


Fix 3: Disable and Re-enable TPM in BIOS

A simple toggle can reset communication.

  1. Enter BIOS.
  2. Disable TPM.
  3. Save and Exit → Reboot.
  4. Re-enter BIOS.
  5. Re-enable TPM.
  6. Save and Exit → Reboot.

Check tpm.msc afterward.


Fix 4: Check for Conflicting Security Features

Some BIOS settings conflict with TPM:

  • Intel PTT + Discrete TPM: Disable discrete if using PTT.
  • AMD fTPM + 3rd-party TPM chip: Same rule.
  • Secure Boot: Must be Enabled for TPM 2.0 to function properly in Windows 11.
  • CSM (Compatibility Support Module): Disable if using UEFI + Secure Boot.

Adjust accordingly.


Chapter 7: Advanced Fixes — For Persistent or Complex Cases

If you’ve tried everything and still see Errors 1796 or 5, it’s time for nuclear options.


Fix 1: Clean Boot — Eliminate Software Conflicts

Third-party services or startup apps may interfere with WMI/TPM.

  1. Press Win + R, type msconfig, press Enter.
  2. Go to Services tab.
  3. Check “Hide all Microsoft services”
  4. Click “Disable all”
  5. Go to Startup tab > Open Task Manager
  6. Disable all startup items.
  7. Reboot.

If error disappears, re-enable services/startups one by one to find the culprit.


Fix 2: Perform an In-Place Upgrade (Repair Install)

Reinstall Windows without losing apps or files.

  1. Download Windows 10/11 ISO from Microsoft.
  2. Mount ISO (double-click in File Explorer).
  3. Run setup.exe.
  4. Choose “Keep personal files and apps”
  5. Proceed with install.

This repairs system files, WMI, registry, and drivers — without data loss.


Fix 3: Reset This PC

More aggressive than in-place upgrade.

  1. Go to Settings > System > Recovery
  2. Click “Reset this PC”
  3. Choose “Keep my files”
  4. Let it complete (30-60 mins).

💡 Back up data first, just in case.


Fix 4: Check for Hardware Failure

If TPM is a discrete chip, it can fail.

Signs of hardware TPM failure:

  • BIOS doesn’t detect TPM at all
  • “Device not found” in Device Manager under Security Devices
  • Persistent errors after all software fixes
  • Physical damage or overheating near TPM chip (desktops)

Solutions:

  • For desktops: Replace TPM module (if socketed) or motherboard.
  • For laptops: Contact manufacturer — often not user-replaceable.
  • Use firmware TPM (fTPM/PTT) if available as fallback.

Chapter 8: Prevention — How to Avoid TPM-WMI Errors in the Future

An ounce of prevention > pound of cure.

1. Keep BIOS and Windows Updated

Enable automatic updates. Check manufacturer site quarterly for BIOS updates.

2. Don’t Disable TPM Unless Necessary

Even if you don’t use BitLocker or Windows Hello, TPM provides system integrity checks. Leave it enabled.

3. Backup BitLocker Keys

If using BitLocker, save recovery keys to Microsoft Account or print them. Clearing TPM without backup = data loss.

4. Avoid Registry Cleaners and “Optimization” Tools

These often break WMI or delete critical keys.

5. Use Windows Security Instead of Third-Party AV

Less likely to interfere with low-level services.

6. Monitor Event Viewer Regularly

Check Applications and Services Logs > Microsoft > Windows > Tpm-WMI monthly for early warnings.

7. Create System Restore Points Before Major Changes

Before BIOS updates, driver installs, or Windows feature updates — create a restore point.


Chapter 9: Real-World Case Studies

Let’s look at actual scenarios and how they were resolved.


Case Study 1: Windows 11 Upgrade Triggered Error 1796

User: Upgraded from Windows 10 to 11. Immediately saw TPM-WMI 1796 in Event Viewer. BitLocker suspended.

Diagnosis: WMI repository corrupted during upgrade.

Solution:

  1. Booted into Safe Mode.
  2. Renamed Repository folder.
  3. Rebooted — repository rebuilt automatically.
  4. Ran Get-Tpm — now showed “Ready.”
  5. Resumed BitLocker protection.

Result: Error gone. System stable.


Case Study 2: Corporate Laptop with Error 5 After GPO Push

User: Domain-joined HP laptop. After IT pushed new GPO, user got “Access Denied” trying to use Windows Hello.

Diagnosis: Group Policy disabled TPM auto-provisioning.

Solution:

  1. Local admin ran gpedit.msc.
  2. Navigated to Device Guard policy.
  3. Set to “Not Configured.”
  4. Ran gpupdate /force.
  5. Rebooted.
  6. Ran Enable-TpmAutoProvisioning in PowerShell.

Result: Windows Hello restored. Error 5 disappeared.


Case Study 3: Gaming PC with Persistent Error 1796 After Overclocking

User: Overclocked Ryzen 5900X + ASUS motherboard. Random WMI errors after stress testing.

Diagnosis: Unstable fTPM due to aggressive SOC voltage or RAM overclock.

Solution:

  1. Reset BIOS to optimized defaults.
  2. Disabled PBO (Precision Boost Overdrive).
  3. Set RAM to XMP only (no manual timings).
  4. Re-enabled fTPM.
  5. Rebooted — error gone.

Lesson: Overclocking can destabilize firmware TPM. Test stability with Get-Tpm after each OC change.


Chapter 10: When to Seek Professional Help

Despite your best efforts, some issues require expert intervention.

Signs You Need Help:

  • BIOS doesn’t detect TPM at all
  • “Access Denied” persists even after clean Windows install
  • Physical damage to motherboard (burnt components, swollen capacitors)
  • Laptop under warranty — don’t void it with DIY repairs
  • Enterprise environment with complex GPOs or SCCM

Where to Go:

  • Manufacturer Support (Dell, HP, Lenovo, ASUS, etc.)
  • Microsoft Support (for software/Windows-level issues)
  • Local PC repair shop (for hardware diagnostics)
  • Enterprise IT department (for domain/GPO issues)

💡 Always export Event Viewer logs before seeking help — they’re invaluable for diagnosis.


Conclusion: Take Back Control of Your TPM and WMI

TPM-WMI Errors 1796 and 5 are intimidating — but solvable. Whether it’s a corrupted WMI repository, a permissions glitch, a BIOS misconfiguration, or even hardware failure, this guide has equipped you with the tools and knowledge to diagnose and fix the root cause.

Remember:

✅ Always check BIOS first — is TPM enabled?
✅ Use tpm.msc and Get-Tpm to verify status
✅ Rebuild WMI repository for Error 1796
✅ Check service permissions and ownership for Error 5
✅ Update BIOS and Windows regularly
✅ Backup BitLocker keys before clearing TPM
✅ Avoid registry cleaners and aggressive optimizers

Your TPM is a cornerstone of Windows security. Don’t ignore its cries for help. With methodical troubleshooting, you can restore full functionality — and sleep soundly knowing your data, identity, and system integrity are protected.


Final Checklist: Quick Reference Guide

☐ Enter BIOS — Ensure TPM/fTPM/PTT is Enabled
☐ Run tpm.msc — Confirm “TPM is ready for use”
☐ Run Get-Tpm in PowerShell — Check TpmReady : True
☐ For Error 1796: Rebuild WMI repository in Safe Mode
☐ For Error 5: Check service logon, take TPM ownership, disable 3rd-party AV
☐ Update BIOS and Windows
☐ Clear TPM via BIOS or Clear-Tpm (backup keys first!)
☐ Check Group Policy if on domain
☐ Avoid overclocking instability — reset BIOS if needed
☐ Use “Reset this PC” or in-place upgrade as last resort
☐ Backup data and create restore points before major changes


Additional Resources

  • Microsoft TPM Documentation: https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/
  • WMIDiag Tool (Archive): Search “Microsoft WMIDiag download”
  • PowerShell TPM Cmdlets: Get-Command -Module TrustedPlatformModule
  • BIOS Update Utilities:
    • Dell: SupportAssist
    • HP: Support Assistant
    • Lenovo: Vantage
    • ASUS: MyASUS or EZ Update
  • Event Viewer Path: Applications and Services Logs > Microsoft > Windows > Tpm-WMI > Operational

Comments

Below Post Ad