TPM isn’t about locking down machines - they’re about enabling the user (who is always in control) to establish a trust chain for software on the machine - and to serve as a secure store for cryptographic secrets so they become inaccessible from the rest of the system.
You can have lock-out without the TPM anyway - like the pre-Fingerprint reader iPhones.