Hello,
if you enable a TPM, it will be emulated by software. The state of the TPM will be stored on the storage that you can configure in 'TPM storage'. Since there is no backing hardware TPM that actually stores the keys, this will not be secure for the scenario that you have described.