Truecrypt Installation and Deployment
Total Page:16
File Type:pdf, Size:1020Kb
TrueCrypt Installation and Deployment Academic Services Exeter IT Desktop Support TrueCrypt Installation and Deployment Document reference: DS035 Document type: Desktop Support Procedure Document status: Live Review period: Twelve months Next review date: 14 Dec 2013 DS035 - Truecrypt installation and deployment - v2.4 - Master.docx Page 1 of 16 TrueCrypt Installation and Deployment 1 TABLE OF CONTENTS 1 Table of Contents ........................................................................................................... 2 2 Document History .......................................................................................................... 3 2.1 Document location .................................................................................................... 3 2.2 Revision history ........................................................................................................ 3 2.3 Approvals .................................................................................................................. 3 2.4 Reviews .................................................................................................................... 3 3 Introduction .................................................................................................................... 4 4 Pre-installation Steps .................................................................................................... 4 4.1 Data backup ............................................................................................................. 4 4.2 Initial assessment of the machine / health check ...................................................... 4 4.3 Check disk configuration ........................................................................................... 4 4.4 chkdsk ...................................................................................................................... 4 4.5 Analyse and defragment disk .................................................................................... 5 4.6 Create rescue CD folder ........................................................................................... 5 5 Install the TrueCrypt Application .................................................................................. 6 6 Encryption ...................................................................................................................... 6 6.1 Re-encryption ......................................................................................................... 11 7 User Deployment Steps ............................................................................................... 11 7.1 Change user password ........................................................................................... 11 7.2 User awareness ...................................................................................................... 11 8 Recovery Procedures .................................................................................................. 12 8.1 Recovery of the original IT support password ......................................................... 12 8.2 Procedure for decrypting the hard drive .................................................................. 14 9 Technical Information .................................................................................................. 15 9.1 Limitations .............................................................................................................. 15 9.2 Possible issues ....................................................................................................... 15 9.3 Further reading ....................................................................................................... 15 10 Appendix – Recommended Windows Configuration ............................................. 16 11 Appendix – Naming Convention for Header Files .................................................. 16 DS035 - Truecrypt installation and deployment - v2.4 - Master.docx Page 2 of 16 TrueCrypt Installation and Deployment 2 DOCUMENT HISTORY 2.1 DOCUMENT LOCATION This document can be accessed from the following location: http://www.exeter.ac.uk/it/equipmentandsoftware/howto 2.2 REVISION HISTORY The latest revision can be found at the top of the list: Revision Date Author Version Summary of Changes Amended Encryption process, amended 14 Dec 2012 Rob Hatswell 2.4 Recovery procedure, minor changes to text 10 Oct 2011 Bill Lambert 2.3 Added re encryption information 9 May 2011 Paul Field 2.2 Fixed typo in one of the technical comments Minor tweaks, mostly cosmetic. Added some April 2011 Various 2.1 extra tips Additional sections added for user advice, data 25th February 2011 Various 2.0 recovery issues, windows configuration and header naming conventions. 2nd September 2010 Sue Watling 1.0 First live version 2.3 APPROVALS This document requires the following approvals: Name Title Version Date of approval Matt Coppell Incident Response Team Leader 2.4 14 Dec 2013 Paul Grogan Incident Response Team Leader 2.3 10 Oct 2011 Paul Grogan Incident Response Team Leader 2.2 9 May 2011 Paul Grogan Incident Response Team Leader 2.1 5 May 2011 Paul Grogan Incident Response Team Leader 2.0 25 March 2011 Paul Grogan Incident Response Team Leader 1.0 12 October 2010 2.4 REVIEWS This document was reviewed at the following dates with no updates required: Name Version Date of Review Notes DS035 - Truecrypt installation and deployment - v2.4 - Master.docx Page 3 of 16 TrueCrypt Installation and Deployment 3 INTRODUCTION This document is intended to be used by the University of Exeter’s Desktop Support staff and CDO’s supporting Colleges. It is to be used to guide the installation of TrueCrypt encryption software onto University-provided laptops. This document has been written to be applicable to the University’s recommended makes/models/builds of laptops running Windows XP SP3; however the software does support other versions of Windows and other Operating Systems. More information on supported Operating Systems can be found by visiting the link below. http://www.truecrypt.org/docs/?s=supported-operating-systems The instructions recommend encryption of the entire disk. 4 PRE-INSTALLATION STEPS For new PC deployments that have been imaged please skip to 4.5. 4.1 DATA BACKUP Confirm user has backed up their data including Outlook archive .pst files. If NOT, ensure their data is backed up to a removable device (e.g. External Hard Drive). 4.2 INITIAL ASSESSMENT OF THE MACHINE / HEALTH CHECK Technical staff to assess the machine, if deemed necessary re-image machine. Health check – look for any evidence of hardware faults, windows faults or traces of viruses/malware. Check Windows XP SP3 is installed. 4.3 CHECK DISK CONFIGURATION TrueCrypt may be installed on any PC that has been set up in the standard way (as described in the relevant DS documents). That is, one Windows Operating System fills the whole disk on a single partition. However, TrueCrypt may also be applied to any partition on a multi-partition disk, provided it does not have a “logical” partition. It must be a “primary” partition. If a whole-disk encryption is desired, and there are logical partitions, the contents of these partitions must be saved, the logical partitions deleted and replaced with primary partitions, and the content restored to these. 4.4 CHKDSK On older systems it’s advisable to run chkdsk /f /r before proceeding to encrypt the drive. This is to highlight damaged areas of the disk which could cause problems with the process. If any bad clusters etc. are found then further investigation is needed (software or hardware) before encryption can commence. DS035 - Truecrypt installation and deployment - v2.4 - Master.docx Page 4 of 16 TrueCrypt Installation and Deployment 4.5 ANALYSE AND DEFRAGMENT DISK Run Disk Defragmenter from ‘System Tools’ folder that can be found in the ‘Accessories’ folder via the ‘Start menu’. Analyse the C: drive. If the disk is partitioned analyse all other volumes as well. Defragment each partition if advised to do so by the application. Once all volumes are defragmented, exit Disk Defragmenter and reboot the machine. 4.6 CREATE RESCUE CD FOLDER During the installation sequence, you will be prompted to create a Rescue CD in the form of an .iso file (This CD is will be required to restore the original header). Ensure the account you are logged into has Administrator rights. Create a drive mapping to a server location where the Rescue CD information is to be stored. This should be an area accessed only by the IT Support team. Create a new folder, giving the folder the same name as the laptop (service tag – user’s name, e.g. B6YT998 – Minnie Mouse). This new folder will be used to store the Rescue CD .iso file. DS035 - Truecrypt installation and deployment - v2.4 - Master.docx Page 5 of 16 TrueCrypt Installation and Deployment 5 INSTALL THE TRUECRYPT APPLICATION If you have not done so, download and install TrueCrypt. Desktop Support Staff can find TrueCrypt on the Desktop Support shared drive. The latest stable version of TrueCrypt (version 7.1a) can be downloaded from http://www.truecrypt.org/downloads Start the setup of TrueCrypt and accept the licence At the next window headed ‘Wizard Mode’, make sure "Install" is selected and click “Next” At the next window headed ‘Setup Options’: Accept the default install location un-tick "Add TrueCrypt to Start menu" un-tick "Add TrueCrypt icon to desktop" This will hide the software from the user