This project has moved and is read-only. For the latest updates, please go here.
1
Vote

Can't bypass Rescue Disk

description

Been trying to bypass the Rescue Disk process on Veracrypt for a few days now so that I am able to do Serval remote seasons to install and encrypted laptops and PC's.

I have tried using the command prompt to run the /n and was still unable to get by the rescue Disk process.

please advise

comments

Michael005 wrote Oct 27, 2015 at 12:40 PM

Some more information on what I am doing

I have been working with VeraCrypt for a few days and have run into two major problems.
  1. A rescue Disk is needed to encrypt the whole drive
  2. Encrypting the whole drive will ensure that all the user data is encrypted, however, when they boot their PC, it will ask them to enter the encryption password. This is not what we want.
I have tried to encrypt just the C: drive, but that counts as the system drive and therefore we are back to problem 2.

I could create a new partition on the hard drive and encrypt it, however all users desktops will not be encrypted during this process and any files in the further that are saved to the C drive or desktop would then not be encrypted

Any suggestions?

Enigma2Illusion wrote Oct 27, 2015 at 4:11 PM

Hello Michael,

Your requirement that the users will not be prompted to enter a password at bootup for system encryption is not possible with TrueCrypt or VeraCrypt.

Hence, you are going to need to use commercial encryption software to avoid the user entering a bootup password.

You can avoid burning and verifying the Rescue Disk by using one of the following command line:

"C:\Program Files\VeraCrypt\VeraCrypt Format.exe" /noisocheck
"C:\Program Files\VeraCrypt\VeraCrypt Format.exe" /n

You will still be prompted to save the ISO file. However, you will not have to burn the Rescue Disk to CD/DVD nor will you be prompted to verify the Rescue Disk.

NOTE: Each ISO file is unique to each PC even if you are using the same password.

Kind Regards.

Michael005 wrote Oct 27, 2015 at 5:34 PM

Thanks for the information we will continue looking into this as an option