Ease of Use
I was unsure about how to rate TrueCrypt for ease of use. For anyone with any experience managing systems, the rating is a 5. For those less knowledgeable, the rating is a 3. On the other hand, support personnel can configure TrueCrypt to auto-mount pre-configured volumes, including hard drives. So I settled on a 4. I'll let you decide where it falls for your organization.
To demonstrate how easy it is to configure an encrypted volume, I stepped through creating a container on a network drive and mounting it for use.
Step 1: Launch TrueCrypt and click the Create Volume button. Select the type of volume you want to encrypt, as shown in the image below. Step 2: Select volume type, standard or hidden. Step 3: Specify the folder and file to be used as an encrypted container. Although TrueCrypt refers to the container as a file, it can contain other files when mounted. Step 4: Select encryption and hash types. Step 5: Specify the size of the container. Step 6: Enter a container password. TrueCrypt presents a message recommending a longer password if the one you enter is less than 20 characters. Be sure to remember this password. If you forget it, any files you place into the container will be inaccessible. Step 7: Format the container. This is the final step in the volume creation process. Once the container/volume is created, it must be mounted. Manually mounting the container we created is easy. From the TrueCrypt window, select or enter the name of the container file to be mounted. Then click the Mount button. TrueCrypt prompts for the container password, as shown below, and the container is mounted as a system drive. When I mounted the test container, I accepted TrueCrypt's recommendation of N:. The following image shows how the mounted container appears in Windows Explorer. Any files written to this drive will be encrypted, accessible only when mounted with the assigned password. If you want volumes to mount automatically, this can be done either via a button in the TrueCrypt window or via a script. The following are command line strings, saved in a .BAT file, to mount a TrueCrypt encrypted flash drive as drive G. The first line mounts the flash drive and the second line mounts a container nested in the mounted drive. As I wrote at the beginning of thiis review, this is pretty simple for the initiated. However, normal users might have some rough spots to overcome.