Unsolved

1 Rookie

 • 

2 Posts

66

November 16th, 2025 11:52

Pro Max 14 MC14250, from win to ubuntu

Hi,

I have several Dell-Pro-Max 14 MC14250 that came with Windows and I need to convert them to ubuntu 24.04 with disk encryption.

Is there a way I can create the system that will include the OEM repair partioion?

Is there a step by step instruction on how to configure the BIOS?

Is there a way to use the Dell ISO image to deploy the system with encryption that is hardware based?

When deploing an OEM ubuntu I get hangs and 100% CPU at times so I do want to use the Dall - Ubuntu if I can and hardware full disk encryption if possible.

Please assit if you can.

Shay

3 Apprentice

 • 

1.3K Posts

November 16th, 2025 13:42

Hi

Step 1 is to create a USB, or similar, to run live (without installing) and check that it runs all the required hardware.

Partitioning can normally be done manually, carefully laying out the required partitions, and it is possible to retain certain RE partitions for that day when IT happens.

#############

A LUKS partition on Ubuntu 24.04 is created by: making a normal Linux partition, initializing it with LUKS using cryptsetup, opening it, formatting the mapped device (ext4, btrfs, etc.), and then mounting it.

Below is a concise, command‑line oriented walkthrough for adding a new encrypted data partition (not full‑disk install) on Ubuntu 24.04.

1. Install tools and identify the device

  • Install the encryption tools if they are not already present:

    bash
    sudo apt update sudo apt install cryptsetup
  • List disks and partitions and find the target device (example uses /dev/sdb1; adjust to your actual device):

    bash
    lsblk -f

Anything you do to the chosen partition will destroy existing data, so if necessary, first create a fresh partition with fdisk/parted and give it type “Linux filesystem” or a LUKS GUID such as 8309 on GPT.

2. Initialize the partition as LUKS

  • Wipe existing filesystem signatures (optional but recommended on reused space):

    bash
    sudo wipefs -a /dev/sdb1
  • Initialize the partition as a LUKS2 container:

    bash
    sudo cryptsetup -y -v --type luks2 luksFormat /dev/sdb1
    • Type YES in uppercase when asked for confirmation, then enter a strong passphrase.

This command writes the LUKS header and keyslots to /dev/sdb1 and will irreversibly overwrite previous data.

3. Open the LUKS container and create a filesystem

  • Open (unlock) the encrypted partition and create a mapped device under /dev/mapper:

    bash
    sudo cryptsetup open /dev/sdb1 mycrypt

    After entering the passphrase, you will see /dev/mapper/mycrypt as a new block device.

  • Create a filesystem on the mapped device, for example ext4:

    bash
    sudo mkfs.ext4 /dev/mapper/mycrypt

    You can use another filesystem (e.g. mkfs.xfsmkfs.btrfsmkfs.ntfs) if desired.

4. Mount the encrypted filesystem

  • Create a mount point and mount it:

    bash
    sudo mkdir -p /mnt/secure sudo mount /dev/mapper/mycrypt /mnt/secure
  • Check that it is mounted:

    bash
    lsblk -f

You now have a working LUKS‑encrypted partition at /mnt/secure; all data written there is transparently encrypted on disk.

5. Close and re‑open the LUKS partition

  • To unmount and close the encrypted volume:

    bash
    sudo umount /mnt/secure sudo cryptsetup close mycrypt
  • To use it again later, just unlock and mount:

    bash
    sudo cryptsetup open /dev/sdb1 mycrypt sudo mount /dev/mapper/mycrypt /mnt/secure

6. Optional: make it auto‑mount at boot

On a systemd/Ubuntu 24.04 setup, you typically:

  • Add an entry to /etc/crypttab so the LUKS device is opened at boot:

    text
    mycrypt /dev/sdb1 none luks
  • Then add an /etc/fstab line for the mapped filesystem, using the UUID of /dev/mapper/mycrypt:

    bash
    sudo blkid /dev/mapper/mycrypt

    Example fstab entry:

    text
    UUID=<uuid-from-blkid> /mnt/secure ext4 defaults 0 2

At boot you will be prompted for the LUKS passphrase, and once unlocked the filesystem will mount at /mnt/secure.

####################

As what I know about Ubuntu could be typed on the back of a postage stamp...

https://ubuntu.com/community

~~~~~~~~~~~~~~

You can have multiple partitons with multiple OS's, even keeping the MS partitions.

If in doubt please ask, either here or the Ubuntu Community.

1 Rookie

 • 

2 Posts

November 17th, 2025 08:12

@anne_droid​ Thanks for the detailed and quick reply.
I'm not interested in keeping windows I was looking for instruction how to make RE partition with Ubuntu and installing Ubuntu on the disk as primary and only OS using the Secure Boot and maybe utilizing the TPM to store the encryption key for the drive.

I'm not sure my asks are even possible, I was asking if Dell provided the tools for that.

3 Apprentice

 • 

1.3K Posts

November 17th, 2025 12:03

Hi

You can, I believe I have done this,  (Substitute UBUNTU for Debian)....

HOW2 Debian Live Boot from GruB as a Recovery Method

Step 1 Find/Make/Create the space for the live ISO.

Step 2 Download and Place the ISO in that space.

Step 3 Open and Modify the GRuB boot loader.

Step 4 Run update-grub.

Step 5 Test with/without Secure Boot enabled.

There is also One File Linux to recover with (https://github.com/zhovner/OneFileLinux).

Either or Both METHODS will give a recoverable option, I believe.

Storing the encryption key I cannot help with.

I do not expect Dell would hold your hand thru the process, but the Ubuntu Community might.

No Events found!

Top