Electric IT Hub | Device Actions: Wipe, Lock, Unlock
Introduction
Electric's device management brings enterprise-grade security features right to your fingertips from the IT Hub. Whether you need to lock a device remotely, access recovery keys, or perform secure wipes, these capabilities ensure your organization's data stays protected.
Accessing Device Actions
Navigate to the Device Management Table
https://my.electric.ai/device-management
Locate the device you need to perform an action on
Click on that device name or use the actions column to edit the device
On the top right hand side of the screen, there will be a button with a dropdown called Actions
Select the device action relevant to your need. The options should be:
Edit Asset
Wipe device
Lock device
Remove Electric App & MDM
Reveal recovery key
Archive
After selecting the action, a specific modal will appear to walk you the steps required to complete the selected process.
Some processes will require an extra verification – such as entering the serial number – to complete as it is a destructive action.
Devices must be enrolled in the MDM and connected to the internet to have an action performed and completed remotely!
If a device is disconnected during a device action, a corrupted state may be possible.
Device Actions
Locking
Mac Device Lock
Macs will be locked, and require a pin to be unlocked.
To unlock, please click the Unlock device button. This will appear in the top right next to the Actions button.
The recovery pin will be revealed.
Windows Device Locking with BitLocker
BitLocker Lock: For devices with BitLocker encryption, Electric will execute a secure BitLocker lock. The recovery key will automatically display in a modal for copying.
When a BitLocker lock is executed, the recovery key automatically appears in a convenient modal for immediate access.
To unlock later, please select “Reveal recovery key” from the Actions button
Fallback Protection: Devices without BitLocker (such as Windows Home) will continue to use the standard screen lock method. This will simply lock the screen.
Wiping
Mac Device Wipe
Mac wipes use a “Erase Device” command to the specified device.
It remotely wipes the Mac, restoring it to factory settings (removing user data, apps, and configurations), similar to doing an erase from Find My Mac or Apple Business Manager.
Windows Device Wipe Options
There are two different options for Windows wipes. These will be reviewed in the modal before submitting.
Standard Wipe
Best for: Routine device resets, employee transitions, basic security needs
Performs a standard Windows reset that does not wipe the operating system.
Protected Wipe
Best for: High-security environments, sensitive data protection, compliance requirements
Provides comprehensive data protection during the wipe process and requires a complete re-installation of the operating system via a recovery usb or os re-install.
Situation-Specific Control: Choose the appropriate level of data protection based on your specific security requirements
Accessing Recovery Keys
Both the BitLocker key and Firevault key should be visible from the Device Actions. The key will automatically reveal the relevant key for the operating system.
From the Asset (Device) Profile
Navigate to the device's detail page
Look for the recovery key information in the device details section
Click to view or copy the recovery key as needed
When to Use Recovery Keys
Device won't boot properly
Recovery screen appears
Need to decrypt the device for maintenance or transfer
Device Action Documentation
All device actions will be logged in the Asset (Device) Profile log with date and time.
This includes the email or name of the admin user who began the process of the device action such as wipe or lock.
It can be navigated to and viewed on the third tab under the information box.
Best Practices
BitLocker Management- Ensure BitLocker is enabled on devices that handle sensitive data to take full advantage of the enhanced locking capabilities by upgrading devices which might be on Home editions of windows.
Recovery Key Security- Treat recovery keys as sensitive data. Only share them with authorized users and through secure channels.