Skip to main content
Skip table of contents

Electric IT Hub | Device Actions: Wipe, Lock, Unlock

Introduction

Electric's device management brings enterprise-grade security features right to your fingertips from the IT Hub. Whether you need to lock a device remotely, access recovery keys, or perform secure wipes, these capabilities ensure your organization's data stays protected.

Accessing Device Actions

  1. Navigate to the Device Management Table https://my.electric.ai/device-management

  2. Locate the device you need to perform an action on

  3. Click on that device name or use the actions column to edit the device

  4. On the top right hand side of the screen, there will be a button with a dropdown called Actions

  5. Select the device action relevant to your need. The options should be:

    1. Edit Asset

    2. Wipe device

    3. Lock device

    4. Remove Electric App & MDM

    5. Reveal recovery key

    6. Archive

  6. After selecting the action, a specific modal will appear to walk you the steps required to complete the selected process.

  7. Some processes will require an extra verification – such as entering the serial number – to complete as it is a destructive action.

Devices must be enrolled in the MDM and connected to the internet to have an action performed and completed remotely!

If a device is disconnected during a device action, a corrupted state may be possible.

Device Actions

Locking

Mac Device Lock

  • Macs will be locked, and require a pin to be unlocked.

  • To unlock, please click the Unlock device button. This will appear in the top right next to the Actions button.

    • The recovery pin will be revealed.

Windows Device Locking with BitLocker

  • BitLocker Lock: For devices with BitLocker encryption, Electric will execute a secure BitLocker lock. The recovery key will automatically display in a modal for copying.

  • When a BitLocker lock is executed, the recovery key automatically appears in a convenient modal for immediate access.

  • To unlock later, please select “Reveal recovery key” from the Actions button

  • Fallback Protection: Devices without BitLocker (such as Windows Home) will continue to use the standard screen lock method. This will simply lock the screen.

Wiping

Mac Device Wipe

  • Mac wipes use a “Erase Device” command to the specified device.

  • It remotely wipes the Mac, restoring it to factory settings (removing user data, apps, and configurations), similar to doing an erase from Find My Mac or Apple Business Manager.

Windows Device Wipe Options

There are two different options for Windows wipes. These will be reviewed in the modal before submitting.

  • Standard Wipe

    • Best for: Routine device resets, employee transitions, basic security needs

    • Performs a standard Windows reset that does not wipe the operating system.

  • Protected Wipe

    • Best for: High-security environments, sensitive data protection, compliance requirements

    • Provides comprehensive data protection during the wipe process and requires a complete re-installation of the operating system via a recovery usb or os re-install.

  • Situation-Specific Control: Choose the appropriate level of data protection based on your specific security requirements

Accessing Recovery Keys

Both the BitLocker key and Firevault key should be visible from the Device Actions. The key will automatically reveal the relevant key for the operating system.

  1. From the Asset (Device) Profile

    • Navigate to the device's detail page

    • Look for the recovery key information in the device details section

    • Click to view or copy the recovery key as needed

  2. When to Use Recovery Keys

    • Device won't boot properly

    • Recovery screen appears

    • Need to decrypt the device for maintenance or transfer

Device Action Documentation

  • All device actions will be logged in the Asset (Device) Profile log with date and time.

  • This includes the email or name of the admin user who began the process of the device action such as wipe or lock.

  • It can be navigated to and viewed on the third tab under the information box.

Best Practices

  • BitLocker Management- Ensure BitLocker is enabled on devices that handle sensitive data to take full advantage of the enhanced locking capabilities by upgrading devices which might be on Home editions of windows.

  • Recovery Key Security- Treat recovery keys as sensitive data. Only share them with authorized users and through secure channels.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.