Hardware reference guide
124 GlobalProtect Administrator’s Guide
Administer Remote Devices Manage Mobile Devices
Take Action on a Lost or Stolen Device
If an end user reports that a managed device has been lost or stolen, you should take immediate action to ensure
that the data on the device is not compromised. Select the device on the
Devices tab and then take one or more
of the following actions as appropriate to the situation:
Step 2 Select an action. Click one of the buttons at the bottom of the screen to perform the
corresponding action on the selected device(s). For example:
• To send a message to the end users who own the selected
device(s), click , enter the
Message Body, and then click
OK.
• To request a device check-in, for example on filtered list of devices
that have not checked in within the last day
(last-checkin-time
leq '2013/09/09')
, select the devices and then click to
send a push notification to the devices requesting that they check
in with the Mobile Security Manager.
• To remotely unlock a mobile device (for example, if the end user
has forgotten the passcode), select the device and then click
. The device will unlock and the user will be prompted to
set a new passcode.
Secure a Lost or Stolen Device
• Lock the device. As soon as a user reports that a device is lost or stolen, you should
lock it to ensure that the data on the device cannot be accessed if it
is in the wrong hands. Select the device and then click to
immediately lock the device. To access the apps and the data on the
device, the device user must re-enter the passcode.
• Try to locate the device. Select the device and then click to sound an alarm.
• Remove access to corporate systems. This is
known as a selective wipe.
If you believe that a device may be in the wrong hands, but the user
does not want you to wipe the personal data, you can “selectively
wipe the device” by creating a deployment policy that returns an
empty profile to the device and then click . When the new
“empty” policy is pushed to the device, all profiles that enabled
access to your corporate systems will be removed, including any data
that was associated with those applications. See Define Deployment
Policies for best practices and instructions for creating profiles.
• Erase all device data. This is known as a wipe
because it removes all device data, not just access
to corporate systems.
To protect both the corporate data on the device and the end user’s
personal data, the end user may request that you wipe all data on the
device. To do this, select the device and then click .
Perform an Action on a Remote Device (Continued)