Endpoint Encryption Device Remote Actions Parent topic

The following table explains the remote actions that PolicyServer can send to the Endpoint Encryption device.

Endpoint Encryption Device Security

Device Action
Description
Software Token
Generating a software token creates a unique string that you can use to unlock Endpoint Encryption devices and to remotely help Endpoint Encryption users reset forgotten passwords.
Recovery Key
Generating a recovery key allows the user to decrypt a hard disk when the user has forgotten the original password or key. The recovery key is only available to Encryption Management for Apple FileVault and Encryption Management for Microsoft BitLocker agents because they do not use the other recovery methods available in Full Disk Encryption.
Kill device
Initiating a kill command deletes all Endpoint Encryption device data. The deleted data is different depending on the scope of data that the associated Endpoint Encryption agent manages. For example, initiating a kill command to a Full Disk Encryption device deletes all data from the endpoint, while initiating a kill command to a File Encryption device deletes all files and folders in local or removable storage protected by the File Encryption agent. The kill command is issued when the Endpoint Encryption agent communicates with PolicyServer.
Lock device
Initiating a lock command to the Endpoint Encryption device prevents Endpoint Encryption user access until after performing a successful Remote Help authentication. Locking a device reboots the endpoint and forces it into a state that requires Remote Help. The lock command is issued when the Endpoint Encryption agent communicates with PolicyServer.
Soft reset
Initiating a soft reset command reboots the endpoint. The command issues the next time that the agent communicates with PolicyServer.