Deleting a Device From the Enterprise Parent topic

Deleting any Endpoint Encryption device from the Enterprise also removes the device from all policy groups. The deleted Endpoint Encryption device continues functioning as long as connectivity and password policies are current on the device. However, Endpoint Encryption users cannot recover files if the Endpoint Encryption device has a critical hardware failure after it has been removed from the Enterprise. To mitigate this risk, immediately decrypt the Endpoint Encryption device and uninstall the Endpoint Encryption agent software.
For information about removing a device from a specific policy, but not the Enterprise, see Removing a Device From a Policy.
WARNING
WARNING
Make sure to decrypt the device (files or hard disk) and uninstall the Endpoint Encryption agent before deleting a device from the Enterprise. Failure to do so may result in data loss.

Procedure

  1. Uninstall the Endpoint Encryption agent from the endpoint.
    Note
    Note
    For information about uninstalling Endpoint Encryption agents, see the Endpoint Encryption Installation and Migration Guide.
  2. Find the device.
  3. Do one of the following:
    • Right-click the device in the table and select Delete Device.
    • Select the device in the table and click Delete Device.
  4. At the warning message, click Yes to confirm.
The Endpoint Encryption device is deleted from the Enterprise.
Note
Note
For information about adding the Endpoint Encryption device back the Enterprise, see Restoring a Deleted Device.