Remotely secure devices and manage access

What is Remote Lock?

Remote Lock enables administrators to remotely lock a device or system. Remote lock features are often part of security systems that address data breach risks introduced by “bring your own device” (BYOD) policies or security gaps in distributed companies. Remote Lock can consist of forcing a reboot, logging out current user sessions, or placing a firmware lock on the device. When a remote lock command is executed, the lock command is triggered from a remote system endpoint or control panel.

DriveStrike Remote Lock

End Session

Forced logout requires users to re-enter the existing passcode to open their device.

DriveStrike Remote Lock

Change Passcode

Force a logout and change the credentials required for users to log back in on some operating systems.

Windows Encryption

Turn Keys + Lock to prevent access to Windows machines with BitLocker enabled.

DriveStrike Remote Lock

Remote Reboot

Remotely reboot a computer to trigger updates and force users to re-enter their credentials.

Start Your Free 30 Day Trial

Each day brings new device security challenges, so your organization needs simple and wide-reaching solutions to combat those challenges. DriveStrike is here to help you protect your most critical data with premium quality endpoint security. Start a free trial with DriveStrike today, and contact us if you need any assistance. Our team is always ready to answer your questions.

DriveStrike Explains Remote Lock

Device lock is extremely useful when a device or system is being hijacked or an unauthorized access occurs. DriveStrike allows device administrators to easily initiate a device lock within the admin center. So let’s review the various types of Remote Lock in more detail, starting with the least aggressive form and working our way up to the most aggressive:
Account Disablement – When a Remote Lock is executed for Windows and Linux devices, all sessions on the device are logged out, the device is rebooted, access to existing accounts is blocked and anyone with physical access must await a Remote Unlock before being able to use established credentials to log back in to the device.
Forced-Logout – When forced-logout is executed, all sessions on the device are logged out and anyone with physical access is required to use established credentials to log back in to the device.
Forced-Reboot – Forcing a reboot is a heavier-handed approach since any work not saved may be lost. If no additional security is in place, its result compares to forced-logout where all you need is the existing credentials to regain access. However, if you have a pre-boot passcode, BIOS security setup, or whole drive encryption enabled, a forced reboot can more securely protect data on the device.
Remote Forced Passcode Reset – Resetting a passcode changes the device credentials, requiring a user to re-authenticate using the newly established credentials. This option is usually deployed when an employee is terminated or quits the company but fails to return company computing devices to preserve confidential company data while preventing access by the former insider. This approach also makes it clear to any former employee that tampering with the device is intentional and willful misconduct.
Remote Firmware Lock – An excellent feature that requires a remotely defined PIN code to unlock the hard drive. In this scenario the device cannot be started without the special PIN code and often renders the hardware itself of no value to a thief. Apple computers employ this model and it is very effective, provided FileVault drive encryption is enabled. Without it, the firmware lock cannot protect data if the drive is removed and connected as an external drive.

Lock a Device in 3 Easy Steps:

1. Log In to DriveStrike

When you log in to your account, your Dashboard will show you all the devices you manage at a glance. You can search for the device if you manage a large number of devices.

2. Click on the Device

On the Device Page, you will see information about the device, available actions, and a history of actions. You can also see a map showing the last known location of the device.

3. Click “Lock”

Depending on the type of lock available for that device, you may be prompted to create a new passcode required to log in to the device, or there will be an “Unlock” option.


Best Remote Wipe

DriveStrike – Data Breach Protection

Remotely lock devices and prevent unauthorized access to company data. Start a free trial today to find out if DriveStrike is the premium security solution your business has been looking for.


DriveStrike Remote Lock by Operating System


    DriveStrike-Windows
  • Windows – On Windows devices we recommend using remote lock when you are simply trying to ensure the device users are locked out, we do not yet offer the ability to remotely change the credentials on Windows devices. When remotely locking a Windows device DriveStrike disables all existing Windows users so if there are services being hosted on the device they will go down with the remote lock. The Windows device must be online to remotely unlock the device. If you have a pre-boot, BIOS security, or whole drive encryption deployed we suggest using our remote reboot option to generate an effective remote lock. Otherwise we suggest initiating a remote wipe for any suspected lost or stolen device.

  • DriveStrike-MacOS
  • Mac – For macOS devices, a remote lock reboots the machine with a firmware passcode you specify when requesting the remote lock in DriveStrike. The only way you can use this machine moving forward is to enter your specified passcode – even if they replace the hard drive. That said, if the existing hard drive is not encrypted the data on that drive is NOT protected from being accessed if the attacker removes the drive and connects it to another computer as an external drive. We recommend initiating a remote wipe for any suspected lost or stolen device.

  • iOS – On iPhones and iPads a remote lock will only logout the user and require that they enter the existing passcode – biometrics like fingerprints and facial recognition are not allowed until the user enters the existing passcode. We recommend initiating a remote wipe for any suspected lost or stolen iOS device.

  • DriveStrike-Linux
  • Linux – On Linux devices we recommend using remote lock when you are simply trying to ensure the device users are locked out, we do offer the ability to remotely change the credentials on Linux devices. When remotely locking a Linux device DriveStrike blocks the device from booting to a point where credentials are available so if there are services being hosted on the device they will go down with the remote lock. The Linux device must be online to remotely unlock the device. If you have a pre-boot, BIOS security, or whole drive encryption deployed we suggest using our remote reboot option to generate an effective remote lock. Otherwise we suggest initiating a remote wipe for any suspected lost or stolen device.

  • DriveStrike-Android
  • Android – On Android devices we recommend using remote lock when you are simply trying to ensure the device users are logged out, we can only offer the ability to remotely change the credentials on Android devices using API Level 23 or lower, this is not something we can control since Google is in charge of the available actions. We recommend initiating a remote wipe for any suspected lost or stolen device.
Best Remote Encryption

Related – Windows BitLocker Drive Encryption

If your Windows machines are compatible with BitLocker integration, DriveStrike can make key management, encryption, and device security even easier. Manage all your Windows devices in one place, enable encryption with one click, and persist BitLocker for enhanced protection…

Implementation

Implementing our solution is easy. DriveStrike can be installed a number of ways:

  • Email invitations to recipients and they can simply click on a link and follow instructions.
  • Use Mass Deployment software with group policies or other over-the-air push technology.
  • Install individually on devices.
  • Leverage a remote desktop solution to remotely install on each of your devices.

Once DriveStrike is installed, simply navigate from the Dashboard to the device in question and review the Device Details for the information you need. Start a free trial to begin protecting your devices, or contact us if you have any questions. We would be happy to help you get started protecting your devices with DriveStrike.

Use in the Enterprise

Remotely locking your fleet of laptops, tablets, and smartphones is critical to effective mobile device management. We are committed to help you manage device access remotely and secure your digital assets on demand. Know the location of every asset and have the power to protect them from a potential data breach immediately. You know the demands on your business. We are here to help you manage risk and prevent unauthorized access to company devices.

Use in Small Businesses

The demands on small businesses to keep track of employees’ laptops, smartphones, tablets, and other devices is growing every day. Managing device access can be difficult, especially in remote work and BYOD environments. How do you ensure data security, customer information privacy, and minimize your risk while effectively serving your customers? With DriveStrike you can track any digital asset and lock it down if it goes missing. Prevent unauthorized access and keep confidential data out of the wrong hands.

Personal Uses for Locking Laptops & Devices

Ever lose your phone or laptop? Do you need to deny access to unauthorized users while keeping the data on your devices intact? With DriveStrike, you can have peace of mind about your personal devices and confidence in the security of your data. DriveStrike’s low price makes it affordable for all households and individuals.

DriveStrike-Remote-Locate


Many business personnel prefer an alternative when dealing with lost devices, known as a Remote Wipe (data destruction), where information is wiped on the device or system and the device must have software reinstalled or setup. Using remote lock (versus a wipe), those in charge of a system do not automatically lose all of their data, but in many cases a remote wipe is more prudent to ensure data is not compromised.

Either one of these security features is extremely helpful when a mobile device is stolen, or when administrators determine that a bad actor is stealing information through a USB flash drive or other resources. Start a free trial with DriveStrike to start protecting your devices today, and contact us if you have any questions. We are here to give you confidence in your company’s device security, data protection, and privacy compliance.

 

Start Your Free 30 Day Trial

Each day brings new device security challenges, so your organization needs simple and wide-reaching solutions to combat those challenges. DriveStrike is here to help you protect your most critical data with premium quality endpoint security. Start a free trial with DriveStrike today, and contact us if you need any assistance. Our team is always ready to answer your questions.