Device States - If a device is stolen, how and where to tag the device as stolen?
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series.
In this KB article, We will explain the procedure to set the device state as "Stolen" on WeGuard Enterprise Portal.
Notice a prompt asking to put in some notes for future reference. The notes added while tagging will be shown under "Notes" tab in Device details > Notes
Clicking on "Ok" button will tag the device as stolen.
If GPS is ON on the device, location will be captured as well. Else case, last known location will be shown. This helps in tracking the device.
In the devices page, only active devices are shown by default. Devices tagged as stolen can be viewed by selecting "Stolen" from the filter.
Depicting device state filter:
Depicting selection of "Stolen" state:
We hope this article was useful. Thank you for reading.
If you need any help on this, do call up WeGuard Support +1 833-936-2253 or contact WeGuard Support Email
Related Articles
Device states - Device states in WeGuard
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain the device states available in WeGuard. Overall, below are the states available as of today. Enrolled : Devices that are activated to the policy ...
Device States - How to tag as device as "Replaced" device?
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain the procedure to set the device state as "Replaced" on WeGuard Enterprise Portal. Login to WeGuard console The landing page would show list of ...
Device States - How to tag as device as "Lost" device?
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain the procedure to set the device state as "Lost" on WeGuard Enterprise Portal. Login to WeGuard console From the left menu, click on ‘Devices’ ...
Device Security Features - What is Device Hardening?
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain how to harden your device for security measures. We will discuss the process of securing a device by reducing its surface of vulnerability. ...
Device Security Features - How to prevent keyboard hijacking by whitelisting 3rd party keyboards?
Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain the procedure of whitelisting 3rd party keyboards. Have you ever heard data breach can also happen through the keyboard? Allowing the workforce ...