Security actions

One of the core features of the Prey client is the ability to execute security actions from your Prey panel. You can review all the actions available for your devices in this list, or by browsing to your device view in your panel.

All security actions require an active internet connection for the client to receive the instruction. If the device you’re trying to execute an action on is currently offline, the action will be queued and executed as soon as the device comes back online.

Actions available to all plans

Set device to missing Also available with Rover

Enables missing mode, which starts collecting data from your device in an active manner, generating missing reports every 2, 5, 10 or 20 minutes. Reports include screenshots from the main screen of the device, pictures from available cameras, hardware and network information, and last, but definitely not least, the current location of your device. You can customize whether you want the reports to include screenshots and/or webcam pictures.

Screen lock Also available with Rover

iOS devices must be linked to Prey’s MDM certificate.

A persistent lock screen with a customizable password and an optional message of up to 640 characters in length. While this lock screen requires the user to log-in in order to execute, it will persist through restarts and will be executed on all users for the device.

If you link your Apple device to our MDM certificate, the Screen Lock action will be replaced by the native Apple Lock. This action requires a 6-digit PIN, which you can create when executing the action, and does not allow for a custom message to be displayed. Please note that all apps will be closed when the lock is executed.


Allows you to change the icon and general appearance of the Prey for iOS client to make it look like a game. This action is not available for Android devices.


Actions available to Prey Protection and Prey Full Suite

Custom wipe

Delete folders within your device, using one of our prepared modules or entering a specific path. Please note that, if choosing to delete a specific folder, it must be nested at least three levels deep (e.g. C:\Folder 1\Folder 2\Folder 3 in Windows, or /Folder1/Folder2/Folder3 in macOS and Ubuntu Linux).

File Retrieval

Browse your hard drive in real time to retrieve files of up to 25mb in size. Please note that the device must be turned on and with a logged-in user in order to retrieve files. Any file retrieved with this action will be stored in our servers for 5 days, after which it will be deleted.

Disk Encryption

Windows 10 and above; Professional, Education or Enterprise editions only

Remotely instruct your device to use the native BitLocker encryption service to protect your hard drive’s data, and access all of your encryption and recovery keys directly from your Prey panel.

Remote alarm Also available with Rover

Triggers a customizable alarm that will sound for 30 seconds, bypassing any device-side volume configuration.

Alert message Also available with Rover

Send a message to your device of up to 250 characters in length; this message is obvious, uses the native operating system interface, and the user needs to interact with it in order for it to go away.


Powerful and last resort actions

Careful! These are disruptive actions and cannot be undone once they start.

Kill switch

Windows 10 and above.

Renders your device unusable in minutes by destroying its Master Boot Record.

Factory Reset

Windows 10 and above with a recovery partition installed.. MacOS devices must be linked to Prey’s MDM certificate.

Restore your device to a clean slate in its original factory settings, removing all data and reinstalling the operating system. This action requires the device to be connected to a power source; otherwise, it might fail.

Was this article helpful?

0 out of 0 found this helpful