Back to Resources

Level Verified

Lost or Stolen Device Automation

Created by

Level

Type

Automation

Category

Security

Platforms
WindowsApple iOSLinux

Problem Overview

Reacting to a lost or stolen device can often happen too late. This automation helps IT teams proactively plan for such scenarios, ensuring sensitive data stays protected while gathering valuable device intelligence.

Description

This automation is a cross-platform solution designed for Windows, macOS, and Linux devices. It can be triggered manually or by applying a “Lost” or “Stolen” tag to the device in Level. Upon activation, the automation gathers key intelligence such as device location, ARP tables, and other critical data points.

Once intel is collected, the automation pauses and waits for approval before proceeding to the next phase. With approval, the device initiates a secure erase process, removing as much data as possible before attempting a system restart.

Preview

Lost or Stolen Device Automation

Use Cases

  • Mitigating the risk of data breaches from lost or stolen devices.
  • Ensuring compliance with data protection regulations by securely wiping devices.
  • Proactively managing device security for a remote or distributed workforce.

Recommendations

  • Best Practices: Test this automation in a controlled environment to understand its execution fully.
  • Getting Started: Tag a test device with “Lost” or “Stolen” to see how the automation gathers intel.
  • Testing Instructions: Use non-production devices for initial testing to prevent accidental data loss.
  • Required Changes: Customize the intel-gathering scripts to align with your organization’s specific needs.

FAQ

  • What data is collected during the intel-gathering phase?
    The automation collects location information, ARP tables, and other key diagnostics to help track the device.
  • Can this automation run without manual approval?
    Approval is required before the erase phase begins to prevent accidental data loss. However, you can disable or remove that step if desired.
  • What happens if the device is offline?
    The automation will wait until the device is back online before executing the intel-gathering or erase steps.
  • How do I ensure the data erase process is compliant with regulations?
    Review the scripts included in the automation to ensure they meet your industry’s data protection standards.

Included with this Automation:

Below is a list of what you can expect to find when importing this Automation.

Script details:

The following data and settings will be imported with your script.

Triggers

  • Manual
  • Tag Applied

Actions

  • Install Windows Updates
  • Upgrade Winget Packages
  • Create Alert

Tags

  • Lost
  • Stolen
Import into Level

Related resources

Explore more automations, scripts, and policies to further enhance your IT operations.

View all resources