Weneed confirmation that a MacBook has been successfully wiped remotely and kindly ask for your advice on this matter. I found the Audit Logs of a MacBook, which has an entry like "Issued Wipe Computer Command." This is just a confirmation that a wipe command has been sent, but not confirmation that the machine has actually been wiped, am I correct?
MDM commands, including DeviceWipe, are both sent and acknowledged*, which you can see in the logs. If it is acknowledged, the next thing the device does is start the wipe, meaning it will never offer any further reports under that enrollment, so you can never get a "Device is wiped" report, but you can be confident the acknowledgement means that.
You could also use File flags and Smart Groups. Once your device is selected for wiping copy or create a file on the device and have a smart group that searches for that file, you could also use email notification to get notified when devices are moved into or out of group membership if you needed that kind of notification.
Yes, you're correct. The entry "Issued Wipe Computer Command" in the Audit Logs confirms that the wipe command has been sent to the MacBook. However, it doesn't confirm the completion of the wipe process. To ensure the wipe's success, you might want to check for subsequent logs indicating the completion of the wipe or any error messages. Additionally, if it's a managed device, your mobile device management (MDM) platform might provide more detailed information on the status of the wipe.
I will discuss with him whether we could document it differently. All colleagues are working from home, far away from the office. That's why we use Jamf Pro, allowing me to remotely manage the MacBooks.
Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Learn about Jamf.
This site contains User Content submitted by Jamf Nation community members. Jamf does not review User Content submitted by members or other third parties before it is posted. All content on Jamf Nation is for informational purposes only. Information and posts may be out of date when you view them. Jamf is not responsible for, nor assumes any liability for any User Content or other third-party content appearing on Jamf Nation.
With Sani-HyPerCide Germicidal Disposable Wipe, you have the power to protect your patients, equipment, and healthcare environment. Sani-HyPerCide disinfectant is a powerful, ready-to-use hydrogen peroxide formula designed to address HAI-causing microorganisms, including Clostridioides difficile without compromising compatibility. Now effective against SARS-CoV-2, the virus that causes COVID-19.
Sani-HyPerCide Germicidal Disposable wipe has demonstrated effectiveness against viruses similar to Monkeypox virus on hard, nonporous surfaces. Therefore, Sani-HyPerCide Germicidal Disposable Wipe can be used against Monkeypox virus when used in accordance with the directions for use against Adenovirus Type 5, Strain Adenoid 75 (ATCC VR-5) on hard, nonporous surfaces. Refer to the CDC website for additional information.
Sani-HyPerCide Germicidal Disposable wipe has demonstrated effectiveness against viruses similar to Monkeypox virus on hard, nonporous surfaces. Therefore, Sani-HyPerCide Germicidal Disposable Wipe can be used against Monkeypox virus when used in accordance with the directions for use against Adenovirus Type 5, Strain Adenoid 75 (ATCC VR-5) on hard, nonporous surfaces. Refer to the CDC website for additional information.
For all PDI products, according to the label instruction, the use of gloves or other PPE is not required to handle the product, particularly in non-clinical settings. Therefore, the routine use of PPE is not required unless potentially infectious blood or bodily fluids are present. If bloodborne pathogens are present, such as HIV, HBV, and HCV, follow label instructions. You should, however, wear PPE as appropriate in accordance with your facility protocol. Also, in compliance with good industrial and health hygiene, you should wear gloves when cleaning and disinfecting in a patient setting.
Eye wash stations are not required for areas where Germicidal Disposable Wipes and Germicidal Sprays are utilized as intended for surface disinfection. Although these products are classified as eye irritants, there is no OSHA or ANSI regulation that requires an eye wash station for eye irritants and therefore one not needed for these products. Handling of any chemical product, whether category 1, 2, 3, or 4, include using PPE when required, engineering controls if appropriate, and safe work practice controls to minimize any risk of exposure
You can wipe local device and user data for troubleshooting, data removal, or other reasons. If the device is enrolled in your organization, you can remotely wipe device data. If not, you can manually wipe local data. For details, see Manually wipe a ChromeOS device.
Note: To manage a ChromeOS device in your organization, it must be enrolled before any user signs in to it (including you as the administrator). If a user signs in before the device is enrolled, your Google Workspace account policies and preferences will not apply, and the device must be wiped to restart enrollment and manage the device in your organization.
By using the Retire or Wipe actions, you can remove devices from Intune that are no longer needed, being repurposed, or missing. Users can also issue a remote command from the Intune Company Portal to devices that are enrolled in Intune.
The Wipe device action restores a device to its factory default settings. The user data is kept if you choose the Retain enrollment state and user account checkbox. Otherwise, all data, apps, and settings are removed.
By design, Zebra has defined the Wipe action on any Android Zebra device to only remove corporate data from devices, and not perform a factory reset.To perform factory reset on a Zebra Android device, you can use either of these methods:
A wipe is useful for resetting a device before you give the device to a new user, or when the device has been lost or stolen. Be careful about selecting Wipe. Data on the device can't be recovered. The method that "Wipe" uses to remove data is simple file deletion, and the drive is BitLocker decrypted as part of this process.
For Windows 10 version 1709 or later, you also have the Wipe device, but keep enrollment state and associated user account option. If this option is selected, the following user account details are retained:
The Wipe device, and continue to wipe even if device loses power option makes sure that the wipe action can't be circumvented by turning off the device. This option keeps trying to reset the device until successful. In some configurations, this action may leave the device unable to reboot.
For iOS/iPadOS eSIM devices, the cellular data plan is preserved by default when you wipe a device. If you want to remove the data plan from the device when you wipe the device, select the Also remove the devices data plan... option.
The Retire action removes managed app data (where applicable), settings, and email profiles that were assigned by using Intune. The device is removed from Intune management. Removal happens the next time the device checks in and receives the remote Retire action. The device still shows up in Intune until the device checks in. If you want to remove stale devices immediately, use the Delete action instead.
Users that reinstall the Outlook Mobile app following a Retire device action may need to choose to Delete All Saved Contacts before re-exporting contacts to avoid duplicate contact entries. Previously exported contacts from Outlook Mobile are considered personal data and are not removed by the Retire device action.
Microsoft Intune is ending support for Android device administrator management on devices with access to Google Mobile Services (GMS) on December 31, 2024. After that date, device enrollment, technical support, bug fixes, and security fixes will be unavailable. If you currently use device administrator management, we recommend switching to another Android management option in Intune before support ends. For more information, see Ending support for Android device administrator on GMS devices.
Windows devices that are not registered in the Windows Autopilot Service, upon being deleted or retired from Intune are removed from Microsoft Entra ID. Before performing these commands consider backing up the Bitlocker Recovery Key and/or a local administrator user account credentials. On the other hand, although Autopilot registered devices leave Microsoft Entra ID, their computer object is retained alongside their properties (e.g. Windows LAPS, Bitlocker Recovery Key, Entra ID groups memberships).
For Windows 10 devices that join Microsoft Entra ID during initial Setup (OOBE), the retire command will remove all Microsoft Entra accounts from the device. Follow the steps at Start your PC in Safe mode to login as a local admin and regain access to the user's local data.
When a Windows device user un-enrolls their device via the Settings app, Intune does not automatically delete the Intune device or Microsoft Entra ID records. To remove record of the Intune device, sign in to Microsoft Intune and delete the device manually, or wait for your device cleanup rules to take effect. You must also manually delete the Microsoft Entra ID record, if applicable, because the cleanups rule will not remove it.
3a8082e126