EN

Ireland (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

United Kingdom (EN)

United States (EN)

EN

Ireland (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

United Kingdom (EN)

United States (EN)

How to lock or wipe a lost laptop remotely using Rippling IT

Profile picture of Michael Hendricks.
Graphic illustration of a laptop with the Rippling logo on its screen and a checkmark

What you'll learn

  • How to respond when a company laptop is lost or stolen using Rippling Device Management

  • How Rippling uses the Rippling Agent and MDM to send remote lock and wipe commands

What you'll need

  • Rippling IT with Device Management

  • Company computers that are enrolled in Rippling Device Management, have the Rippling Agent installed, and can connect to the internet

The problem

Lost or stolen laptops create immediate security risk. Sensitive data may still be stored locally, browsers may be logged in, and company accounts may remain active. Without centralized device management, IT teams depend on manual checks, slow response times, and inconsistent processes.

Traditional MDM tools often make remote wipe or lock difficult to use. Some require a device to be on a corporate network. Others provide little visibility into whether the command was received.

The hypothesis

If you can easily lock or wipe lost laptops using Rippling IT, they’ll have a consistent and reliable way to secure data on missing machines.

The solution

1. Archive the stolen device in the Devices tab

When a laptop is reported stolen, you can locate it in the Devices tab and archive it. Archiving removes it from active use and prompts Rippling to ask you whether the device was stolen so the correct security steps can be applied.

2. Choose how to handle data on the stolen device

After marking the device as stolen, Rippling provides several options for securing the data. You can:

  • Leave the device as is. This will make no changes to the device.

  • Lock user accounts. This will lock the user accounts on the device so that only the Rippling admin account can log in. No other changes will be made to the device.

  • Lock device. This will lock the device and require a recovery PIN in order to unlock it. This is only available for macOS devices.

  • Soft wipe. This will remove the existing user accounts and data. The Rippling admin account will be left in place.

Full wipe. This will remove data on the device, including user accounts, files, and the operating system, and restore the factory settings.

3. Confirm and finalize the security action

Before finishing the archive, Rippling asks IT to review and confirm their choices since some actions permanently delete data. Once confirmed, the command is queued and will complete as soon as the device connects to the internet.

The impact

IT can lock or wipe lost or stolen company machines

Soft wipe, full wipe, and lock options provide different levels of protection for different situations

By managing company computers with Rippling Device Management, IT teams get a consistent process to secure company data when a laptop goes missing, instead of relying on ad hoc steps and manual follow-up.

FAQs

Rippling IT is a unified platform that gives businesses of all sizes—especially those with small or no dedicated IT teams—enterprise-grade tools to manage identity, devices, and inventory. It automates onboarding and offboarding, enforces security policies like MFA and encryption, tracks every device and app, and integrates with 600+ third-party systems. With Rippling IT, one person can manage devices, access, compliance, and audits across a distributed workforce, without complex configurations or costly IT headcount. Whether you're replacing spreadsheets, Jamf, Okta, or your MSP, Rippling IT simplifies your stack, scales with your growth, and keeps your data safe by default.

Yes. The ability to mark a device as stolen and lock or wipe it is only available if you subscribe to Rippling Device Management.

Yes. For any Rippling command to complete, the computer must have the Rippling Agent installed and be connected to the internet. You can review the Agent status in the Devices tab to see when the computer last connected.

Schedule a demo with Rippling IT today
See Rippling IT

Disclaimer

Rippling and its affiliates do not provide tax, accounting, or legal advice. This material has been prepared for informational purposes only, and is not intended to provide, and should not be relied on for tax, legal, or accounting advice. You should consult your own tax, legal, and accounting advisors before engaging in any related activities or transactions.

Hubs

Author

Profile picture of Michael Hendricks.

Michael Hendricks

Head of IT Content

Michael Hendricks is an award-winning writer and editor with over a decade of experience shaping compelling narratives across newsrooms, non-profits, and digital media organisations. With a background that bridges journalism and strategic communications, he brings a keen editorial eye and a sharp understanding of how to translate complex information into stories that connect. Michael currently leads content for Rippling IT, where he manages editorial strategy and content. Previously, he’s worked with outlets such as CNN and Search Party, where he produced and edited stories ranging from geopolitics and public policy to global markets and the business of sports with nuance and care.

Explore more

Graphic illustration of a laptop with an exclamation point alert hovering in front of its screen

How IT teams automatically alert employees when their device shows high RAM usage using Rippling IT

Learn how IT teams use Rippling Device Management and Workflow Studio to detect high RAM usage and automatically alert employees before performance issues occur.

Graphic illustration of a laptop and mobile device, both with the Rippling logo on the screen

How IT teams monitor device health from a single dashboard using Rippling IT

Learn how IT teams monitor device health, security, and compliance from a single dashboard using Rippling IT, with reports and automated workflows.

Graphic illustration of a laptop with an exclamation point alert hovering in front of its screen

How lean IT teams alert admins automatically when 10 or more threats are detected on a device in 24 hours with Rippling IT

Learn how lean IT teams use Rippling IT, SentinelOne, and Workflow Studio to automatically alert admins when devices hit 10+ threats in 24 hours.

Graphic illustration of a laptop with an exclamation point alert hovering in front of its screen

How IT teams automatically alert employees and IT admins when a device battery needs to be replaced using Rippling IT

Learn how IT teams use Rippling IT to automatically alert employees and admins when laptop batteries need replacement using real-time device data.

[Blog - Hero Image] New device

How to automatically alert managers when a device has not connected to Rippling for 3 days with Rippling IT

Learn how IT teams use Rippling IT to automatically alert managers when laptops haven’t connected in 3 days using MDM status and workflows.

[Blog - Hero Image] New device

How IT teams track every laptop without spreadsheets using Rippling IT

See how IT teams track every laptop automatically using Rippling IT — no spreadsheets required. Get real-time visibility into devices, security, and inventory.

Laptop and cellphone with Rippling logo on them both.

How IT teams automate laptop returns with prepaid shipping kits using Rippling IT

See how IT teams automate laptop returns for remote employees using prepaid shipping kits, inventory tracking, and offboarding workflows in Rippling IT.

Blog Hero - Password

How IT teams set up role-based software installation with Rippling IT

Discover how to deploy and remove software automatically based on role, department, and device attributes using Rippling IT and Supergroups.

See Rippling in action

Increase savings, automate busy work, and make better decisions by managing HR, IT, and Finance in one place.