alepetpan 1 Posted March 26 Share Posted March 26 Hello everyone, I'm reaching out to inquire about the potential for remote wiping Windows devices using ESET products. Are there any features within ESET's solutions that facilitate remote wiping for Windows devices? Additionally, I'm interested in learning about any best practices recommended by ESET or the community for implementing remote wiping effectively. Any insights or recommendations would be greatly appreciated. Thank you, Alexandros Link to comment Share on other sites More sharing options...
santoso 7 Posted March 26 Share Posted March 26 Hi, I think Eset doesn't have that kind of product Maybe you can try use Eset Enddpoint Encryption with full disk encryption enable. It's not wiping but lock disk with encryption. Just delete user from console, so user cannot use existing password for login. I haven't tried it, but it seems possible CMIIW. Link to comment Share on other sites More sharing options...
Administrators Marcos 5,399 Posted March 26 Administrators Share Posted March 26 Perhaps it could be possible to run a disk wiper tool remotely via the Run command task providing that it's located in a folder shared for other machines in the network. However, if you mean a complete disk wipe and not just rewriting unused space with zeroes, it won't be possible as long as the OS is running and you'd need to take the machine offline and run a disk wiper after booting from another medium I assume. Link to comment Share on other sites More sharing options...
santoso 7 Posted April 3 Share Posted April 3 We try lock device from Eset Protect connsole with Eset Fulldisk Encryption enable. Block FDE login password. And now this laptop cannot boot AAndrejko 1 Link to comment Share on other sites More sharing options...
ESET Staff AAndrejko 12 Posted April 3 ESET Staff Share Posted April 3 I believe @santoso has the best recommendation for this. Once the command has been processed by the workstation, the device will instantly bluescreen and nobody will be able to login to the workstation. All the data will be encrypted too so zero chance of anyone accessing it without recovery data. Link to comment Share on other sites More sharing options...
Recommended Posts