
The amount of time it takes to complete the wipe varies, depending on the disk size and speed. When the wipe has begun, it cannot be cancelled. While the wipe is pending, you can cancel it (click the Cancel Wipe icon in the device's slide-in panel or Device page). You may be able to find a quick fix you can add to a gpo that would allow the script to run successfully on the network. We have a few security GPOs in place that may have allowed this to work so well for us. The wipe is set to pending and after a short delay, the wipe begins. If you are on an AD domain, perhaps run it against a client and check the event logs and search any errors. In the devices list, click on the device that you want to wipe.As part of the "forensic wipe", Endpoint Cloud removes the encryption certificate and performs a series of additional deletions to completely remove any trace of the protected data from the device.

With a wipe, you use Endpoint Cloud to perform a remote "forensic wipe", which deletes the protected files on the device. This completely removes the protected files from the device (unlike revoke, which leaves the files in place but makes them inaccessible).

If you want to delete the files on a device that is missing or stolen, you can use the Wipe feature.
