This article describes the new PGP Remote Disable & Destroy (RDD) feature available in PGP Desktop 10.1. The PGP Remote Disable & Destroy feature is available in PGP Universal Server managed environments.
PGP Remote Disable & Destroy uses Intel® Anti-Theft Technology to address the need to keep data secure in mobile environments, and comply with increasingly stringent regulations in data security and privacy.
If a laptop is lost or stolen, a PGP Universal Server administrator can remotely disable your laptop, and/or disable access to data.
When PGP RDD is activated on your laptop, the PGP RDD service periodically pings the PGP Universal Server to indicate that the system is online and connected. This is known as a rendezvous. If your system does not rendezvous with the PGP Universal Server at the appointed time, your system may be flagged as stolen.
It is important to let your administrator know if you plan to go on vacation or traveling out of the country or without network access, so that your system is not flagged as lost or stolen. Your administrator may put your system into a group where the rendezvous timer policy is set for a longer period of time. You may need to perform recovery actions on your system if the theft policy is triggered due to you not having connected to your corporate network period of time specified in the policy.
Note: If your system has been flagged as lost or stolen, you will need to perform one or more recovery tasks to gain access to the system. To recover your system, you must contact your administrator and request both the recovery passphrase as well as the Whole Disk Recovery Token.
Encrypting and Decrypting Your Disk
If your administrator has enabled PGP RDD, when you install PGP WDE, disk encryption will begin automatically. The activation of PGP RDD is completed transparently, you will not be able to decrypt your disk while PGP RDD is activated.
If Your Laptop is Lost or Stolen
If your laptop is lost or stolen, contact your IT administrator immediately. Your PGP Universal Server administrator will determine the course of action and mark your system as stolen.
Imported Document ID: TECH150009
Subscribing will provide email updates when this Article is updated. Login is required.
Thanks for your feedback. Let us know if you have additional comments below. (requires login)
Subscribed to the Article.
Unable to subscribe
Thanks for your additional feedback !!!
Enterprise Support Virtual Agent
Rate Me :
Tell us more:
Welcome! My name is Sami, the Enterprise Support Virtual Agent answering technical support questions.