Removing Devices with Disk Encryption Manager from the All Devices view

You may need to delete devices from your All Devices view based on customer requirements. Use caution when removing encrypted devices because deleted devices remain encrypted by default.

If you need to decrypt a device, follow the instructions in Removing Disk Encryption Manager with or without Decrypting Devices before deleting it.

For instructions, see Delete devices, sites or clients from N-sight RMM.

Important considerations

  • If you close your N-sight RMM account (trial or full), you must rely on the Recovery Key Report. Generate and save this report securely before closing your account. We do not store recovery keys after account closure.
  • If you delete devices from N-sight RMM, the last known recovery key remains in the Recovery Key Report for 90 days only.
  • If you remove Disk Encryption Manager but keep the device in N-sight RMM, you can still access the Recovery Key Report. This report includes the last known recovery key before the device returned control to the end user. The end user may have re-encrypted the device, which changes the recovery key.
  • Recommendation: Run the Recovery Key Report and store it in a secure location before performing any other actions. Otherwise, you will not be able to access recovery keys from N-sight RMM or Technical Support.