Overview of Wolf Protect and Trace and Wolf Protect and Trace with Wolf Connect

Prev Next
This content is currently unavailable in German. You are viewing the default (English) version.

Below are tables containing links to key Knowledge Base articles you should reference as you deploy and use Protect & Trace and Protect & Trace with Wolf Connect.

If you are unfamiliar with these solutions, refer to the Overview section below these tables.

Before You Start

Article

Description

Protect and Trace: General Prerequisites

Explains the general prerequisites for HP Wolf Protect & Trace. It does not include prerequisites for Wolf Connect.

Protect & Trace with Wolf Connect Supported Platforms

Provides the most current view of supported platforms for Protect & Trace with Wolf Connect.

Protect & Trace and Wolf Connect System Requirements

Explains the system requirements needed to ensure PCs are compliant for Protect & Trace and Wolf Connect.

Protect & Trace: How do I check if my device has Wolf Connect?

Details how to verify whether a device is equipped with Wolf Connect.

Protect & Trace: Mobile Narrowband vs. Mobile Broadband Cellular Cards

Compares Mobile Narrowband (MNB) and Mobile Broadband (MBB) cards for Protect & Trace.

Protect & Trace: Where do I get the latest version of the software?

Provides links to the latest versions of the Registration App, Approver App, Workforce Experience Platform, and HP Insights Application.

Protect & Trace: Wolf Connect Country/Territory Support for Cellular Connectivity

Explains the countries and territories where Wolf Connect is not warranted for connectivity.

Protect & Trace: How to check you are running the Latest Version of the HP Insights Windows Application?

Provides steps to confirm whether the device is running the latest HP Insights version.

 

Enabling the Application

Article

Description

Protect & Trace: Enabling HP Wolf Protect and Trace with Wolf Connect Service

Explains how IT Admins can enable HP Wolf Protect & Trace with Wolf Connect.

Protect & Trace: Wolf Connect Service Information

Details the Wolf Connect service, including activation and service status information.

Protect & Trace: Enabling Location services

Describes how to ensure that Windows Location Services is enabled.

Protect & Trace: Disabling Archived Devices

Explains how to disable the automatic archiving of inactive devices in WXP.

Protect and Trace: Device Permission Prompt for Company PIN-Enrolled Devices

Details the Company PIN (CPIN) prompt for enrolled devices.

Protect & Trace: Domain Name Verification

Explains how IT Admins can suppress the CPIN prompt by verifying domain ownership.

Protect & Trace: Whitelisted domains

Provides information on the domains that the HP Insights clients use and needs to be whitelisted. 

Protect & Trace: Device Reboot Required state for Service Activation

Provides information on domains used by HP Insights clients that must be whitelisted.

Protect & Trace: Onboarding from a New Device with Protect & Trace with Wolf Connect Installed

Explains how an IT Admin can onboard a new PC equipped with a Wolf Connect Device and Protect & Trace with Wolf Connect (P&T/WC) included in the factory build. As this will create a separate WXP tenant, it should only be used by the initial owner and with very small deployments.

Protect & Trace: Changing Plan for Enrolled Devices

Explains how to change plans for devices enrolled in Protect & Trace.

Protect & Trace: Wolf Connect Dynamic Provisioning

Explains how Wolf Connect Dynamic Provisioning (WCDP) activates eSIM profiles dynamically.

Protect and Trace: HP Insights Executable Components

Provides details of HP Insights executables used with Protect & Trace and Protect & Trace with Wolf Connect.

 

The Approver Application

Article

Description

Protect & Trace: Where do I download the Approver App?

Provides download options for the HP Wolf Protect & Trace Approver App.

Protect & Trace: Setting Up the Approver Application

Explains how an approver with the Lost Device Admin role can install and register the Approver App.

Protect and Trace: Adding Users (Lost Device Admins) as Approvers

Details how to add users to the Lost Device Admin role so they can approve lock and erase requests.

Protect & Trace: Checking Approvers are enrolled and ready to approve

Explains how to confirm that approvers are active and able to process lock and erase requests.

Protect & Trace: Making Approvals from more than one PC

Explains how approvers can approve requests from multiple PCs using the Approver App.

 

Using Protect & Trace

Article

Description

Protect & Trace: Finding Devices

Explains how to find devices using the Workforce Experience Platform.

Protect & Trace : Locking and Unlocking a Device

Details how an IT Admin or a Lost Device Admin (LDA) role can create a lock or unlock request when a user reports a device has been lost. The article also covers the Lost Admin Admin's experience using the Approver App. 

Protect & Trace: Erasing a device

Explains what happens during the erase process for both Protect & Trace and Protect & Trace with Wolf Connect devices.

Protect & Trace: Device Location - Detailed Functionality

Details how the find functionality works.

Protect & Trace: How long does it take to issue a command?

Explains expected timeframes for key Protect & Trace commands.

Protect & Trace: Wolf Connect - Enhanced Response

Explains how Enhanced Response improves communication for Wolf Connect devices.

 

Troubleshooting and Support

Article

Description

Protect & Trace: How do I get help and contact Support?

Covers the two ways to contact HP Technical Support for Wolf Protect & Trace and Protect & Trace with Wolf Connect. 

Protect & Trace: Troubleshooting - A Few Things to Check First

Provides a checklist of items to review before troubleshooting Protect & Trace issues.

Protect & Trace: Unlocked PC Still Reporting Status as Locked

Explains why a PC may continue reporting as locked after an unlock command.

Protect & Trace: Collecting Logs for a Device

Details how to collect and export device activity logs.

Protect & Trace: HP Protect and Trace Diagnostics Tool

Explains how the diagnostics tool checks software versions and configuration.

Overview

Wolf Protect & Trace (P&T) is a security solution enables organizations to locate, lock, and protect devices in real time. With built-in telemetry and integration, it helps IT and security teams to minimize the risk of data exposure when devices are lost, stolen, or misplaced. The solution also supports compliance initiatives by ensuring sensitive data remains secure even if the device is outside corporate control.

Protect & Trace with Wolf Connect (P&T/WC) provides the same find, lock and erase functionality, but also supports cellular transport. This allows the users to perform these core functions even when the device is not on the internet, powered down or can’t boot the Operating System, (OS).

Target Audience

This article is intended for:

  • Primary audience:

    • IT administrators, Security team, and support personnel who set up and manage the platform (All roles).

    • HP Partners who manage their customers.

    • Internal developers who integrate with the platform.

  • Secondary audience: Decision-makers, such as Product Managers, Sales team, and C-suite executives.

Prerequisites

Before enabling P&T or P&T/WC, ensure the following prerequisites are met:

  • Devices must be enrolled in the HP Workforce Experience Platform (WXP) or another supported management console.

  • Wolf Protect & Trace services must be enabled and licensed for your organization.

  • Network connectivity is required for device telemetry and remote command execution.

Common Use Cases

  1. Recovery of lost or stolen devices

  • Scenario: Your organization wants to quickly locate and secure a device that has been lost or stolen.

  • Solution: Use P&T or P&T/WC to remotely locate the device, lock it, and prevent unauthorized access.

  1. Data Protection

  • Scenario: Your company wants to protect sensitive data on a compromised or high-risk device.

  • Solution: Use Wolf Protect & Trace to remotely wipe the OS and ensure information security.

  1. Compliance Enforcement

  • Scenario: Your organization wants to meet audit or regulatory requirements for secure handling of devices.

  • Solution: Use Wolf Protect & Trace to demonstrate secure management, tracking, and response actions.

  1. Incident Response

  • Scenario: Your security team wants to quickly respond to a breach involving end-user devices.

  • Solution: Use Wolf Protect & Trace to provide real-time device status and location to support investigations.

  1. Fleet Visibility

  • Scenario: Your IT department wants to maintain oversight of all devices across multiple locations.

  • Solution: Use Wolf Protect & Trace dashboards to track devices, monitor compliance, and ensure control.

FAQs

  1. What is the difference between Protect & Trace and Wolf Connect?

A screenshot of a computer  AI-generated content may be incorrect.

For addition details, refer to the following articles: