What actions does Prey have?

Prey can be used to recover stolen property, secure your devices and files, or even to prevent computer parts from being stolen from your fleet of devices. How, exactly? Check out the features we have in store for you:


Reports: Set the device to "Missing" mode and get periodic reports showing hardware information, active and nearby networks data, location, pictures and screenshots, among other things.

Lock: Lock down your device’s screen and asks for a password you can set on your very Prey account.

Alarm: Ring an alarm so you can locate your device immediately if it’s nearby.

Alert: Prompt a customizable message on the devices' screen.

Location: Check real-time location from your Prey account as many times as you wish.

Camouflage Mode: Make your Prey icon disappear from your home screen. No one will ever know you have Prey installed. For Android and iOS only.

What extras does Prey Pro include?

File Retrieval: Download files remotely from the device you’re tracking. In the case of iOS devices, contacts & images only. (iOS 9.0 and higher)


Wipe: Delete your computer's files and folders remotely. On Android devices, you can wipe the whole SD card or factory restore them. You can enter the directory to be deleted or select one of the following modules depending on each OS:

1

Windows

  • Selecting Documents will remove the Contacts, Documents, Downloads, Desktop, Pictures, and Videos, AppData, Local, Desktop, and My Documents directories for every user.
  • Selecting Cookies will remove all data related to Chrome, Firefox, and Safari.
  • Selecting Emails will remove all data related to Outlook and Thunderbird.
  • Selecting Dropbox Google Drive and OneDrive local files will kill these processes and delete all Dropbox, Google Drive and OneDrive (Windows 10 only) files that are on the device.
2

OS X

  • Selecting Documents will remove the Documents, Downloads, Desktop, Pictures, and Videos directories for every user.
  • Selecting Passwords will remove the Library/Keychains and .ssh directories.
  • Selecting Cookies will remove all data related to Chrome, Firefox, and Safari.
  • Selecting Emails will remove all data related to Mail and Thunderbird.
  • Selecting Dropbox and Google Drive local files will kill these processes and delete all Dropbox and Google Drive files that are on the device.
3

Linux

  • Selecting Documents will remove the Documents, Downloads, Desktop, Pictures, and Videos directories for every user.
  • Selecting Passwords will remove the .gnome2/keyrings and .ssh directories.
  • Selecting Cookies will remove all data related to Chrome, Firefox, and Chromium.
  • Selecting Emails will remove all data related to local mail and Thunderbird.
  • Selecting Dropbox local files will kill this process and delete all Dropbox files that are on the device.

Mass Actions: Execute any of the above Prey actions on up to 100 devices at the same time.

Control Zones: Create multiple zones on the map where devices belong, or where they shouldn't be. After assigning devices to the zone, Prey will notify you by email anytime the device enters or leaves the zone.