How to optimize Prey for device tracking | Prey Project
Mục lục bài viết
Why choose Prey as your Device-Tracking Tool
Prey is a subscription-based device security service that offers location tracking, data protection, and multi-platform device management. It can be used as a standalone app or with other endpoint security solutions.
Prey also offers a tailored solution for Managed Service Providers to manage multiple clients with separate dashboards and policies. It excels in environments that require dedicated device location tools, such as compliance with NIST 800-53, or when endpoint management solutions lack location services.
Prey is a more affordable option with leading location tracking and management capabilities for small or large inventories.
To start using Prey to its fullest potential, here’s a list of things you may do to get started:
- OPTIONAL: Are you using or trying Prey for MSP? To start, you must create a client to host your Prey Panel. Only when a client is created and slots are assigned can you enter the Panel for that specific client? If you are using one of our enterprise plans, skip this step.
- Have you added devices to your account? Starting from one device, you can try everything, but Prey excels at large fleets. Don’t have time to install them all manually? Use our unattended installation process, or install us through an MDM.
- Note: Prey uses Wifi and mobile networks to connect to devices. Make sure your Wifi adaptors are turned on in every device to start receiving instructions.
- Have you used labels? Using custom and template labels on your devices may help you group them up in the future. Our newest feature lets you create groups with their permissions.
- Have you tested your setup? Try some basic commands on devices you have at hand. Actions like triggering a message or alarm on the device will work to make sure the connection between your Panel and the device is a-ok.
- Did you make sure your connections are secure? Prey collects a lot of information about your devices, so it’s essential to protect your —and your client’s— privacy. Ensure you activate MFA to access your Panel and have strong passwords for every login in the chain.