Overview
On this page
Relution Windows Actions – Overview
Relution provides a wide range of remote actions to centrally manage and secure Windows devices. The following list summarizes all available device management actions that can be executed via the Relution platform:
Available Device Actions
Action | Description |
---|---|
Add Accounts | Adds new local user accounts to the device. Use case: Onboarding new users with separate local profiles. |
Deploy Office 365 | Installs Microsoft Office 365 on the device. Use case: Easy deployment of Office 365 on company devices. |
Deploy Relution Store App | Installs an app from the Relution Store on the device. Use case: Distributes company-approved apps on Windows devices. |
Enable BitLocker | Enables BitLocker on one or more drives and starts encryption. Use case: Adds protection by encrypting the drives. Additional info: A recovery password is created and saved in the device details in Relution. |
Disable BitLocker | Disables BitLocker on one or more drives. Use case: Removes protection by decrypting the specified drives. |
Execute PowerShell script | Runs a PowerShell script on the device. Use case: Automates complex configuration tasks. Note: PowerShell knowledge required. |
Locate Device | Queries the current location of the device. Use case: Helps track and recover lost or stolen devices. Note: Requires internet and location services enabled. |
Reboot Device | Restarts the device. Use case: Applies changes or resolves system issues. |
Refresh Device Information | Updates the device information stored in Relution. Use case: Keeps device info up to date. |
Remove App | Uninstalls a selected app from the device. Use case: Removes unwanted or outdated apps. |
Reset password | Resets the device user password. Use case: Support for forgotten passwords. |
Scan device | Starts a Microsoft Defender scan for malware and security threats. Use case: Ensures compliance and detects threats. Note: Microsoft Defender must be available. |
Wipe Device | Resets the device to factory settings and deletes all data. Use case: Prepares for re-use or removes compromised systems. Caution: All data will be deleted! |