HP Wolf Protect and Trace
Find, Lock, and Erase for your HP PCs made easy
DELIVERING VALUE IN THREE KEY AREAS
▲ Risk Management
- Protect Data
- Reduce PC losses
⚙ IT Operations
- Cost-effective fleet management
- Reduce tickets and PC remediations
★ User Experience
- Quickly locate lost PC
- Reduce stress and anxiety
Solution Overview
Today's hybrid work world has made managing and securing a fleet of PCs harder than ever. HP Protect and Trace¹ helps IT to manage and protect remote PCs, at low acquisition and operational cost. The solution helps organizations improve asset management, gain tighter control of their data, and improve user experience.
How it works
HP Protect and Trace uses a persistent Windows agent and Internet connectivity to allow IT to find, lock and erase PCs most anywhere.
- 📍 Locate a PC in real time
- 🔒 Lock a PC to prevent unauthorized access
- 🗑 Erase a PC's primary disk to keep data safe
Driving business outcomes across Finance, Operations and Security
Asset Management
Maintain tighter control over PC fleet to decrease cost, including for temporary staff.
Data Security
Secure data from unauthorized access.
Financial Risk Management
Decrease risk of equipment loss for as-a-service or leasing.
Find my PC
Assist users whose PC has been lost or stolen.
Device Lifecycle Sustainability
Manage devices from deployment to retirement, re-issue or recycle.
Audit & Compliance
Efficiently satisfy data and asset management controls.
Solution Architecture
- Supported HP PCs
- Workforce Experience Platform (WXP) for centralized management
- Approver application for secure approval of sensitive Lock & Erase commands
- IT Admin (System Administration: IT Staff or Outsourced Partner)
The architecture involves a PC Fleet connecting via Any Internet Connection to WXP, which then communicates with an Approver and IT Admin.
Unified Management Streamlines Operations
Protect & Trace with Wolf Connect shares the HP Workforce Experience Platform with various HP Support and Digital Services², providing a single console for unified fleet management.
Advanced Security Features
BIOS Level Protection
- Unlike other solutions, Protect and Trace executes Lock and Erase functions at the BIOS level.
- This provides better solution resiliency and data security than the OS-level approach used by alternative solutions.
Separation of Duties
- The included Approver application provides enhanced security and availability.
- Lock and Erase commands are requested by the IT Administrator, but must be approved by one or more approver staff.
- Advanced threshold cryptography is used for added protection.
- By splitting responsibilities and key material across multiple devices and staff, the risk of accidental or malicious compromise is vastly reduced.
Licensing and Deployment Options
HP Protect and Trace can be purchased with a new HP PC, or deployed on an existing PC. No hardware is required other than the supported PC.
- License Terms: 1, 2, 3, 4, and 5 years. Licenses are loaded into the customer WXP, and then assigned to PCs by WXP policy.
- A PC fleet with a mix of Protect and Trace and Protect and Trace with Wolf Connect PCs is supported in the same WXP instance, with the common operational model.
- HP Protect and Trace leverages the HP Insights agent⁴ used by various HP Services and the WXP platform.
Taking Fleet Management to the Next Level with Wolf Connect
HP Protect and Trace works over any Wi-Fi® / Internet connection.³ But for the highest level of assurance, consider Protect and Trace with Wolf Connect, which works over cellular communications, even if the target PC is off!
You can mix Wi-Fi and Wolf Connect target PCs in a single network, with an identical operational model.
- Protect & Trace: Wi-Fi / Internet only
- Protect & Trace with Wolf Connect: Global Cellular or Wi-Fi / Internet
Learn More
Visit the following links to learn more about additional HP Protect & Trace Technical Requirements, and the Terms of Service.
- HP system requirements and disabling instructions
- HP Insights agent download
- HP Protect & Trace with Wolf Connect datasheet
1 HP Protect and Trace is compatible with select HP 400, 600, 800, 1000 series, Windows based Laptops, select 800 desktops, and Z1 G8 Workstations; requires devices to be powered on and connected to the Internet; and is available in 1-5 year licenses from HP or your authorized HP Representative. See HP Wolf EULA for complete details. HP Protect & Trace requires HP Insights agent download, available at https://admin.hp.com. The HP Insights agent is a telemetry and analytics app that provides critical data around devices and applications and is ISO27001, ISO27017 and SOC2 Type2 certified for Information Security. Purchase of any HP Insights agent-enabled service necessitates enabling software to run on each device. HP Services Scan is provided through Windows Update on select HP hardware and will check entitlement on each hardware device to determine if an enabled service has been purchased, and will download applicable software automatically. For full system requirements and disabling instructions, please visit http://www.hpdaas.com/requirements.
2 HP P&T with WC may be managed with the Wolf Security Controller or HP WXP platform, not both.
3 See HP Protect & Trace with Wolf Connect datasheet here.
4 Windows Location Service must be enabled to get location updates for Wolf Protect and Trace.
©Copyright 2025 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. AMD is a trademark of Advanced Micro Devices Inc. Intel and Core are trademarks of Intel Corporation in the United States and other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries.
Document ID: 4AA8-4185ENW, May 2025