Not every device needs the same level of tracking. A CEO's laptop, a warehouse tablet, and a student Chromebook each carry different risk, privacy, and battery constraints. Customizable tracking lets you decide how often Prey checks in.

Customizable Device Tracking setting
More resources
Track individual email addresses for dark web exposure — ideal for monitoring C-level executives, key clients, or high-risk accounts.

Set geofences around approved zones and let Prey enforce the rules 24/7, lock, alert, or wipe automatically when a device crosses.

Track, protect, and recover rental fleet devices. Enforce contracts, lock unreturned units, and wipe data on leased endpoints.