A laptop disappears every 53 seconds in the United States, and most are never recovered. Not because tracking technology doesn't work, but because the playbook starts before the loss, and most people only Google "find my laptop" after.
Microsoft, Apple, and Google all tell you the same thing: enable Find My Device. Useful advice, except by the time you're searching for that instruction, the laptop is already gone. Their pages are written for a reader who prepared. The actual reader is the one calling IT at 9:47 on a Monday morning, or staring at a phone screen at 2 a.m. realizing their browser had every password saved.
This guide is for both cases. It walks through the first 30 minutes, the OS-by-OS recovery flows, what to do when Find My Device was never enabled, the lock-vs-wipe decision, how to escalate to police and manufacturers, and the specific path IT has to follow when a company laptop goes missing.
The Find My Device button only works if you pressed it before the laptop disappeared. Here's the playbook for both cases.
The first 30 minutes after a laptop goes missing
The clock matters, but speed without sequence makes things worse. Before you touch any technical tool, do three things.
Confirm it's actually missing. This sounds obvious, but it's the most common false alarm. Check the car, the bag's other compartments, the desk it was last on, the meeting room from yesterday. Call the Uber driver, the coffee shop, the airport lost-and-found. About a third of "lost" laptops turn up within 24 hours; if yours is one of them, you don't want to have already wiped it remotely.
Identify the data class on the device. This determines everything that follows. A personal laptop with vacation photos has a different response than one with cached client records, banking logins, or regulated data (PHI, student records, financial files). If the laptop holds anything subject to HIPAA, GDPR, or FERPA, your timeline tightens dramatically.
Decide your priority: recovery or containment. You usually can't optimize both. Recovery means leaving the laptop online and traceable. Containment means cutting it off from accounts and possibly wiping it. Most people instinctively wipe first, and that's almost always the wrong move if there's any chance of getting the device back.
Take a Friday-night scenario: an employee leaves a MacBook in an Uber, Find My is enabled, the Mac is online and currently moving across the city. The instinct is to hit "Erase Mac" immediately. Don't. Locking preserves the chain of evidence and gives Uber Trust and Safety, the police, and sometimes the driver a window to recover it. Wipe later, after 48 hours of monitoring or once the device goes dark.
Quick win: Sign into your Microsoft, Apple, or Google account from a phone right now and screenshot the last-active location and timestamp before anything changes. That screenshot is your single most valuable piece of evidence for the next 24 hours.
Find your laptop using built-in tools (Windows, Mac, Android)
Each OS has its own version of the same thing: a dashboard tied to your account that, if enabled in advance, shows the device's last known location.
Windows (Microsoft Find My Device). Open account.microsoft.com/devices from any phone or computer. Click the missing device and select the Find my device tab, then click Find to ping the latest location. Microsoft will trigger a location refresh and show the result on a map. From the same screen, you can lock the device and display a custom message. This only works if Find My Device was enabled in Settings → Update & Security → Find my device. On most Windows laptops sold in the last few years, it's on by default, but verify.
Mac (Apple iCloud Find My). Open iCloud.com/find from any browser, or use the Find My app on another Apple device signed into the same Apple ID. Select the laptop from the device list. The map shows location if the Mac is online; if offline, it shows the last known location with a timestamp. From here, you can play a sound, mark as lost, or erase. Find My Mac needs to be on at System Settings → Apple ID → iCloud → Find My Mac.
Android and Chromebook (Google Find Hub). Open android.com/find or myaccount.google.com/find-your-phone on any device signed into the same Google account. Select the Chromebook from the device list. The map shows location; you can ring the device, lock it, or sign out remotely. The same console covers the Android devices tracking flow for phones and tablets in the same fleet.
Quick win: When you see a location on the map, screenshot it twice: once with the timestamp visible, once zoomed in on the address. Map locations refresh every few minutes, so you want a frozen record before that happens. Also note the Wi-Fi SSID or network the device reports if visible. That's useful evidence later.
What to do if Find My Device was off
Most people land on this article because Find My Device was never enabled. Microsoft, Apple, and Google will all tell you to turn it on. That's not advice, it's a postcard from the past. This is the scenario every other guide skips, so it's worth slowing down.
Take a coffee-shop case. Someone walks out without their personal laptop, no tracking was ever installed, the only recent backup is from three weeks ago, and the browser had every banking password saved. Find My Device shows nothing useful. But here's what still works.
Software side: account logs know more than you think. Even without Find My Device on, account dashboards still log activity. Three places worth checking right now:
account.microsoft.com/devices/recent-activityshows recent sign-ins to your Microsoft account, including IP and approximate location.appleid.apple.com → Devicesshows every device currently signed into your Apple ID, with last-seen city and country.- Gmail (web, "Details" link at the bottom right of inbox) and Google Workspace admin logs show recent IPs by city.
If the thief has signed into any of these accounts on the stolen laptop, you'll see an IP address and city you don't recognize. That's evidence for the police report and, in many cases, enough for an ISP to identify the subscriber under subpoena.
Hardware side: serial numbers still work. Every major manufacturer (Dell, HP, Lenovo, Apple, Microsoft) maintains a stolen-device database. Register the serial through their loss-prevention form. If the device is ever brought in for repair, sent in for trade-in, or activated against a service account, the manufacturer can flag it. The serial usually lives in three places: on the bottom of the laptop (if you have a photo or proof of purchase), in the original retailer's order email, or in your account device list before it disappeared.
Cloud side: every sync app leaves a trail. Dropbox, OneDrive, Google Drive, iCloud, Notion, Slack, password managers. Each one logs the IP of the device that last synced. Open the admin console of each and you may find a more recent and useful location than your main account dashboard.
If your laptop was encrypted with BitLocker but you can't remember the recovery key, the BitLocker recovery key guide walks through the standard paths. Without that key, an encrypted disk is functionally containment even without a wipe. Real-time tracking only works if a persistent agent was installed in advance, covered later in the section on setting up tracking before the next loss.
Quick win: Open Gmail or your work email on a phone right now. Scroll to the bottom and click "Details" (Gmail) or check Google Workspace admin → Reports → User reports → Account activity. Recent IPs and locations are listed there even when no other tool is enabled.
Lock, wipe, or wait? Choosing the right data-protection move
This is the decision tree most articles skip. The instinct is to wipe immediately. That instinct is wrong in most cases.
Lock first, wipe later. A remote lock preserves the laptop's state, keeps it traceable, and lets you escalate. Wiping destroys evidence, ends location tracking, and makes the device unrecoverable. If you wipe and the police find the laptop a week later, you have no proof it was ever yours. The wipe receipt is your audit trail, but the device is now clean.
When NOT to wipe yet:
- You have any realistic chance of recovery (online laptop, known location, recent ping).
- The disk is encrypted with BitLocker or FileVault and the recovery key is safe.
- You can contain the data through other means (revoke OAuth, change passwords, sign out of cloud sessions).
When to wipe immediately:
- The device holds regulated data that triggers breach notification timers.
- The disk is unencrypted and contains sensitive plaintext files.
- You have no recovery key for the encryption and the data is critical to protect.
- The thief has already accessed accounts (you'll see this in sign-in alerts).
Cloud-side containment is often enough. Before reaching for the wipe button, do this in sequence: force sign-out from every Google, Microsoft, and Apple session in 60 seconds (each has a "sign out everywhere" button in account security). Revoke OAuth tokens and connected apps. Reset passwords for any account that auto-logs-in on the laptop, starting with email. Revoke 2FA backup codes and app passwords. Sign out of password managers from the missing device (1Password, LastPass, Bitwarden all support remote device revocation). If you do all of that within an hour, you've cut off most of the practical exposure even without a wipe.
How endpoint management tools handle this. When IT owns the laptop, the lock-first sequence is enforced by policy. Platforms like Prey let an admin push a lock with a custom message ("This device is reported lost. Call 555-0100 for return.") and trigger an immediate evidence pull (screenshot, camera capture, location ping) before any destructive action. The same dashboard then escalates to remote wipe and factory reset if the device goes silent or the recovery window closes. The point is that lock, evidence, and wipe live on the same audit timeline, so the response to a missing device is documented end to end.
Quick win: Right now, before anything happens, open the security settings for your Google, Microsoft, and Apple accounts and find the "Sign out of all sessions" button. Memorize where it is. If a laptop goes missing, that button buys you 80% of the containment in under a minute.
Recovery escalation: police, ISP, marketplaces, manufacturer
Once the device side is handled, recovery shifts to human and administrative channels. This is where most personal users give up, and where most IT teams discover what their incident-response plan actually looks like in practice. Native tools won't get the laptop back. Police reports, manufacturers, and marketplaces will.
The police report is the foundation. Insurance won't pay, manufacturers won't blacklist a serial number, and law enforcement won't act without one. File it in person or online (many jurisdictions accept online reports for property crimes under a threshold). The report should include the serial number, model, photos of the device, last-known location with timestamp, any IP addresses from sign-in logs, and proof of purchase.
ISP and network owner cooperation. If you captured a Wi-Fi SSID or IP address during the recovery flow above, the police can subpoena the ISP for subscriber identification. This works more often than people expect, especially for residential connections. The window is short (most ISPs only retain logs for 60 to 90 days), so don't wait.
Manufacturer stolen-device databases. Apple's "If found" lock screen displays a custom message and contact info on any locked Mac. Dell, HP, and Lenovo all maintain loss-prevention databases tied to the serial number. Email the manufacturer's loss-prevention team with the serial, police case number, and a brief description. If the device is ever serviced, traded in, or registered, you'll get notified.
Marketplace alerts. Most stolen laptops surface on Craigslist, Facebook Marketplace, eBay, OfferUp, or a local pawn shop within 7 to 14 days. Set saved searches for the exact model and your metro area within the first hour. Include identifying details (stickers, engravings, screen-protector cracks) in the police report so you can prove ownership when you spot it. From the other side of that marketplace, the guide to checking if a used laptop is stolen covers the same serial-number databases for buyers, which is useful context for understanding what flags a device when it resurfaces.
Recovery evidence packaging. Police don't want screenshots scattered across your phone. They want a single document. If your tracking tool generates a recovery report (location pings, camera captures, screenshots, login attempts), download it as a PDF. If you assembled the evidence manually, build a PDF with timestamps. Hand-off matters: a clean evidence package gets escalated; a messy one gets filed.
Quick win: Within the first hour, file the police report online if your jurisdiction allows it, email the manufacturer's loss-prevention team with the serial number and case number, and set a Facebook Marketplace and Craigslist alert for your model in your metro area. Three tabs, twenty minutes, dramatically better recovery odds.
Special case: stolen company laptops (the IT-owned response)
When the laptop belongs to the company, the response shifts. IT owns the playbook, not the employee. The order of operations changes, and the stakes go beyond device recovery: you're managing chain of evidence, compliance obligations, and identity containment.
Take Jerome, IT operative at a healthcare company. He gets a Slack message at 9:47 a.m. Monday. An employee says they think their work laptop was stolen from a hotel room over the weekend. Find My Device was never enabled. The laptop holds cached patient data the employee accessed last Thursday. Jerome has 72 hours under most state breach laws to determine whether this is a reportable incident, and 60 days for the HIPAA notification window if it is.
His sequence:
- Inventory check. Run a query against the MDM or DLP logs to determine exactly what was on that device: which files were synced offline, which apps had cached data, which credentials were saved in the browser. This is the first thing leadership and legal will ask.
- Identity containment. Disable the user's Active Directory account, revoke OAuth tokens, kill VPN sessions, force password reset, and revoke 2FA backup codes. This stops the attack vector even if the laptop is online.
- Encryption check and key revoke. Confirm BitLocker or FileVault status from the management console. If encryption was enforced and the recovery key is secure, the data is functionally protected. Push a BitLocker key revoke from Active Directory if there's any chance the key was exposed.
- Start the compliance timer formally. Document the time of report, who was notified, and the initial assessment. The notification window varies by framework (HIPAA 60 days, GDPR 72 hours, state laws vary), but the principle is the same: document early, document often. Even devices without obviously regulated data can trigger exposure if credentials end up in dark-web dumps.
- Police report and insurance. The employee files a personal report; IT files the corporate one. Most cyber-insurance policies require a documented response timeline, not just the loss.
- Don't let the employee remote-wipe before IT does its part. Chain of evidence matters. If the employee fires off "Erase Mac" from their personal iCloud the moment they realize the laptop is gone, you lose the audit trail and the recovery option in one click.
How endpoint management platforms handle this. When IT manages the fleet through a platform like Prey, the response above runs from one dashboard with a full audit log. Lock, evidence capture, location ping, encryption status check, and remote wipe are recorded with timestamps and operator IDs. The recovery report (location history, screenshots, camera captures, login attempts) packages into a single PDF for legal, insurance, and the police report. For MSPs managing fleets across multiple client orgs, the same dashboard separates response per tenant with no risk of cross-client contamination.
Quick win: Right now, before any incident, document where your team would look to answer the question "what was on this laptop" in under five minutes. If the answer involves more than two tools or any guesswork, your incident-response window is already compressed.
How to set up real tracking before the next loss
The proactive layer matters, but it belongs after the reactive playbook, not before. Most readers landed here because something already happened. The next loss is the one you can prepare for.
Native tools have hard limits. Microsoft Find My Device, Apple iCloud Find My, and Google Find Hub stop working in three predictable scenarios: when the thief signs out of the account, when the device is wiped, or when location services are turned off. They're designed for the personal laptop you didn't sign out of. They're not designed for active recovery.
Persistent agents survive sign-outs. Third-party tracking tools install at a deeper level than the account layer. They survive a sign-out, a new user profile, and often a non-firmware OS reinstall. For consumer Windows and Mac laptops, Prey, Absolute, and a handful of others fit this category. For fleets, full MDM platforms add policy enforcement and inventory on top of tracking.
For IT teams managing fleets, the right setup is an MDM-level deployment that enrolls every device automatically, enforces BitLocker or FileVault at provisioning, and runs location and inventory check-ins on a schedule. The Windows fleet tracking guide for IT teams covers the deployment pattern for mixed-OS environments where MDM is the foundation.
For personal or small-team setups, the 80/20 is straightforward:
- Enable Find My Device on every laptop and verify it shows online from another device today.
- Enable full-disk encryption (BitLocker on Windows Pro, FileVault on macOS, default on Chromebooks).
- Install a persistent tracking agent if the laptop holds anything sensitive or expensive.
- Photograph the serial number and store it somewhere outside the laptop itself.
- Set up a dark-web credential monitoring so you know if any credential from the laptop ends up in a breach dump.
Where Prey fits in this stack.
Prey runs as the layer that works after Find My Device fails. The agent persists across sign-outs, the dashboard pulls location, photos, and screenshots into a single recovery report, and the same console handles remote lock and wipe with a full audit log. For IT teams, multi-OS support (Windows, macOS, Linux, Android, iOS, ChromeOS) consolidates the response into one workflow instead of three.
Quick win: Pick one laptop in your environment right now and run this 5-minute check. Is Find My Device enabled and verified? Is full-disk encryption on? Is the serial number stored somewhere outside the laptop? If any of those is "no," fix it before the next coffee-shop run.
Final thoughts
Most articles about finding a stolen laptop start with "enable Find My Device." The advice is correct, but it's useless to the reader who needs the article. By the time you're searching, the button you should have pressed is irrelevant. What matters now is sequence: triage in the first 30 minutes, evidence capture before wiping, cloud-side containment before destructive action, and a clean handoff to police, manufacturers, and (if it's a company laptop) compliance.
The Find My Device button only works if you pressed it before the laptop disappeared. The good news is that the playbook for both cases shares the same shape: visibility first, evidence second, containment third, escalation fourth. Whether the laptop is a personal Mac in an Uber or a company-issued Windows laptop with patient data on it, the steps are the same; only the stakes change.
Monday-morning action: figure out where the laptops in your environment actually are right now, and how long it would take to know if one of them went missing this afternoon. If you can't answer that in five minutes, the gap is not in the laptop. The gap is in the layer that's supposed to tell you.
Frequently asked questions
Can a stolen laptop be tracked if it's turned off?
Native tools like Microsoft Find My Device and Apple iCloud Find My can't track a laptop while it's powered off, but they show the last-known location from before shutdown. Persistent tracking agents resume tracking automatically when the device powers back on, even if it connects to a different network or user account.
Can a stolen laptop be tracked by IP address?
Yes, indirectly. If the thief signs into your Microsoft, Apple, or Google account on the laptop, the sign-in log captures the IP and approximate city. Police can subpoena the ISP to identify the subscriber, which is one of the more common paths to actual recovery.
How do police track stolen laptops?
Mostly through serial-number databases, manufacturer cooperation, and digital evidence you provide. They rarely track in real time. You supply location screenshots, IP addresses from sign-in logs, marketplace listings, and the police report; they execute the recovery from that. Speed and evidence quality matter more than technology.
Can I track my laptop with a serial number?
Not in real time. But you can register the serial number with the manufacturer's stolen-device program (Apple, Dell, HP, and Lenovo all maintain these), file it with police, and alert local pawn shops and online marketplaces. If the device is ever serviced or registered to a new account, the manufacturer can flag it.
Does Find My Device work after the thief logs out?
No. Microsoft Find My Device, Apple iCloud Find My, and Google Find Hub all depend on the original account staying signed in. As soon as the thief signs out, creates a new user, or wipes the disk, native tracking stops. Third-party persistent agents like Prey survive sign-outs because they operate below the account layer.
Can a laptop be tracked once it's been wiped?
Native tracking does not survive a full OS reinstall or factory reset. Some persistent agents (Prey's reinstall workflow, Absolute's firmware-level persistence) can re-establish tracking under specific conditions, but software-only tools generally cannot. This is the strongest argument for getting tracking installed before the laptop goes missing.
Set up recovery before the next loss
Prey gives IT teams and individual users one dashboard for location tracking, remote lock, evidence capture, and remote wipe across Windows, macOS, Linux, Android, iOS, and ChromeOS. The layer that works after Find My Device fails.


