Deleting any Endpoint Encryption device from the Enterprise also removes the device from all policy groups. The deleted Endpoint Encryption device continues functioning as long as connectivity and password policies are current on the device. However, Endpoint Encryption users cannot recover files if the Endpoint Encryption device has a critical hardware failure after it has been removed from the Enterprise. To mitigate this risk, immediately decrypt the Endpoint Encryption device and uninstall the Endpoint Encryption agent software.
For information about removing a device from a specific group, but not the Enterprise, see Removing a Device from a Group.