How to Turn On iPhone Stolen Device Protection
Stolen Device Protection is an iPhone security feature that prevents thieves from changing your Apple ID or turning off Find My iPhone — even if they know your passcode.
Make sure you have iOS 17.3 or later
~15sTurn on Stolen Device Protection
~21sQuick Tip
Quick Tip: This setting is easy to miss because it is buried in the Face ID settings. Do this now while it is on your mind.
Understand what it protects
~20sSet your security delay preference
~17sWhat to do if your phone is stolen
~29sWarning
If you trade in or sell your iPhone, turn off Stolen Device Protection first, then sign out of your Apple ID, then factory reset. This prevents issues during the trade-in process.
You Did It!
You've completed: How to Turn On iPhone Stolen Device Protection
Need more help? Get Expert Help from a TekSure Tech
Stolen Device Protection is a security feature Apple added to iPhones with iOS 17.3 and later. It protects you from a specific type of theft that became common: thieves watch you enter your passcode in public, then steal your phone. Within minutes, they can change your Apple ID password, turn off Find My iPhone, and lock you out of your own account permanently.
With Stolen Device Protection turned on, this attack no longer works. The feature requires Face ID or Touch ID (biometric authentication) for sensitive actions — there is no fallback to a passcode. Additionally, some of the most dangerous actions (like changing your Apple ID password or turning off Find My iPhone) have a built-in one-hour delay when your phone is in an unfamiliar location.
This means even if a thief has your passcode, they cannot instantly take over your account. The delay gives you time to log in from another device and remotely lock or wipe the stolen phone before the thief completes their attack.
Stolen Device Protection is turned off by default. You have to enable it manually. It works on iPhone XR, XS, and all newer models running iOS 17.3 or later.
Was this guide helpful?
Your feedback helps us make TekSure better for everyone.
Want to rate with stars?
Still have questions?
Ask TekBrain a follow-up question about this guide. It’s free, no sign-up needed, and the answer will be in plain English.
Official Resources
Sources used to create and verify this guide. View all sources →
← Previous
How to Use Samsung Galaxy AI Features on Your Phone
Next →
What to Do If Your Email Account Was Hacked
Still stuck? Let a pro handle it.
Our verified technicians can fix this issue for you — remotely or in person.
Related Guides
More from Safety & Privacy
How to Secure Your Home Wi-Fi Network
Simple steps to lock down your home router, keep strangers off your network, and protect every device in your house.
3 min read
Setting Up Two-Factor Authentication (2FA) on Any Account
Add a second layer of security to your most important accounts. This one change stops most account takeovers cold.
3 min read
Staying Safe on Social Media
How to protect your privacy on Facebook and Instagram, spot fake accounts, and avoid the most common social media traps.
3 min read