Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-80227 | KNOX-08-014200 | SV-94931r1_rule | Medium |
Description |
---|
DoD policy requires DoD mobile devices to be managed via a mobile device management service. If Admin Remove is not disabled, the mobile device user can remove the Administrator (MDM) from the device. SFR ID: FMT_SMF_EXT.1.1 #47 |
STIG | Date |
---|---|
Samsung Android OS 8 with Knox 3.x COBO Use Case Security Technical Implementation Guide | 2018-11-30 |
Check Text ( C-79899r1_chk ) |
---|
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to Disable Admin Remove. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Admin Remove" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "Device admin apps". 5. Verify the enterprise MDM agent is on and cannot be turned off. If the MDM console "Allow Admin Remove" check box is selected or on the Samsung Android 8 with Knox device, "Device Administrators" cannot be turned off, this is a finding. |
Fix Text (F-87033r1_fix) |
---|
Configure the Samsung Android 8 with Knox to Disable Admin Remove. On the MDM console, deselect the "Allow Admin Remove" check box in the "Android Restrictions" rule. |