UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android 8 with Knox must implement the management setting: Disable Admin Remove.


Overview

Finding ID Version Rule ID IA Controls Severity
V-80227 KNOX-08-014200 SV-94931r1_rule Medium
Description
DoD policy requires DoD mobile devices to be managed via a mobile device management service. If Admin Remove is not disabled, the mobile device user can remove the Administrator (MDM) from the device. SFR ID: FMT_SMF_EXT.1.1 #47
STIG Date
Samsung Android OS 8 with Knox 3.x COBO Use Case Security Technical Implementation Guide 2018-11-30

Details

Check Text ( C-79899r1_chk )
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to Disable Admin Remove.

This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device.

On the MDM console, do the following:
1. Ask the MDM Administrator to display the "Allow Admin Remove" check box in the "Android Restrictions" rule.
2. Verify the check box is not selected.

On the Samsung Android 8 with Knox device, do the following:
1. Open the device settings.
2. Select "Lock screen and security".
3. Select "Other security settings".
4. Select "Device admin apps".
5. Verify the enterprise MDM agent is on and cannot be turned off.

If the MDM console "Allow Admin Remove" check box is selected or on the Samsung Android 8 with Knox device, "Device Administrators" cannot be turned off, this is a finding.
Fix Text (F-87033r1_fix)
Configure the Samsung Android 8 with Knox to Disable Admin Remove.

On the MDM console, deselect the "Allow Admin Remove" check box in the "Android Restrictions" rule.