Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing CONTAINER Account Whitelisting. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Account whitelist" setting in the "CONTAINER Accounts" rule. 2. Verify the whitelist only contains DoD-approved email domains (for example, mail.mil). Note: Proper configuration of Account blacklist is required for this configuration to function correctly. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Open "Workspace settings". 3. Select "Accounts". 4. Select "Add account". 5. Select "Email" (and repeat for Microsoft Exchange ActiveSync) and attempt to add an email account with a DoD-approved domain. 6. Verify the email account can be added. 7. Attempt to add an email account with a domain not approved by DoD. 8. Verify the email account cannot be added. If the MDM console "Account whitelist" is not set to contain DoD-approved email domains or on the Samsung Android 8 with Knox device, the user is able to successfully configure the email account with a domain not approved by DoD, or if the user is not able to install the DoD-approved email account, this is a finding.
Configure Samsung Android 8 with Knox to enforce CONTAINER Account Whitelisting. On the MDM console, add all DoD-approved email domains to the "Account whitelist" setting in the "CONTAINER Accounts" rule. Note: Recommended to add .*@mail.mil.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing CONTAINER Account Blacklisting. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Account blacklist" setting in the "CONTAINER Accounts" rule. 2. Verify the setting is configured to all email domains not approved by DoD. Note: All email domains are specified by the wildcard string ".*" On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Open "Workspace settings". 3. Select "Accounts". 4. Select "Add account". 5. Select "Email" (and repeat for Microsoft Exchange ActiveSync) and attempt to add an email account with a non-approved domain. 6. Verify the email account cannot be added. If the MDM console "Account blacklist" is not set to all email domains not approved by DoD or on the Samsung Android 8 with Knox device, the user is able to successfully configure the non-DoD-approved email account, this is a finding.
Configure Samsung Android 8 with Knox to enforce CONTAINER Account Blacklisting. On the MDM console, add all email domains not approved by DoD to the "Account blacklist" setting in the "CONTAINER Accounts" rule or blacklist all accounts by using the wildcard string ".*" The wildcard string will blacklist all email accounts except for those on the whitelist.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is enforcing application disable list. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Applications" rule. 2. Verify the list contains all core and pre-installed applications not approved for DoD use by the Authorizing Official (AO). Note: Refer to the Supplemental document for additional information. On the Samsung Android 8 with Knox device, attempt to launch an application that is included on the disable list. Note: This application should not be visible. If the MDM console "Application disable list" is not set to contain all core and pre-installed applications not approved by DoD or on the Samsung Android 8 with Knox device, the user is able to successfully launch an application on this list, this is a finding.
Configure Samsung Android 8 with Knox to enforce application disable list. On the MDM console, add all pre-installed applications that are not DoD-approved to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information. Note: Include Samsung Accounts on the list.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing CONTAINER application disable list. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule. 2. Verify the list contains all core and pre-installed applications not approved for DoD use by the Authorizing Official (AO). Note: Refer to the Supplemental document for additional information. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Attempt to launch an application that is included on the disable list. Note: This application should not be visible. If the MDM console "Application disable list" is not set to contain all core and pre-installed applications not approved by DoD or on the Samsung Android 8 with Knox device, the user is able to successfully launch an application on this list, this is a finding.
Configure Samsung Android 8 with Knox to enforce CONTAINER application disabled list. On the MDM console, add all pre-installed CONTAINER applications that are not DoD-approved to the "Application disable list" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule. Note: Refer to the Supplemental document for additional information. Note: Include Samsung Accounts on the list.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to Blacklist CONTAINER Application Install. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Package Name Blacklist" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule. 2. Verify the setting is configured to all package names (specified by the wildcard string ".*"). 3. Ask the MDM Administrator to display the "Signature Blacklist" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule. 4. Verify the setting is configured to all digital signatures (specified by the wildcard string ".*"). On the Samsung Android 8 with Knox device, do the following: 1. Attempt to install any application that has not been whitelisted for installation by either package name or digital signature. 2. Verify that the application is blocked from being installed. If the MDM console "Package Name Blacklist" or "Signature Blacklist" is not set to include all entries or on the Samsung Android 8 with Knox device, the user is able to install the application, this is a finding.
Configure Samsung Android 8 with Knox to Blacklist CONTAINER Application Install. On the MDM console, do the following: 1. Add all package names by wildcard (".*") to the "Package Name Blacklist" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule. 2. Add all digital signatures by wildcard (".*") to the "Signature Blacklist" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has been configured to whitelist application installations into the CONTAINER based on one of the following characteristics: - Digital signature - Package name Verify all applications listed on the whitelist have been approved by the Authorizing Official (AO). This validation procedure is performed only on the MDM Administration Console. On the MDM console, perform Steps 1 and 2 or Steps 3 and 4: 1. Ask the MDM Administrator to display the "Package Name Whitelist" in the "Android Knox CONTAINER >> CONTAINER Applications" rule. 2. Verify the whitelist includes only package names that the AO has approved. 3. Ask the MDM Administrator to display the "Signature Whitelist" in the "Android Knox CONTAINER >> CONTAINER Applications" rule. 4. Verify the whitelist includes only digital signatures the AO has approved. Note: Either list may be empty if the AO has not approved any app. Note: Refer to the Supplemental document for additional information. If the MDM console "Package Name Whitelist" or "Signature Whitelist" contains non-AO-approved entries, this is a finding. Note: The application Whitelist must be implemented so that only approved applications can be downloaded from the Google Play Store. Access to the Google Play Store must be enabled so that apps used by Google Play Services can be updated. The following app packages must be included in the CONTAINER app whitelist so that Google Play services can be updated: • com.android.vending • com.google.android.finsky • com.google.android.gm • com.google.android.gms • com.google.android.gsf.login • com.google.android.setupwizard • com.google.android.gsf
Configure Samsung Android 8 with Knox to whitelist application installations into the CONTAINER based on one of the following characteristics: - Digital signature - Package name Both whitelists apply to user installable applications only and do not control user access/execution of core and pre-installed applications. To restrict user access/execution to core and pre-installed applications, the MDM Administrator must configure the "application disable list". It is important to note that if the MDM Administrator has not blacklisted an application characteristic (package name, digital signature), it is implicitly whitelisted, as whitelists are exceptions to blacklists. If an application characteristic appears in both the blacklist and whitelist, the whitelist (as the exception to the blacklist) takes priority, and the user will be able to install the application. Therefore, the MDM Administrator must configure the blacklists to include all package names or digital signatures for whitelisting to behave as intended. On the MDM console, do one of the following: 1. Add each AO-approved package name to the "Package Name Whitelist" in the "Android Knox CONTAINER >> CONTAINER Applications" rule. 2. Add each AO-approved digital signature to the "Signature Whitelist" in the "Android Knox CONTAINER >> CONTAINER Applications" rule. Note: Either list may be empty if the AO has not approved any app. Note: Refer to the Supplemental document for additional information. Note: The application Whitelist must be implemented so that only approved applications can be downloaded from the Google Play Store. Access to the Google Play Store must be enabled so that apps used by Google Play Services can be updated. The following app packages must be included in the CONTAINER app whitelist so that Google Play services can be updated: • com.android.vending • com.google.android.finsky • com.google.android.gm • com.google.android.gms • com.google.android.gsf.login • com.google.android.setupwizard • com.google.android.gsf
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has an application disable list configured to include applications with the following characteristics: - transmit MD diagnostic data to non-DoD servers. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow transmission of MD diagnostic data to non-DoD servers. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device, the user is able to launch the applications on the list, this is a finding.
Configure the Samsung Android 8 with Knox application disable list to include applications with the following characteristics: - transmit MD diagnostic data to non-DoD servers. On the MDM console, add all applications that transmit MD diagnostic data to non-DoD servers to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services). This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that back up MD data to non-DoD cloud servers (including user and application access to cloud backup services). If the MDM CONTAINER console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding. Note: The following applications are known to be pre-installed public cloud applications, but other applications can be found on other devices: Google Drive, Dropbox, Verizon Cloud, AT&T Locker, Microsoft OneDrive, and Microsoft OneNote. Note: The following application allows a user to configure a Samsung account on the device, which allows the user to back up files (including S Health data) to Samsung servers and download applications from the Samsung Apps (Galaxy Apps) store: Samsung Account application. Note: Refer to the Supplemental document for additional information.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services). On the MDM CONTAINER console, add all applications that back up MD data to non-DoD cloud servers (including user and application access to cloud backup services) to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information. Note: Include Samsung Accounts on the list.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - transmit MD diagnostic data to non-DoD servers. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow transmission of MD diagnostic data to non-DoD servers. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - transmit MD diagnostic data to non-DoD servers. On the MDM CONTAINER console, add all applications that transmit MD diagnostic data to non-DoD servers to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - voice assistant application if available when MD is locked. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow voice assistant when MD is locked. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - voice assistant application if available when MD is locked. On the MDM CONTAINER console, add all applications that provide voice assistant when MD is locked to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - voice dialing application if available when MD is locked. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow voice dialing when MD is locked. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - voice dialing application if available when MD is locked. On the MDM CONTAINER console, add all applications that provide voice dialing when MD is locked to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - allows synchronization of data or applications between devices associated with user. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow synchronization of data or applications between devices associated with user. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding. Note: The following applications are known to be pre-installed applications that allow synchronization of data or applications between devices associated with user, but other applications can be found on other devices: Google Drive, Dropbox, Verizon Cloud, AT&T Locker, Microsoft OneDrive, and Microsoft OneNote. Note: Refer to the Supplemental document for additional information.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - allows synchronization of data or applications between devices associated with user. On the MDM CONTAINER console, add all applications that allow synchronization of data or applications between devices associated with user to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics: - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications that allow unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding. Note: Refer to the Supplemental document for additional information.
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics: - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers. On the MDM CONTAINER console, add all applications that allow unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store). This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Install Non Market App" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Apps". 3. Select "Special access" in the overflow menu. 4. Select "Install unknown apps". 5. Attempt to enable "Allow from this source" for any application. 6. Verify it cannot be enabled. If the MDM console "Allow Install Non Market App" check box is selected or on the Samsung Android 8 with Knox device, the user can successfully enable "Allow from this source" for an application, this is a finding.
Configure Samsung Android 8 with Knox to disable unauthorized application repositories. On the MDM console, deselect the "Allow Install Non Market App" check box in the "Android Restrictions" rule. Note: Some MDM consoles may refer to "Unknown Sources" instead of "Non Market App".
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to add the MDM Client application to the Battery optimizations modes Whitelist. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Battery optimizations modes Whitelist" setting in the "Android Application" rule. 2. Verify the list contains the MDM Client. Note: Some MDM products automatically apply this setting and there is no configuration to verify. If the MDM console "Battery optimizations modes Whitelist" does not contain the MDM Client, this is a finding.
Configure Samsung Android 8 with Knox to add the MDM Client application to the Battery optimizations modes Whitelist. On the MDM console, add the MDM Client Package name to the "Battery optimizations modes Whitelist" in the "Android Applications" rule. Note: Some MDM products automatically apply this setting so there is no configuration setting to apply. Note: Some MDM consoles may require (or take as an optional input) the MDM Client Signature.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to add the MDM Client application to the CONTAINER Battery optimizations modes Whitelist. This validation procedure is performed on the MDM Administration Console only. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Battery optimizations modes Whitelist" setting in the "Android Application" rule. 2. Verify the list contains the MDM Client. Note: Some MDM products automatically apply this setting and there is no configuration to verify. If the MDM CONTAINER console "Battery optimizations modes Whitelist" does not contain the MDM Client, this is a finding.
Configure Samsung Android 8 with Knox to add the MDM Client application to the CONTAINER Battery optimizations modes Whitelist. On the MDM CONTAINER console, add the MDM Client Package name to the "Battery optimizations modes Whitelist" in the "Android Applications" rule. Note: Some MDM products automatically apply this setting so there is no configuration setting to apply. Note: Some MDM consoles may require (or take as an optional input) the MDM Client Signature.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER is configured to disable Bixby Vision. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all Bixby Vision-related packages. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Open the Samsung Camera application. 2. Press the Bixby Vision "eye" icon. 3. Verify Bixby does not start. If the Samsung Android 8 with Knox device starts Bixby Vision when pressing the Bixby Vision "eye" icon, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to disable Bixby Vision. On the MDM CONTAINER console, add all packages associated with the Bixby Vision feature to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to enable the Audit Log. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Enable Audit Log" check box in the "Android Audit Log" rule. 2. Verify the check box is selected. If the MDM console "Enable Audit Log" is not selected, this is a finding.
Configure Samsung Android 8 with Knox to enable "Audit Log". On the MDM console, select the "Enable Audit Log" check box in the "Android AuditLog" rule.
Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to verify the access control policy is enabled that prevents groups of application processes from accessing all data stored by other groups of application processes. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Android Knox CONTAINER" rule. 2. Verify the existence of this rule. 3. Pushing this rule to the device that does not have a CONTAINER installed will result in creation of the CONTAINER. On the Samsung Android 8 with Knox device, do the following: 1. Verify the existence of the Knox icon on the device home screen or application menu or the notification bar pull-down menu. 2. If available on the MDM agent, verify the CONTAINER rule in the list of rules received by the MDM agent. If the MDM console "Android Knox CONTAINER" rule cannot be configured, or the Knox icon is not present, or the CONTAINER rule is not found in the MDM agent rule list (MDM vendor-specific check), this is a finding. Note: This validation procedure is identical to the one for KNOX-08-007000 (Knox CONTAINER must be enabled). It only needs to be performed once. If it is found compliant on the first check, it is also compliant here. If it is determined to be a finding on first check, it is also a finding here. Redundant checks are necessary to maintain requirements traceability and provide complete risk management information to Authorizing Officials (AOs).
Configure Samsung Android 8 with Knox to enable the access control policy that prevents groups of application processes from accessing all data stored by other groups of application processes. On the MDM console, create the "Android Knox CONTAINER" rule and push this rule to the device.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has the CONTAINER enabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Android Knox CONTAINER" rule. 2. Verify the existence of this rule. 3. Pushing this rule to the device that does not have a CONTAINER installed will result in creation of the CONTAINER. On the Samsung Android 8 with Knox device, do the following: 1. Verify the existence of the Knox icon on the device home screen or application menu or the notification bar pull-down menu. 2. If available on the MDM agent, verify the CONTAINER rule in the list of rules received by the MDM agent. If the MDM console "Android Knox CONTAINER" cannot be configured, or if the CONTAINER rule is not found in the MDM agent rule list (MDM vendor-specific check), or on the Samsung Android 8 with Knox device, the Knox icon is not present, this is a finding.
Configure Samsung Android 8 with Knox to enable the CONTAINER. On the MDM console, create the "Android Knox CONTAINER" rule and push this rule to the device.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has the Knox CONTAINER enabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Android Knox CONTAINER" rule. 2. Verify the existence of this rule. On the Samsung Android 8 with Knox device, do the following: Verify the existence of the Knox icon on the device home screen or application menu or the notification bar pull-down menu. If the MDM console "Android Knox CONTAINER" rule is not found in the MDM agent rule list (MDM vendor-specific check) or on the Samsung Android 8 with Knox device, the Knox icon is not present, this is a finding.
Deploy DoD Samsung mobile devices with the Knox CONTAINER and implement the Knox CONTAINER. (See requirement KNOX-08-007000.) Note: Samsung Knox is currently the only CONTAINER technology/application that is NIAP certified for Samsung mobile devices.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing disabled sharing of notification details outside the CONTAINER when the CONTAINER is locked. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Show detailed notifications" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace Settings". 3. Select "Notifications and data". 4. Verify "Show notification content" is disabled and attempt to enable this setting. If the MDM console "Allow Show detailed notifications" is not set to disabled or on the Samsung Android 8 with Knox device, the user is able to enable this setting, this is a finding.
Configure Samsung Android 8 with Knox to enforce disabled sharing of notification details outside the CONTAINER when the CONTAINER is locked. On the MDM console, disable the "Allow Show detailed notifications" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule.
Review a sample of site User Agreements of Samsung device users or similar training records and training course content. Verify Samsung device users have completed required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. If any Samsung device user is found not to have completed required training, this is a finding.
Have all Samsung device users complete training on the following topics. Users should acknowledge they have reviewed training via a signed User Agreement or similar written record. Training topics: - Operational security concerns introduced by unmanaged applications/unmanaged personal space including applications using global positioning system (GPS) tracking. - Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email). - If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure a factory data reset is performed prior to device hand-off. Follow Mobility service provider decommissioning procedures as applicable. - How to configure the following UBE controls (users must configure the control) on the Samsung device: **Secure use of Calendar Alarm **Local screen mirroring and MirrorLink procedures (authorized/not authorized for use) **Disable Report Diagnostic Info and Google Usage & Diagnostics **Do not connect Samsung DeX Station to any DoD network via Ethernet connection **Do not upload DoD contacts via smart call and caller ID services **Do not remove DoD intermediate and root PKI digital certificates **Disable Wi-Fi Sharing **Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space - AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Samsung device personal space.
Review Samsung DeX Station/Pad installations at the site and verify the stations are not connected to DoD networks via wired or wireless connections. If Samsung DeX Station installations at the site are connected to DoD networks via wired or wireless connections, this is a finding. Note: Connections to a site's guest wired or wireless network that provides Internet-only access can be used. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement.
When using the DeX Station/Pad multimedia dock with a DoD Samsung smartphone, do not connect the DeX Station to a DoD network via a wired or wireless connection. Note: This setting cannot be managed by the MDM Administrator and is a UBE requirement.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing a minimum password length of six characters. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Length" setting in the "Android Password Restrictions" rule. 2. Verify the value of the setting is set to six or more characters. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Screen lock type". 4. Enter current password. 5. Select "Password". 6. Attempt to enter a password with fewer than six characters. 7. Verify the password is not accepted. If the MDM console "Minimum Length" setting is not set to six characters or more or on the Samsung Android 8 with Knox device, a password of less than six characters is accepted, this is a finding.
Configure Samsung Android 8 with Knox to enforce a minimum password length of six characters. On the MDM console, set the "Minimum Length" value to "6" or greater in the "Android Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to enforce a minimum CONTAINER password length of four characters. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Length" setting in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 2. Verify the value of the setting is the same or greater than the required length. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace settings". 3. Select "Lock type". 4. Enter current password. 5. Attempt to enter a password with fewer characters than the required length. 6. Verify the password is not accepted. If the MDM console "Minimum Length" is not set to the same or greater than the required length or if the Samsung Android 8 with Knox device accepts a CONTAINER password with fewer characters than the required length, this is a finding. Note: This configuration setting will allow users to implement fingerprint unlock for the CONTAINER, which is approved for use. The use of a password to move between CONTAINER and personal areas is only required if the password is needed to provide data separation between the two processing environments. For the Samsung devices, the password is required to enable the CONTAINER and implement data separation.
Configure Samsung Android 8 with Knox to enforce a minimum CONTAINER password length of four characters. On the MDM console, set the "Minimum Length" value to "4" or greater in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is prohibiting passwords with more than two repeating or sequential characters. If feasible, use a spare device to try to create a password with more than two repeating or sequential characters (e.g., bbb, 888, hij, 654). This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Maximum Sequential Characters" setting in the "Android Password Restrictions" rule. 2. Verify the value of the setting is set to two or fewer sequential characters. 3. Ask the MDM Administrator to display the "Maximum Sequential Numbers" setting in the "Android Password Restrictions" rule. 4. Verify the value of the setting is set to two or fewer sequential characters. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Screen lock type". 4. Enter current password. 5. Select "Password". 6. Attempt to enter a password that contains more than two sequential characters or sequential numbers. 7. Verify the password is not accepted. If the MDM console "Maximum Sequential Character" and "Maximum Sequential Number" are set to more than two repeating or sequential characters or on the Samsung Android 8 with Knox device, a password with more than two repeating or sequential characters is accepted, this is a finding.
Configure Samsung Android 8 with Knox to prevent passwords from containing more than two repeating or sequential characters. On the MDM console, do the following: 1. Set the "Maximum Sequential Characters" value to "2" in the "Android Password Restrictions" rule. 2. Set the "Maximum Sequential Numbers" value to "2" in the "Android Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is prohibiting CONTAINER passwords with more than two repeating or sequential characters. If feasible, use a spare device to try to create a password with more than two repeating or sequential characters (e.g., bbb, 888, hij, 654). This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Maximum Sequential Characters" setting in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 2. Verify the value of the setting is set to two or fewer sequential characters. 3. Ask the MDM Administrator to display the "Maximum Sequential Numbers" setting in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 4. Verify the value of the setting is set to two or fewer sequential characters. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Knox Settings". 3. Select "Lock type. 4. Enter current password. 5. Select "Password". 6. Attempt to enter a password that contains more than two sequential characters or sequential numbers. 7. Verify the password is not accepted. If the MDM console "Maximum Sequential Character" and "Maximum Sequential Number" are set to more than two repeating or sequential characters for the Knox CONTAINER or on the Samsung Android 8 with Knox device, a password with more than two repeating or sequential characters is accepted for the Knox CONTAINER, this is a finding.
Configure Samsung Android 8 with Knox to prevent CONTAINER passwords from containing more than two repeating or sequential characters. On the MDM console, do the following: 1. Set the "Maximum Sequential Characters" value to "2" in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 2. Set the "Maximum Sequential Numbers" value to "2" in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has been configured with a minimum password complexity. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Restrictions" rule. 2. Verify the setting is "PIN" (see note). On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Screen lock type". 4. Verify "Swipe", "Pattern", and, "None" are disabled (grayed out) and cannot be enabled. If the MDM console "Minimum Password Complexity" is not configured to "PIN" or on the Samsung Android 8 with Knox device, the user can enable the setting, this is a finding. Note: Some MDM consoles may display “Numeric” and “Numeric-Complex” instead of “PIN”. Either selection is acceptable but “Numeric-Complex” is recommended. Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Configure Samsung Android 8 with Knox to have a minimum password complexity. On the MDM console, configure "Minimum Password Complexity" to "PIN" in the "Android Password Restrictions" rule. Note: Some MDM consoles may display “Numeric” and “Numeric-Complex” instead of “PIN”. Either selection is acceptable but “Numeric-Complex” is recommended. Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing minimum CONTAINER password complexity. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 2. Verify the value of the setting is "PIN" (see note). On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace settings". 3. Select "Lock type". 4. Enter current password. 5. Verify "Pattern" is grayed out and cannot be selected. If the MDM console "Minimum Password Complexity" is not set to "PIN" or on the Samsung Android 8 with Knox device, the user is able to select "Pattern" from the "Lock Type" setting, this is a finding. Note: This configuration setting will allow users to implement fingerprint unlock for the CONTAINER, which is approved for use. However, this approval does not extend to fingerprint unlock for the Samsung device or any other DoD mobile device. Note: Some MDM consoles may display “Numeric” and “Numeric-Complex” instead of “PIN”. Either selection is acceptable but “Numeric-Complex” is recommended. Alphabetic, Alphanumeric, and Complex are also acceptable selections but these selections will cause the user to select a complex password, which is not required by the STIG.
Configure Samsung Android 8 with Knox to enforce minimum CONTAINER password complexity. On the MDM console, set the "Minimum Password Complexity" value to "PIN" in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. Note: Some MDM consoles may display “Numeric” and “Numeric-Complex” instead of “PIN”. Either selection is acceptable but “Numeric-Complex” is recommended. Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to lock the screen after 15 minutes (or less) of inactivity. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Maximum Time to Lock" setting in the "Android Password Restrictions" rule. 2. Verify the value of the setting is the organization-defined value minus the maximum screen timeout or less. In this case, with Android 8, the value of the setting must be 5 minutes or less. On the Samsung Android 8 with Knox device, do the following: 1. Unlock the device. 2. Refrain from performing any activity on the device for 15 minutes. 3. Verify the device requires the user to enter the device unlock password to access the device. If the MDM console "Maximum Time to Lock" is not set to 5 minutes or less for the lock timeout or on the Samsung Android 8 with Knox device, if after 15 minutes of inactivity the user does not have to enter a password to unlock the device, this is a finding. Note: This value defines the amount of time from when the screen turns off until the device locks. Since the maximum screen timeout a user can select on Android 8 is 10 minutes, a 5-minute or less lock time value fulfills this requirement.
Configure Samsung Android 8 with Knox to lock the device display after 15 minutes (or less) of inactivity. On the MDM console, configure the "Maximum Time to Lock" option to 15 minutes in the "Android Password Restrictions" rule. Note: On some devices the max time to lock is the sum of the display screen timeout setting and the secured lock time setting on the device. On MDM configuration, the device makes a choice for these settings so that the sum is 15 minutes or less.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is configured to lock the CONTAINER after 15 minutes (or less) of inactivity. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Maximum Time to Lock" setting in the "Password Restrictions" rule. 2. Verify the value of the setting is the organization-defined value (15 minutes). On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Refrain from using the Knox CONTAINER for 15 minutes. 3. Verify the device requires the user to enter the CONTAINER unlock password to access the CONTAINER. If the MDM console "Maximum Time to Lock" is not set to the organization-required value (15 minutes) or less or on the Samsung Android 8 with Knox device, the Knox CONTAINER does not lock after 15 minutes, this is a finding. Note: If "When screen turns off" is selected in the Samsung Android 8 with Knox CONTAINER setting "Workspace settings >> Auto lock Workspace", the CONTAINER will not lock until the screen turns off, regardless of the maximum lock timeout.
Configure the Samsung Android 8 with Knox CONTAINER to lock the CONTAINER after 15 minutes (or less) of inactivity. On the MDM CONTAINER console, set the "Maximum Time to Lock" to 15 minutes in the "Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set to "10" or fewer. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Maximum Failed Attempts for wipe" field in the "Android Password Restrictions" rule for the device unlock password. 2. Verify the value of the setting is set to "10" or fewer. If the MDM console "Maximum Failed Attempts for wipe" is not set to "10" or fewer, this is a finding.
Configure Samsung Android 8 with Knox to allow only 10 or fewer consecutive failed authentication attempts. On the MDM console, set the "Maximum Failed Attempts for wipe" to "10" or fewer in the "Android Password Restrictions" rule for the device unlock password.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing 10 or fewer failed CONTAINER authentication attempts. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Maximum Failed Attempts for wipe" field in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule. 2. Verify the value of the setting is "10" or fewer. If the MDM console "Maximum Failed Attempts for wipe" is not set to "10" or fewer or on the Samsung Android 8 with Knox device, the user is able to fail more than 10 authentication attempts, this is a finding.
Configure Samsung Android 8 with Knox to enforce 10 or fewer failed CONTAINER authentication attempts. On the MDM console, set the "Maximum Failed Attempts for wipe" to the organization-defined value in the "Android Knox CONTAINER >> CONTAINER Password Restrictions" rule.
Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to disable Trust Agents. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Password Restrictions" rule. 2. Verify the settings are "Alphanumeric". 3. Ask the MDM Administrator to display the "Disable Keyguard Trust Agents" check box in the "Android Password Restrictions" rule. 4. Verify the check box is selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "Trust agents". 5. Verify all Trust Agents are disabled (grayed out) and cannot be enabled. If the MDM console "Disable Keyguard Trust Agents" check box is not selected, or if "Minimum Password Complexity" is not configured to "Alphanumeric", or on the Samsung Android 8 with Knox device, the user can enable the settings, this is a finding.
Configure Samsung Android 8 with Knox to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor (e.g., using a fingerprint, iris, face, voice, or hybrid authentication factor) unless the mechanism is DoD approved. Configure Samsung Android 8 with Knox to disable Trust Agents. On the MDM console, select the "Disable Keyguard Trust Agents" setting in the "Android Password Restrictions" rule. Note: Disabling Trust Agents will disable Smart Lock.
Review documentation on the Samsung Android 8 with Knox CONTAINER and inspect the configuration on the Samsung Android 8 with Knox CONTAINER to disable Trust Agents. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox CONTAINER device. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Password Restrictions" rule. 2. Verify the settings are "Alphanumeric". 3. Ask the MDM Administrator to display the "Disable Keyguard Trust Agents" check box in the "Android Password Restrictions" rule. 4. Verify the check box is selected. On the Samsung Android 8 with Knox CONTAINER device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "Trust agents". 5. Verify all Trust Agents are disabled (grayed out) and cannot be enabled. If the MDM console "Disable Keyguard Trust Agents" check box is not selected, or if "Minimum Password Complexity" is not configured to "Alphanumeric", or on the Samsung Android 8 with Knox CONTAINER device, the user can enable the settings, this is a finding.
Configure Samsung Android 8 with Knox CONTAINER to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor (e.g., using a fingerprint, iris, face, voice, or hybrid authentication factor) unless the mechanism is DoD approved. Configure the Samsung Android 8 with Knox CONTAINER to disable Trust Agents. On the MDM CONTAINER console, select the "Disable Keyguard Trust Agents" setting in the "Android Password Restrictions" rule. Note: Disabling Trust Agents will disable Smart Lock.
Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to disable Face Recognition. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Restrictions" rule. 2. Verify the settings are "Alphanumeric". 3. Ask the MDM Administrator to display the "Face recognition" and "Iris Scanner" check box in the "Password Policy" rule. 4. Verify at least one of the check boxes is deselected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Screen lock type". 4. Enter PIN. 5. "Intelligent Scanning" will be grayed out. If on the MDM console the "Face recognition" check box or the "Iris Scanner" check box is not deselected or on the Samsung 8 mobile device in the "Password Policy" rule "Intelligent Scanning" is not grayed out, this is a finding.
Configure Samsung Android 8 with Knox to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor (e.g., using a fingerprint, iris, face, voice, or hybrid authentication factor), unless the mechanism is DoD approved. On the MDM console, deselect the "Face" or "Iris" check box in the "Android Password Restrictions" rule.
Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to disable Face Recognition. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Minimum Password Complexity" setting in the "Android Restrictions" rule. 2. Verify the settings are "Alphanumeric". 3. Ask the MDM Administrator to display the "Face recognition" check box in the "Password Policy" rule. 4. Verify the check box is deselected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Screen lock type". 4. Enter PIN. 5. "Face recognition" will be grayed out. If the MDM console the "Face recognition" check box is not deselected or on the Samsung Android 8 device "Face recognition" is not grayed out, this is a finding.
Configure the mobile operating system to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor (e.g., using a fingerprint, iris, face, voice, or hybrid authentication factor) unless the mechanism is DoD approved. On the MDM console, deselect the "Face" check box in the "Android Password Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing disabled automatic completion of CONTAINER browser text input. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Auto-Fill" check box in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the check box is not set. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Launch the browser application. 3. Select the application's setting menu. 4. Select "Auto fill profile". 5. Select "Auto fill profile" and attempt to create a profile. 6. Select "Privacy" from the setting menu. 7. Attempt to enable "Save sign-in info". If the MDM console "Allow Auto-Fill" check box is set or on the Samsung Android 8 with Knox device, the user is able to successfully create a profile or enable "Save sign-in info", this is a finding.
Configure the Samsung Android 8 with Knox to enforce disabled automatic completion of CONTAINER browser text input. On the MDM console, deselect the "Allow Auto-Fill" check box in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule.
Note: This requirement is only applicable for tablet devices. Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to disable multi-user modes. This validation procedure is performed on the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow multi-user mode" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Attempt to add a user in the "User" setting. 3. Verify that the "User" setting is not available. If the MDM console "Allow multi-user mode" check box is selected or on the Samsung Android 8 with Knox device, the user is able to add a user, this is a finding.
Note: This requirement is only applicable for tablet devices. Configure the Samsung Android 8 with Knox to disable multi-user modes. On the MDM console, deselect the "Allow multi-user mode" setting in the "Android MultiUser" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the device disables automatic transfer of diagnostic data to an external server other than an MDM service with which the device has enrolled. Disabling automatic transfer of diagnostic data to an external device on Samsung Android 8 with Knox involves three steps: 1. Disable Google Crash report. 2. Disable Report diagnostic information. 3. Disable Google Usage and diagnostics. This validation procedure covers the first of these steps. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Google Crash Report" check box in the "Android Restrictions" rule. 2. Verify the setting is not selected. If the MDM console "Allow Google Crash Report" check box is selected, this is a finding.
Configure the Samsung Android 8 with Knox to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Configure the mobile operating system to disable Google Crash Report. On the MDM console, deselect the "Allow Google Crash Report" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the device disables automatic transfer of diagnostic data to an external server other than an MDM service with which the device has enrolled. Disabling automatic transfer of diagnostic data to an external device on Samsung Android 8 with Knox involves three steps: 1. Disable Google Crash report. 2. Disable Report diagnostic info. 3. Disable Google Usage and diagnostics. This validation procedure covers the second of these steps. This validation procedure is performed on the Samsung Android 8 with Knox only. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "General management". 3. Verify the "Report diagnostic info" setting is off. If the Samsung Android 8 with Knox device "Report diagnostic information" setting is enabled, this is a finding. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement.
Configure Samsung Android 8 with Knox to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Configure the mobile operating system to disable Report diagnostic information. 1. Open the device settings. 2. Select "General management". 3. Uncheck the "Report diagnostic info" setting.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the device disables automatic transfer of diagnostic data to an external server other than an MDM service with which the device has enrolled. Disabling automatic transfer of diagnostic data to an external device on Samsung Android 8 with Knox CONTAINER involves three steps: 1. Disable Google Crash report. 2. Disable Report diagnostic info. 3. Disable Google Usage and diagnostics. This validation procedure covers the first of these steps. This validation procedure is performed on the MDM Administration Console only. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Allow Google Crash Report" check box in the "Android Restrictions" rule. 2. Verify the setting is not selected. If the MDM console "Allow Google Crash Report" check box is selected, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Configure the mobile operating system to disable Google Crash Report. On the MDM CONTAINER console, deselect the "Allow Google Crash Report" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the device disables automatic transfer of diagnostic data to an external server other than an MDM service with which the device has enrolled. Disabling automatic transfer of diagnostic data to an external device on Samsung Android 8 with Knox involves three steps: 1. Disable Google Crash report. 2. Disable Report diagnostic info. 3. Disable Google Usage and diagnostics. This validation procedure covers the third of these steps. This validation procedure is performed on the Samsung Android 8 with Knox only. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Google". 3. Select "Usage & diagnostics" in the overflow menu. 4. Verify the setting is off. If the Samsung Android 8 with Knox "Usage & diagnostics" setting is enabled, this is a finding. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement.
Configure Samsung Android 8 with Knox to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Configure the mobile operating system to disable Report diagnostic info. 1. Open the device settings. 2. Select "Google". 3. Select "Usage & diagnostics" in the overflow menu. 4. Uncheck the setting.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the device CONTAINER disables automatic transfer of diagnostic data to an external server other than an MDM service with which the device has enrolled. Disabling automatic transfer of diagnostic data to an external device on Samsung Android 8 with Knox involves three steps: 1. Disable Google Crash report. 2. Disable Report diagnostic info. 3. Disable Google Usage and diagnostics. This validation procedure covers the third of these steps. This validation procedure is performed on the Samsung Android 8 with Knox CONTAINER only. On the Samsung Android 8 with Knox CONTAINER, do the following: 1. Open the workspace settings. 2. Select "Google". 3. Select "Usage & diagnostics" in the overflow menu. 4. Verify the setting is off. If the Samsung Android 8 with Knox CONTAINER "Usage & diagnostics" setting is enabled, this is a finding. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement.
Configure the Samsung Android 8 with Knox CONTAINER to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Configure the mobile operating system CONTAINER to disable Google Usage & diagnostics. 1. Open the workspace settings. 2. Select "Google". 3. Select "Usage & diagnostics" in the overflow menu. 4. Uncheck the setting.
Review documentation on Samsung Android 8 with Knox and inspect the configuration on Samsung Android 8 with Knox to disable all Bluetooth profiles except for HSP, HFP, SPP, A2DP, AVRCP, and PBAP. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allowed Bluetooth Profiles" settings in the "Android Bluetooth" rule. 2. Verify the only profiles selected are HSP, HFP, SPP, A2DP, AVRCP, and PBAP. On the Samsung Android 8 with Knox device, do the following: 1. Attempt to pair a Bluetooth peripheral that uses profiles other than HSP, HFP, SPP, A2DP, AVRCP, and PBAP (e.g., a Bluetooth keyboard). 2. Verify the Bluetooth peripheral does not pair with the Samsung Knox for Android device. If the MDM console "Allowed Bluetooth Profiles" is set to profiles other than HSP, HFP, SPP, A2DP, AVRCP, or PBAP or the Samsung Android 8 with Knox device is able to pair with a Bluetooth keyboard, this is a finding. Note: Disabling the Bluetooth radio will satisfy this requirement.
Configure the Samsung Android 8 with Knox to disable all Bluetooth profiles except for HSP, HFP, SPP, A2DP, AVRCP, and PBAP. On the MDM console, ensure that all options are deselected except HFP, HSP, SPP, A2DP, AVRCP, and PBAP in the "Allowed Bluetooth Profiles" setting in the "Android Bluetooth" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to disallow new admin installations. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Prevent New Admin Install" check box in the "Android Advanced Restrictions" rule. 2. Verify the check box is selected. Note: With some MDM consoles, this policy is automatically configured when the user enrolls with the MDM. Note: Android Device Manager must first be disabled on the device in order to successfully apply this policy. This can only be done manually on the device by selecting "Lock screen and security", "Other security settings", and "Device admin apps" and then disabling Android Device Manager. On the Samsung Android 8 with Knox device, do the following: 1. Attempt to install an application that requires admin permissions. 2. Verify the application is blocked from being installed. If the MDM console "Prevent New Admin Install" check box is not selected or on the Samsung Android 8 with Knox device, the user is able to install another application requiring admin permissions on the device, this is a finding.
Configure the Samsung Android 8 with Knox to disallow new admin installations. On the MDM console, select the "Prevent New Admin Install" check box in the "Android Advanced Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to Disable Admin Remove. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Admin Remove" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "Device admin apps". 5. Verify the enterprise MDM agent is on and cannot be turned off. If the MDM console "Allow Admin Remove" check box is selected or on the Samsung Android 8 with Knox device, "Device Administrators" cannot be turned off, this is a finding.
Configure the Samsung Android 8 with Knox to Disable Admin Remove. On the MDM console, deselect the "Allow Admin Remove" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is configured to disallow new admin installations. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Prevent New Admin Install" check box in the "Android Advanced Restrictions" rule. 2. Verify the check box is selected. Note: With some MDM consoles, this policy is automatically configured when the user enrolls with the MDM. Note: Android Device Manager must first be disabled on the device in order to successfully apply this policy. This can only be done manually on the device by selecting "Lock screen and security", "Other security settings", and "Device admin apps" and then disabling Android Device Manager. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Attempt to install an application that requires admin permissions. 2. Verify the application is blocked from being installed. If the MDM console "Prevent New Admin Install" check box is not selected or on the Samsung Android 8 with Knox device CONTAINER, the user is able to install another application requiring admin permissions on the device, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to disallow new admin installations. On the MDM CONTAINER console, select the "Prevent New Admin Install" check box in the "Android Advanced Restrictions" rule.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is configured to disable S Voice. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Allow S Voice" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Open the device settings. 2. Select "Applications". 3. Verify the S Voice application cannot be selected. If the MDM console "Allow S Voice" check box is selected or on the Samsung Android 8 with Knox device CONTAINER, the S Voice application can be launched, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to disable S Voice. On the MDM CONTAINER console, deselect the "Allow S Voice" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Disable USB Media Player" check box in the "Android Restrictions" rule. 2. Verify the "Disable USB Media Player" check box is selected. Note: Disabling USB Media Player will also disable USB MTP, USB mass storage, and USB vendor protocol (Smart Switch, KIES). On the Samsung Android 8 with Knox device, connect the device to a PC USB connection. Note: Do not use a DoD network-managed PC for this test! On the PC: Verify the device is not shown in the PC finder. If the MDM console "Disable USB Media Player" is not set to disable USB mass storage mode or with the Samsung Android 8 with Knox device, it is shown as a USB mass storage device on the PC, this is a finding.
Configure Samsung Android 8 with Knox to disable USB mass storage mode. On the MDM console, select the "Disable USB Media Player" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing CC mode. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "CC Mode State" settings in the "Android Advanced Restrictions" rule. 2. Verify the value is "Enabled". 3. Verify all the prerequisites have been met. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "About Device". 3. Select "Software info". (Note: On some devices, this step is not needed.) 4. Verify the value of "Security software version" does not display "Disabled". If the MDM console "CC Mode State" is not set to "Enabled" with all prerequisites met or on the Samsung Android 8 with Knox device, "Security software version" displays "Disabled", this is a finding.
Configure Samsung Android 8 with Knox to enforce CC mode. On the MDM console, enable the "Enable CC mode" setting in the "Android Advanced Restrictions" rule. Note: Before applying CC policy, the CC mode state will be "Ready". Once policy is applied, the state will change to "Enabled" even if the device does not meet all the prerequisites. To be fully CC compliant, the Administrator must ensure all prerequisites are met. If the device is tampered with, a self-test failed, or some other error has occurred, the state will change to "Disabled". Note: To fully enable CC mode, the prerequisites below should be satisfied: 1. Enable Device Encryption. 2. Enable Secure Startup. 3. Enable SD Card Encryption. 4. Set maximum Password Attempts before Wipe. 5. Enable Certificate Revocation. 6. Disable Password History. 7. Disable Face Recognition. 8. Set password "Alphanumeric".
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to disable manual date and time changes. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Date Time Changes Enabled" check box in the "Android Date Time" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "General management". 3. Select "Date and time". 4. Verify "Automatic date and time" is on. 5. Verify a user cannot turn off "Automatic date and time". If the MDM console "Date Time Changes Enabled" is set or on the Samsung Android 8 with Knox device, "Automatic date and time" is not set or the user is able to turn off this option, this is a finding.
Configure Samsung Android 8 with Knox to disable manual date and time changes. On the MDM console, deselect the "Date Time Changes Enabled" check box in the "Android Date Time" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to disable USB host modes. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the “USB exception list” setting in the “Android Restrictions” rule. 2. Verify only the HID USB class is selected. On the Samsung Android 8 with Knox device, do the following: 1. Connect a Micro USB to USB OTG adapter to the device. 2. Connect a USB thumb drive to the adapter. 3. Verify the device cannot access the USB thumb drive. If the MDM console “USB exception list” setting has non-HID USB classes selected or on the Samsung Android 8 with Knox device, the user is able to access the USB thumb drive from the device, this is a finding.
Configure Samsung Android 8 with Knox to disable USB host modes. On the MDM console, select the HID USB class in the “USB host mode exception list” setting in the “Android Restrictions” rule.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is enforcing disabling of "Share Via List". This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM administrator to display the "Allow Share Via List" check box in the "Android CONTAINER Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device CONTAINER, attempt to share via list. If the MDM console "Allow Share Via List" is selected in the CONTAINER or on the Samsung Android 8 with Knox device, the user is able to successfully share via list in the CONTAINER, this is a finding.
Configure Samsung Android 8 with Knox to enforce disabling "Share Via List". On the MDM console, deselect the "Allow Share Via List" check box in the "Android CONTAINER Restrictions" rule. Note: Disabling "Share Via List" will also disable functionality such as "Gallery Sharing" and "Direct Sharing".
If the feature is not present as described on a specific device model, this requirement is Not Applicable (NA). Review documentation on the Samsung Android 8 with Knox CONTAINER and inspect the configuration on the Samsung Android 8 with Knox CONTAINER to disable upload of DoD contact information. This validation procedure is performed on the Samsung Android 8 with Knox device CONTAINER only. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Open the CONTAINER settings. 2. Select "Apps". 3. Verify no Smart Call and caller ID applications in the list are set to upload contact information. If on the Samsung Android 8 with Knox device CONTAINER, a smart call or caller ID application is set to upload DoD contact information, this is a finding. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement.
If the feature is not present as described on a specific device model, this requirement is Not Applicable (NA). Configure the Samsung Android 8 with Knox CONTAINER to disable upload of DoD contact information. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Open the CONTAINER settings. 2. Select "Apps". 3. Verify no Smart Call and caller ID applications in the list are set to upload contact information.
Verify Wi-Fi Sharing is disabled or alternately, the "Wi-Fi Tethering/Mobile Hotspot" control is disabled. Determine if the Authorizing Official (AO) has approved Wi-Fi Tethering/Mobile Hotspot use. Written approval must be presented for verification of AO approval. If there is no written AO approval for Wi-Fi Tethering/Mobile Hotspot use, do the following: On the MDM console, verify the "Wi-Fi Tethering/Mobile Hotspot" control is disabled in the "WiFi Policy" rule. If the AO has approved Wi-Fi Tethering/Mobile Hotspot use, do the following: On a sample of site Samsung devices, go to Settings >> Connections >> Mobile Hotspot and Tethering >> Mobile Hotspot and verify "Wi-Fi Sharing" is turned off. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement. If the AO has not approved Wi-Fi Tethering/Mobile Hotspot use and on the MDM console the "Wi-Fi Tethering/Mobile Hotspot" control is not disabled in the "WiFi Policy" rule, this is a finding. If the AO has approved Wi-Fi Tethering/Mobile Hotspot use and the "Wi-Fi Sharing" setting on a Samsung device is turned on, this is a finding.
Disable Wi-Fi Sharing using one of the following methods: 1. If the AO has not approved hotspot tethering for site Samsung devices, on the MDM console, select the "Disable Wi-Fi Tethering/Mobile Hotspot"" check box in the "WiFi Policy" rule. 2. If the AO has approved hotspot tethering for site Samsung devices, on the Samsung device, go to Settings >> Connections >> Mobile Hotspot and Tethering >> Mobile hotspot. Turn off "Wi-Fi Sharing" if it is enabled. Note: Mobile Hotspot must be enabled in order to enable Wi-Fi Sharing. Wi-Fi Sharing is disabled by default.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the capability to back up to a remote system has been disabled. This validation procedure is performed on the MDM Administration Console and the Samsung device: On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the "Allow Google Accounts Auto Sync" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. 3. View the "application disable list". 4. Verify the list contains all pre-installed cloud backup applications. On the Samsung Android 8 with Knox device: 1. Attempt to launch a cloud backup application located on the device. 2. Verify the application will not launch. If the MDM console "Allow Google Accounts Auto Sync" check box is selected or on the Samsung Android 8 with Knox device CONTAINER, the user can enable "Back up my data", this is a finding. If the "Application disable list" configuration in the MDM console does not contain all pre-installed public cloud backup applications or if the user is able to successfully launch an application on this list, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to disable backup to remote systems (including commercial clouds). On the MDM CONTAINER console, do the following: 1. Deselect the "Allow Google Accounts Auto Sync" check box in the "Android Restrictions" rule. 2. List all pre-installed public cloud backup applications in the application disable list.
Review Samsung Android 8 with Knox configuration settings to determine if the capability to back up to a locally connected system has been disabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Disable USB Media Player" check box in the "Android Restrictions" rule. 2. Verify the "Disable USB Media Player" check box is selected. Note: Disabling USB Media Player will also disable USB MTP, USB mass storage, and USB vendor protocol (Smart Switch, KIES). On the Samsung Android 8 with Knox device, connect the device to a PC USB connection. Note: Do not use a DoD network-managed PC for this test! On the PC: 1. Install and launch Samsung Smart Switch (Note: Samsung KIES for older devices) on the PC. 2. Verify the device does not connect with the Samsung Smart Switch program. If the MDM console "Disable USB Media Player" is not set to "Disabled" or on the Samsung Android 8 with Knox device, it connects with the Samsung Smart Switch or KIES program, this is a finding.
Configure Samsung Android 8 with Knox to disable backup to locally connected systems. On the MDM console, select the "Disable USB Media Player" check box in the "Android Restrictions" rule. Note: Disabling USB Media Player will also disable USB MTP, USB mass storage, and USB vendor protocol (Smart Switch, KIES).
Review Samsung Android 8 with Knox configuration settings to determine if the capability to back up to a remote system has been disabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Google Backup" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Accounts". 3. Select "Backup and restore". 4. Verify "Back up my data" is disabled and cannot be enabled. If the MDM console "Allow Google Backup" check box is selected or on the Samsung Android 8 with Knox device, the user can enable "Back up my data", this is a finding.
Configure Samsung Android 8 with Knox to disable backup to remote systems (including commercial clouds). On the MDM console, deselect the "Allow Google Backup" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Developer Mode" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Developer options". (**) 3. Attempt to enable "Developer options". If the MDM console "Allow Developer Mode" check box is selected or on the Samsung Android 8 with Knox device, "Developer options" can be enabled by the user, this is a finding. Note: The "Developer Modes" configuration setting may not be available in older MDM consoles. Disabling USB Debugging and Mock Locations also disables Developer modes on the mobile device. (**) "Developer options" is initially hidden to users. To unhide this menu item: 1. Open the device settings. 2. Select "About device". 3. Select "Software info". (Note: On some devices, this step is not needed.) 4. Rapidly tap on "Build number" multiple times until the device displays the Developer Options menu item.
Configure the Samsung Android 8 with Knox to disable developer modes. On the MDM console, deselect the "Allow Developer Mode" check box in the "Android Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has enabled authentication of personal hotspot connections to the device using a pre-shared key. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow Unsecured Hotspot" check box in the "WiFi Policy" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Connections". 3. Select "Mobile Hotspot and Tethering". 4. Select "Mobile hotspot". 5. Select "Configure Mobile hotspot" more options. 6. Verify the user cannot save the configuration with security set to "Open". If the MDM console "Allow Unsecured Hotspot" check box is selected or the Samsung Android 8 with Knox device can be configured as a Mobile Hotspot with Open Security, this is a finding.
Configure Samsung Android 8 with Knox to enable authentication of personal hotspot connections to the device using a pre-shared key. On the MDM console, deselect the "Allow Unsecured Hotspot" check box in the "WiFi Policy" rule.
Review configuration settings to confirm the most recently released version of Samsung Android is installed. This validation procedure is performed on both the MDM console and the Samsung Android 8 with Knox device. In the MDM management console, review the version of Samsung Android installed on a sample of managed devices. This procedure will vary depending on the MDM product. See the notes below to determine the latest available OS version. On the Samsung device: 1. Open the "Settings". 2. Tap "About phone" and then "Software information" to see the version number of the installed Android OS. 3. Tap "Software update" and "Check for updates" to determine if an OS update is available. 4. Verify the following message is shown on the screen: "Current software is up to date". If the installed version of Android OS on any reviewed Samsung devices is not the latest released by the wireless carrier, this is a finding. Note: Some wireless carriers list the version of the latest Android OS release by mobile device model online: ATT: https://www.att.com/devicehowto/dsm.html#!/popular/make/Samsung T-Mobile: https://support.t-mobile.com/docs/DOC-34510 Verizon Wireless: https://www.verizonwireless.com/support/software-updates/ Google's Android OS patch website: https://source.android.com/security/bulletin/ Samsung's Android OS patch web site: https://security.samsungmobile.com/securityUpdate.smsb
Install the latest released version of Samsung Android OS on all managed Samsung devices. Note: In most cases, OS updates are released by the wireless carrier (for example, Sprint, T-Mobile, Verizon Wireless, and ATT).
If the mobile device does not support removable media, this requirement is Not Applicable (NA). Review Samsung Android 8 with Knox configuration settings to determine if data in the mobile device's removable storage media is encrypted. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Storage Encryption" setting in the "Android Security" rule. 2. Verify the "SD Card Encryption" setting is enabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Insert a MicroSD card into the device. 4. If the MicroSD card is not already encrypted, select "Encrypt SD card". Verify "The security policy restricts use of SD cards that are not encrypted" is displayed. 5. If the MicroSD card is encrypted, verify "Decrypt SD card" is displayed and cannot be selected. If the specified encryption settings are not set to the appropriate values, this is a finding.
Configure Samsung Android 8 with Knox to enable information at rest protection for removable media. On the MDM console, enable the "External Storage Encryption" setting in the "Android Security" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is configured to enable a Certificate Revocation Status (CRL) Check. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the package list in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 2. Verify the string is "*" (asterisk). 3. Ask the MDM Administrator to display the enable check box in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 4. Verify the check box is selected. If the MDM console "Certificate Revocation Check (CRL)" settings are not enabled for all packages, this is a finding.
Configure Samsung Android 8 with Knox to enable a Certificate Revocation Status (CRL) Check. On the MDM console, do the following: 1. Enter the string "*" (asterisk) in the package list in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 2. Select the enable check box in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule.
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device is configured to enable a Certificate Revocation Status (CRL) Check. This validation procedure is performed on the MDM Administration Console only. On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the package list in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 2. Verify the string is "*" (asterisk). 3. Ask the MDM Administrator to display the enable check box in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 4. Verify the check box is selected. If the MDM console "Certificate Revocation Check (CRL)" settings are not enabled for all packages, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to enable a Certificate Revocation Status (CRL) Check. On the MDM CONTAINER console, do the following: 1. Enter the string "*" (asterisk) in the package list in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule. 2. Select the enable check box in the "Certificate Revocation Check (CRL)" settings in the "Android Certificate" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has the DoD root and intermediate PKI certificates installed. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNet) or http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNet). On the MDM console, do the following: 1. Ask the MDM Administrator to display the list of server authentication certificates in the "Android Certificate" rule. 2. Verify the DoD root and intermediate PKI certificates are present. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "View security certificates". 5. Review Certificate Authorities listed under the "System" and "User" tabs. 6. Verify the presence of the DoD root and intermediate certificates. If the MDM console "Android Certificate" does not have the DoD root and intermediate PKI certificates present or on the Samsung Android 8 with Knox device, "View security certificates" does not have the DoD root and intermediate PKI certificates present, this is a finding.
Configure Samsung Android 8 with Knox to install DoD root and intermediate certificates. On the MDM console, add the PEM encoded representations of the DoD root and intermediate certificates to the certificate whitelist in the "Android Certificate" rule. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNet) or http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNet).
Review Samsung Android 8 with Knox CONTAINER configuration settings to determine if the mobile device has the DoD root and intermediate PKI certificates installed. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNet) or http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNet). On the MDM CONTAINER console, do the following: 1. Ask the MDM Administrator to display the list of server authentication certificates in the "Android Certificate" rule. 2. Verify the DoD root and intermediate PKI certificates are present. On the Samsung Android 8 with Knox device CONTAINER, do the following: 1. Open the device settings. 2. Select "Lock screen and security". 3. Select "Other security settings". 4. Select "View security certificates". 5. Review Certificate Authorities listed under the "System" and "User" tabs. 6. Verify the presence of the DoD root and intermediate certificates. If the MDM console "Android Certificate" does not have the DoD root and intermediate PKI certificates present or on the Samsung Android 8 with Knox device CONTAINER, "View security certificates" does not have the DoD root and intermediate PKI certificates present, this is a finding.
Configure the Samsung Android 8 with Knox CONTAINER to install DoD root and intermediate certificates. On the MDM CONTAINER console, add the PEM encoded representations of the DoD root and intermediate certificates to the certificate whitelist in the "Android Certificate" rule. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNet) or http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNet).
The DoD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Discussion): 1. By placing the DoD warning banner text in the user agreement signed by each Samsung device user (preferred method) 2. By configuring the required banner text on the MDM console and pushing the security policy with the banner to each managed device Determine which method is used at the Samsung device site and follow the appropriate validation procedure below. Validation Procedure for Method #1: Review the signed user agreements for several Samsung device users and verify the agreement includes the required DoD warning banner text. Validation Procedure for Method #2: This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Banner Text" field in the "DoD Banner" settings in the "Android Security" rule. 2. Verify the correct DoD-specified warning text is displayed in the Banner Text field or the field is blank. 3. Ask the MDM Administrator to display the enable check box in the "DoD Banner" settings in the "Android Security" rule. 4. Verify the check box is selected. On the Samsung Android 8 with Knox device, do the following: 1. Reboot the device. 2. Verify the device displays the DoD banner. 3. Verify the DoD banner is set to one of the authorized messages. If for Method #1, the required warning banner text is not on all signed user agreements reviewed, this is a finding. If for Method #2, the MDM console "DoD Banner" enable check box is not selected, or the "Banner Text" is not set to the appropriate designated wording, or the Samsung Android 8 with Knox device does not display a warning banner with the appropriate designated wording when rebooted, this is a finding.
Configure the DoD warning banner by either of the following methods (required text is found in the Vulnerability Discussion): 1. Place the DoD warning banner text in the user agreement signed by each Samsung device user. 2. Configure Samsung Android 8 with Knox to display the DoD-mandated warning banner text. On the MDM console, do the following: 1. Enter the correct text in the "Banner Text" field in the "DoD Banner" settings in the "Android Security" rule. 2. Select the "Enable" check box in the "DoD Banner" settings in the "Android Security" rule. Note: If enabled without configuring the "Banner Text", the device will display a default text that matches the required DoD banner. Note: On some MDM vendor consoles, the logon banner automatically is displayed upon reboot while the device is MDM enrolled. On these consoles, this control is not configurable through the MDM server or on the device.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing not allowing moving of files from CONTAINER to Personal. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Move Files from CONTAINER to Personal" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "My Files" application. 3. Select a file by long pressing a selection. 4. Select "Settings". 5. Select "Move to Personal mode". 6. Verify this operation is blocked. If the MDM console "Move Files from CONTAINER to Personal" is not set to disabled or on the Samsung Android 8 with Knox device, the user is able to successfully move the selected file to the personal space, this is a finding.
Configure the Samsung Android 8 with Knox to enforce not allowing move of files from CONTAINER to Personal. On the MDM console, disable the "Move Files from CONTAINER to Personal" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing disabled sharing of calendar information outside the CONTAINER. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow calendar info outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace settings". 3. Select "Notifications and data". 4. Select "Contacts and Calendar". 5. Verify "Export to Personal Mode – Calendar (from Workspace)" (on some devices, shown as "Export to Personal Mode - S Planner") is disabled and attempt to enable this setting. If the MDM console "Allow calendar info outside CONTAINER" is not set to disabled or on the Samsung Android 8 with Knox device, the user can enable this setting, this is a finding.
Configure Samsung Android 8 with Knox to enforce disabled sharing of calendar information outside the CONTAINER. On the MDM console, disable the "Allow calendar info outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing disabled sharing of clipboard data outside the CONTAINER. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow clipboard data outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Copy text to the clipboard using any CONTAINER application. 3. Verify this text cannot be pasted to an application in the personal space. If the MDM console "Allow clipboard data outside CONTAINER" is not set to "Disabled" or on the Samsung Android 8 with Knox device, the user is able to paste work data, this is a finding.
Configure Samsung Android 8 with Knox to enforce disabled sharing of clipboard data outside the CONTAINER. On the MDM console, disable the "Allow clipboard data outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing the disabling of sharing of contact information outside the CONTAINER. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow contact info outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace settings". 3. Select "Notifications and data". 4. Select "Contacts and Calendar". 5. Verify "Export to Personal Mode - Contacts (from Workspace)" is disabled and attempt to enable this setting. If the MDM console "Allow contact info outside CONTAINER" is not set to disabled or on the Samsung Android 8 with Knox device, the user is able to enable this setting, this is a finding.
Configure Samsung Android 8 with Knox to enforce the disabling of sharing of contact information outside the CONTAINER. On the MDM console, disable the "Allow contact info outside CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule.
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device is enforcing not allowing move of applications to CONTAINER. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Move Applications to CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Restrictions" rule. 2. Verify the setting is disabled. On the Samsung Android 8 with Knox device, do the following: 1. Open the Knox CONTAINER. 2. Select "Workspace settings". 3. Verify "Install apps" cannot be selected. (Note: If the Knox CONTAINER is configured as a folder type, "Add apps" should be disabled in the overflow menu.) If the MDM console "Move Applications to CONTAINER" is not set to "Disabled" or on the Samsung Android 8 with Knox device, the user is able to select "Install apps", this is a finding.
Configure the Samsung Android 8 with Knox to enforce not allowing move of applications to CONTAINER. On the MDM console, disable the "Move Applications to CONTAINER" setting in the "Android Knox CONTAINER >> CONTAINER Application" rule.
The native VPN client on Samsung Knox for Android must be configured in one of the following configurations: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This validation procedure covers the first of these options. This procedure is Not Applicable if option 2 or 3 was implemented at the site. Review Samsung Android 8 with Knox configuration settings to determine if the mobile device native VPN client is disabled. This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Allow VPN" check box in the "Android Restrictions" rule. 2. Verify the check box is not selected. On the Samsung Android 8 with Knox device, do the following: 1. Open device settings. 2. Select "Connections". 3. Select "More connection settings". 4. Verify the "VPN" is disabled (grayed out) and cannot be selected. If the MDM console "Allow VPN" check box is selected or on the Samsung Android 8 with Knox device, the user can select "VPN", this is a finding.
Configure the Samsung Android 8 with Knox native VPN client in one of the following configurations so the device VPN is not available in the personal space: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This implementation guidance covers the first of these options. On the MDM console, deselect the "Allow VPN" check box in the "Android Restrictions" rule.
The VPN client on Samsung Knox for Android must be configured in one of the following configurations: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This validation procedure covers the second of these options. This procedure is Not Applicable (NA) if option 1 or 3 was implemented at the site. Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has VPN protection for the Knox CONTAINER only enabled. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Get All CONTAINER Packages In VPN Profile" setting in the "Generic VPN" rule. 2. Verify the value of the setting is the list of all the CONTAINER packages. 3. Ask the MDM administrator to display the list of configured VPN profiles in the "VPN profiles" rule. 4. Verify the list includes the organization VPN profile. If the MDM console "Get All CONTAINER Packages In VPN Profile" does not list all the CONTAINER Packages or "VPN profiles" does not list the organization VPN profile, this is a finding.
Configure the Samsung Android 8 with Knox VPN client in one of the following configurations so the device VPN is not available in the personal space: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This implementation guidance covers the second of these options. On the MDM Administration Console, do the following: 1. Configure the organization VPN profile in the "Enterprise VPN profiles" rule. 2. Enable "Add All CONTAINER Packages To VPN" in the "Generic VPN" rule.
The VPN client on Samsung Knox for Android must be configured in one of the following configurations: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This validation procedure covers the third of these options. This procedure is Not Applicable if option 1 or 2 was implemented at the site. Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has VPN protection for per app use for the personal side. This validation procedure is performed on the MDM Administration Console only. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Get All Packages In VPN Profile" setting in the "Generic VPN" rule. 2. Verify the value of the setting is the list of all the Authorizing Official (AO)-approved packages. 3. Ask the MDM administrator to display the list of configured VPN profiles in the "VPN profiles" rule. 4. Verify the list includes the organization VPN profile. If the MDM console "Get All Packages In VPN Profile" contains packages not AO-approved or "VPN profiles" does not list the organization VPN profile, this is a finding.
Configure the Samsung Android 8 with Knox VPN client in one of the following configurations so the device VPN is not available in the personal space: 1. Disabled; 2. Configured for CONTAINER use only; or 3. Configured for per app use for the personal side. This implementation guidance covers the third of these options. On the MDM Administration Console, do the following: 1. Configure the organization VPN profile in the "Enterprise VPN profiles" rule. 2. Add each AO-approved package to "Add Packages To VPN in the "Generic VPN" rule.
Review Samsung Android 8 with Knox configuration settings to determine if any third-party VPN client installed in the personal space/CONTAINER on the device has been configured with a DoD network (work) VPN profile. This validation procedure is performed on the Samsung Android 8 with Knox device only. On the Samsung Android 8 with Knox device, do the following: 1. Open the device settings. 2. Select "Apps". 3. Review the list of apps and if there are any VPN client apps installed, open each one in turn. Review the list of VPN profiles configured on the VPN client. 4. Verify there are no DoD network VPN profiles configured on the VPN client. If any third-party VPN client installed in the personal space has a DoD network VPN profile configured on the client, this is a finding. Note: This setting cannot be managed by the MDM Administrator and is a User Based Enforcement (UBE) requirement (unless an application whitelist/blacklist is configured for the personal space/CONTAINER).
If a third-party VPN client is installed in the personal space on a Samsung Android 8 with Knox device, do not configure the VPN client with a DoD network VPN profile.
Verify there are no installations of Samsung Android 8 at the site. If Samsung Android 8 is still being used at the site, this is a finding.
Remove all installations of Samsung Android 8.