Application vetting can detect many techniques associated with impairing device defenses.[1]
Mobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running.
| Data Component | Name | Channel |
|---|---|---|
| API Calls (DC0112) | Application Vetting | None |
| Process Termination (DC0033) | Process | None |