Caution with Device Administrator Access
Warn device users not to accept requests to grant Device Administrator access to applications without good reason.
Additionally, application vetting should include a check on whether the application requests Device Administrator access. Applications that do request Device Administrator access should be carefully scrutinized and only allowed to be used if a valid reason exists.
Techniques Addressed by Mitigation
|Mobile||T1401||Abuse Device Administrator Access to Prevent Removal|
|Mobile||T1447||Delete Device Data||
There are very limited circumstances under which device administrator access should be granted.