Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0605 | Detection of Account Access Removal | AN1655 |
Application vetting services could closely scrutinize applications that request Device Administrator permissions. |