- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Knox Mobile Enrollment
- Knox Configure
- Mobile
- Introduction
- Get started
- Features
- License management
- Release notes
- Troubleshoot
- Wearables
- Shared Device
- FAQ
- KBAs
- Mobile
- Knox Capture
- Welcome
- Overview
- How-to guides
- Manage licenses
- Scanning profiles
- Apps and activities
- Scan engine settings
- Keystroke output and data formatting
- Export configuration and deploy through EMM
- Set the camera scan trigger
- Connect a hardware scanner
- Configure the output path
- Check a configuration in test mode
- Use intent output
- Knox Capture AR
- Get started
- How-to videos
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Capture: Scandit Edition
- Introduction
- How it works
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
Configure profile policies by device platform
In a device profile, you can configure policies for device controls, such as security and app policies. After, to deploy the policies, you can apply the profile to the assigned organization or group. Going forward, for devices running a Work Profile on a company-owned device, KM now supports Knox policies.
To add policies to a profile:
- Navigate to Profile.
- On the Profile page, click the name of the profile to configure policies for.
- On the Profile Details page, click Modify Policy.
- Configure the policy details by device platform. Each device platform has different groups of policies.
- Select the platform to configure, for example, Samsung Knox.
- Find the setting you want to configure by selecting the proper category or by performing a keyword search in the Search Policy field.
- Configure the policy as needed.
-
Save the policy:
- Click Save & Assign to save your changes and proceed to assigning the profile to groups or organizations.
- Click Save to save your changes.
- In the Profile Version Update dialog, enter a description for the changes you made in this version, then click OK.
Android policy details
Freeze periods
When applying system updates to devices running Android 9 and higher, IT admins can now use the Freeze Period option to delay deployment of system update to target devices. The following are important points to consider:
- Support for all update policies — The Freeze Period option supports many update policies such as automatic, postpone, and windowed.
- Freeze periods apply one at a time — Currently, IT admins cannot set up freeze periods that overlap each other. IT admins can set up multiple freeze periods but only one freeze period applies to devices at one time.
- Freeze period duration — IT admins can add a total freeze period of 90 days.
- Multiple freeze periods — Two freeze periods cannot overlap each other and must remain separated by a minimum of 60 days.
Chrome OS policy details
On KM, Chrome OS organizations, users, and devices sync with the Google Admin console. By default, a Chrome OS policy on the KM console is unset and greyed out, because it inherits the setting from either a parent organization or the Google Admin console. When you apply a policy setting on the KM console, you are in fact overriding it.
Within an enterprise, organizations have parent-child relationships with each other. If an organization has no parent, unset policies show as Inherit from Google Default, which reflects that the original policy values come from the Google Admin console. If an organization is a child of another organization, its unset policies show as Inherit from parent organization, which reflects that the original policy values come from its parent. If a child organization has children, its policy overrides cascade down to its children.
In order to set a policy, you must first deactivate its inheritance by selecting Locally applied from the drop-down next to it: