- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Knox Configure
- Mobile
- Wearables
- Shared Device
- FAQ
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Device management
- Accept or reject devices
- Upload devices
- Delete devices
- Complete device management
- Send notifications
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQ
- KBAs
- Support
- Open API reference
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
Recovering Google FRP locked devices
This section covers how to recover devices locked with FRP.
About FRP
Samsung devices utilize built-in security measures to protect devices and their resident information. Factory reset protection (FRP) is one such feature auto-enabled on Android 5.0 and above devices utilizing a Google account. Once enabled, FRP only allows a user with a Google account password to factory reset and activate their device.
If an unauthorized individual tries to reset a target device, the device still requires a login using the device owner's Google username and password, so even if a device is lost or stolen, another person cannot conduct a factory reset and manipulate the device.
With enterprises, this is very inconvenient since company provided devices lock into an employee's Google account. If the employee were to leave the company, then the device becomes unusable as a company asset.
To utilize KME for Google FRP removal
To use KME's FRP bypass capability, complete the on a device with the FRP lock set:
-
Ensure the device is assigned a KME profile with the following options properly set:
- Verify Skip Setup Wizard is enabled for the profile. This setting is enabled by default for DO KME profiles, but must be manually enabled for DA KME profiles. For more information on configuring KME DO and DA profiles, go to: Profile configuration.
- Ensure the user is not allowed to cancel enrollment (the Allow end user to cancel enrollment checkbox is unselected). This setting is disabled by default for DO KME profiles, but must be manually disabled for DA KME profiles. For more information on configuring KME DO and DA profiles, go to: Profile configuration.
- Once the device is assigned a profile with the above settings, perform a hard factory reset using a combination of external button actions (button combinations vary per device).
- After the device powers on, connect to the network. You will be prompted for a reboot.
- Perform the reboot. The enrollment will proceed without prompting for Google account login credentials.