Knox policies in the personal profile
Last updated July 26th, 2023
As described in Device management modes, Android 11:
-
deprecates the fully managed device with a work profile, to protect user privacy on company devices that enable personal usage
-
provides a new Work profile on company-owned devices, which offers greater privacy to the end user and at the same time offer sufficient level of control to the IT admin to protect corporate assets
This page summarizes the Knox policies that can and can’t be applied to the personal side of company-owned devices with Android 11.
For similar lists of the Android policies that can and can’t be applied to the personal side, see Google’s EMM migration guidelines > Appendix A and B (requires partner login) or Android policies in the personal profile.
Knox policies allowed
For a more granular list of the atomic actions allowed, see the developer version of the list.
- Account management (Google account, Samsung account, and so on)
- App installation or update restrictions (allow and block lists for apps by package name/permission/signature)
- App start/stop
- AuditLog
- Bluetooth advanced settings (via BluetoothPolicy, except for BluetoothLog)
- Camera, microphone, screen capture, video recording
- Common Criteria (CC) mode
- Connectivity (Call/Emergency Call/SMS/MMS/Roaming/Wifi/Wifi Scanning/Bluetooth/BLE/Tethering/USB debugging/USB MTP/USB host/Mock Location/Cellular Data/WifiDirect/airplane mode/data saving/RCS) restrictions
- Customization features (via SystemManager, SettingsManager)
- DeX management
- Device inventory (for asset management)
- Email/EAS/LDAP management and restrictions
- Firmware/FOTA auto-update restrictions
- Font/date time configuration
- GPS change restriction (via setGPSStateChangeAllowed)
- Google crash report restriction
- Hypervisor Device Manager (HDM)
- Kiosk mode
- Lockscreen customization
- Multi-user mode restrictions (via allowMultipleUsers)
- NFC controls (for example, turn on/off) and restrictions
- On-device firewall management
- Password complexity management
- Power off/power saving restrictions
- Reboot banner customization (US DoD requirement)
- Remote control (screen sharing/remote input injection) restriction
- SDCard access restrictions
- SIM PIN Lock
- System app force stop restriction (via allowStopSystemApp)
- Wallpaper change restriction
- Wi-fi advanced settings (via WifiPolicy)
- Widget installation (allow and block lists)
Knox policies not allowed
If you must use one of these prohibited policies, consider using Separated Apps instead of Work profile on company-owned devices.
- Access Point Name (APN) settings
- App configuration (via setApplicationRestrictions)
- App data/cache deletion restriction
- App default settings
- App silent installation/uninstallation/update
- App status/usage/focus monitoring
- App uninstallation/force stop/prevent start restriction
- Bluetooth Log
- Browser settings (popup blocker, cookie setting, auto-fill, HTTP proxy, etc.)
- Client Certificate Management (via ClientCertificateManager, CertificateProvisioning, CertificatePolicy)
- Clipboard access/sharing restrictions (including per-app clipboard disabling)
- Clipboard data add/get/clear
- Device admin (DA) controls
- Device wipe
- Enterprise billing
- Factory reset
- Global Proxy
- Google Account auto-sync restriction
- Google backup restriction
- Knox Platform for Critical Communication (KPCC) PS-LTE features such as DRX value settings and allowing access to restricted network capabilities
- Location services, including geo-fencing (except for GPS state change restriction via setGPSStateChangeAllowed)
- Network Platform Analytics (NPA)
- Rich Communication Services (RCS) message monitoring
- TIMA KeyStore
- Universal Credential Management (UCM)
- User/multi-user granular restriction/management like allowUserCreation (except for the multi-user mode restriction via allowMultipleUsers)
- VPN
On this page
Is this page helpful?