How to detect and fix a rooted Android phone

<p>Rooted smartphones in the enterprise can pose a serious threat to security and compliance needs. What can IT administrators do to mitigate this risk?</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p><a href=”https://www.techtarget.com/searchmobilecomputing/tip/Is-Android-fragmentation-still-a-problem-for-IT-teams”>Android has an open ecosystem</a>, which means it’s fairly easy for users to install apps from different locations. Still, Android smartphones are generally shipped to end users with an approved default OS. The device manufacturer has validated the OS to work within specified parameters and integrate some degree of security controls.</p>
<p>With root access privileges, a user can bypass certain security and operating constraints that are in place on their Android device. While this can give the user extra freedom and control over their phone, it also unlocks new risks. When an employee accesses corporate data or connects to the enterprise network on such a device, it can threaten the security of the organization at large.</p>
<p>To find and remediate rooted devices, Android administrators can use enterprise mobility management (<a href=”https://www.techtarget.com/searchmobilecomputing/definition/enterprise-mobility-management-EMM”>EMM</a>) software and other tools.</p>
<section class=”section main-article-chapter” data-menu-title=”How can IT use EMM to detect rooted Android devices?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How can IT use EMM to detect rooted Android devices?</h2>
<p>There are a few ways that IT admins can pinpoint rooted Android phones. For organizations that have enrolled Android devices in an EMM platform, it’s possible to identify rooted endpoints through the following processes:</p>
<ul class=”default-list”>
<li><b>Checking for rooting indicators.</b> EMMs can search for commonly used root management applications such as Magisk or SuperSU. They can also look for signs of altered system file permissions.</li>
<li><b>Building tag verification.</b> Default Android OSes from manufacturers generally ha

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: