Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0041 | Application Vetting | Permissions Requests |
Application vetting services could closely scrutinize applications that request Device Administrator permissions. |