Will "My Knox" work fr dual booting - Verizon Samsung Galaxy S7 Questions & Answers

I have to run Intune company portal which doesn't allow me to root my phone due to my companies policies. I found My knox, but does anyone know the best way to use it so that I can root my phone and run Intune with outlook, onedrive ,etc for my company email?
I've been searching but not really finding a good guide on how to use My knox,
thanks for any advise.

rdefino said:
I have to run Intune company portal which doesn't allow me to root my phone due to my companies policies. I found My knox, but does anyone know the best way to use it so that I can root my phone and run Intune with outlook, onedrive ,etc for my company email?
I've been searching but not really finding a good guide on how to use My knox,
thanks for any advise.
Click to expand...
Click to collapse
Have this moved to the questions and answers forum

As of right now, if your in the United States, then it is impossible to dual boot an S7. Dual boot requires an unlocked bootloader in most situations; and in the US they are locked down tight. If your not in the US then it is possible with the correct firmware but again it would be near impossible to find the right files needed to run a dual boot.
TLDR: No it is beyond impractical and nearly impossible. My advice would be if your company allows it just get another phone for personal use.

Related

What is rooting?

Sorry to be so dense, but I have no idea what this is.could some one explain please. Isit similar to jail breaking of an iphone?
Because I already have downloaded games on my phone that I should of paid for and the it works perfectly fine.
Sorry for the dumb question again
alpystar said:
Sorry to be so dense, but I have no idea what this is.could some one explain please. Isit similar to jail breaking of an iphone?
Because I already have downloaded games on my phone that I should of paid for and the it works perfectly fine.
Sorry for the dumb question again
Click to expand...
Click to collapse
Google banned you or what? O_O
http://android-dls.com/wiki/index.php?title=Why_Root#You_never_know
Well "rooting" can be considered like jailbreaking but their are a few key differences (I have rooted and jailbroke before). Since Android offers many of the features iPhone doesent offer without jaybreak, rooting and Android allows the user to access many of the hidden features like setting the speed of the CPU. Rooting also allows custom roms to be installed on your phone. Roms are basically a moded version of the software your phone runs. A popular type of Rom called "Cyanogen" is available for a wide variety of Android devices. Rooting also allows free wireless tethering to your phone. What that means is that your phone emits WiFi and and of your WiFi powered devices such as an ipod or laptop can connect to it. Since rooting allows full user access to the processes of the Android phone, you warentee is also voided. But if you know what you want and how to keep your phone running then give it a shot. If you are new to the field rooting I would read more about it and how to fix it in recovery mode if you want to unroot your phone. I hope this helps.
Sent from my ADR6300 using XDA App
Its a reference to the underlying linux system, and goes back to Unix. Root was the primary user or superuser, and so root level access was the key to full admin control.
Your phone by default presents you with a limited user access, generally for your own good, by protecting access to files and folders you shouldnt normally access. Rooting refers to achieving full unrestricted access to the phone, thus enabling you to go beyond the normal user and start mucking about under the hood.
Quick question, since i stumbled upon this thread:
- Have there been cases of attempts at rooting carrier locked phones that resulted in bricks? Or is it generally safe to root carrier locked devices (if any Frenchies see this, i'm talking about SFR, Orange... more specifically.)
Cheers

Someone jacked my Sprint account

Just a heads up, somehow someone compromised my account, and was able to deactivate my phone, and activate their own EVO on my account, change plans, and change all the security info, PIN security question, and security email. A bit of a wakeup call, running rooted phones, installing apps that give themselves unfettered access...
Yes, "its your own damn fault", but whatever, just keep your eyes constantly peeled, and make sure your sprint "myaccount" settings are secure...
What ROM where you using? Any idea what apps you had installed that might have been compromising your data?
Take some screenshots of all your installed apps. Couldn't hurt.
This is more of a Sprint thing. They have a problem with internal fraud
Was using CM6 at the time. According to the rep I spoke with (that actually helped me, the first guy was a turd), they had been calling in between the 28th and 30th, on the 30th they were able to remove my device and add theirs.
I don't think it was any of the apps I have installed. I'm thinking it was either an inside job, or someone else (ie, haxor) on Sprint's nodes during the last week sniffing packets. Reason I think that is that they seemed to have compromised the security by way of changing the e-mail address that security updates go to. I don't know, its just a crappy feeling overall. Kind of like when I was mugged many years ago...
hondoslack said:
Was using CM6 at the time. According to the rep I spoke with (that actually helped me, the first guy was a turd), they had been calling in between the 28th and 30th, on the 30th they were able to remove my device and add theirs.
I don't think it was any of the apps I have installed. I'm thinking it was either an inside job, or someone else (ie, haxor) on Sprint's nodes during the last week sniffing packets. Reason I think that is that they seemed to have compromised the security by way of changing the e-mail address that security updates go to. I don't know, its just a crappy feeling overall. Kind of like when I was mugged many years ago...
Click to expand...
Click to collapse
Sprint should should just clone that account, deactivate it, ban the new ESN.
I fail to see the benefit of account jacking (especially after account owner's phone gets deactivated)
jerryparid said:
Sprint should should just clone that account, deactivate it, ban the new ESN.
I fail to see the benefit of account jacking (especially after account owner's phone gets deactivated)
Click to expand...
Click to collapse
I like what happens (and it rarely happens,Ive heard stories of things that have happened way back,which are always good for a chuckle) where I work when someone does something illegal,or commits crimes using sensitive information at work. The US Marshals come,drag them out in handcuffs for everyone to see and then they get their room and board on the US Government for the next few years.
Every phone is legally required to have GPS that is available at all times and it sounds like they are committing identity theft. Have the police, or if they are in a different state possibly FBI, go get them.
This was an inside job and has nothing to do with your ROM or the fact that you rooted your phone. Threads like this could easily scare people away from rooting for no good reason.
I think you might have gave someone your info!!
dallashigh said:
This was an inside job and has nothing to do with your ROM or the fact that you rooted your phone. Threads like this could easily scare people away from rooting for no good reason.
Click to expand...
Click to collapse
This may not have had anything to do with his phone being rooted but it is possible that could have had something to do with it too. When you root your phone you are effectively bypassing just about every single security feature put on there.
You are lying to yourself if you think rooting your phone doesn't make your information much easier to steal.
jahnile said:
This is a strange story, def.ly a wake up call.
http://WWW.rootznculture.com
Click to expand...
Click to collapse
NVM wrong thread
xHausx said:
This may not have had anything to do with his phone being rooted but it is possible that could have had something to do with it too. When you root your phone you are effectively bypassing just about every single security feature put on there.
You are lying to yourself if you think rooting your phone doesn't make your information much easier to steal.
Click to expand...
Click to collapse
That is patently false. If you install a custom ROM then you are trusting the ROM developer not to put anything sneaky in there. Considering CM6 is open-source and used by thousands of people, it's unlikely to be the ROM's fault.
An app with root can do just about anything. That is why the Superuser app is there to make sure only apps that need it can get root access.
Installing apps from non-Market sources is much riskier than rooting your phone. Installing an SSH daemon would make it possible to access your system remotely. That would also be a security risk.
Enabling USB debugging will make it easier for someone with physical access to your device to access your information. That much is true.
There is absolutely nothing about the act of rooting that puts your information in jeopardy.
dallashigh said:
That is patently false. If you install a custom ROM then you are trusting the ROM developer not to put anything sneaky in there. Considering CM6 is open-source and used by thousands of people, it's unlikely to be the ROM's fault.
An app with root can do just about anything. That is why the Superuser app is there to make sure only apps that need it can get root access.
Installing apps from non-Market sources is much riskier than rooting your phone. Installing an SSH daemon would make it possible to access your system remotely. That would also be a security risk.
Enabling USB debugging will make it easier for someone with physical access to your device to access your information. That much is true.
There is absolutely nothing about the act of rooting that puts your information in jeopardy.
Click to expand...
Click to collapse
You say any app with root can do just about anything, you just confirmed what I said. If whatever terminal app you are using can give you root(superuser) access without a password than any app can do it.
A SSH shell is for communicating over a network, it has nothing to do with root access.
If you read recently at defcon someone showed a market app that could root your phone without your permission and take some private info. So without root your screwed to. So you can probably blame an app before root. Also all data is encrypted so I doubt it was a packet sniffer.
This is a Sprint issue. I've seen and heard of it happening way too many times for me to assume that it's Android related even in the slightest bit.
I don't really think it's fair to lump rooting and basic modification in with account theft. There are always multiple sides to any story.
dallashigh said:
That is patently false. If you install a custom ROM then you are trusting the ROM developer not to put anything sneaky in there. Considering CM6 is open-source and used by thousands of people, it's unlikely to be the ROM's fault.
An app with root can do just about anything. That is why the Superuser app is there to make sure only apps that need it can get root access.
Installing apps from non-Market sources is much riskier than rooting your phone. Installing an SSH daemon would make it possible to access your system remotely. That would also be a security risk.
Enabling USB debugging will make it easier for someone with physical access to your device to access your information. That much is true.
There is absolutely nothing about the act of rooting that puts your information in jeopardy.
Click to expand...
Click to collapse
Then what is this article referring to? http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push-google-to-plug-holes-at-security-conference/
xHausx said:
You say any app with root can do just about anything, you just confirmed what I said. If whatever terminal app you are using can give you root(superuser) access without a password than any app can do it.
Click to expand...
Click to collapse
Sure you don't have to enter a password, but the first time the app runs, you DO have to confirm that you want to give it root access. And again that would be the APP that is malicious and not the mere fact that your phone is rooted.
xHausx said:
A SSH shell is for communicating over a network, it has nothing to do with root access.
Click to expand...
Click to collapse
I know what SSH is. I'm not an idiot. An SSH server is something that would actually put your device at risk of being remotely accessed without your knowledge or permission.
redrazr7791 said:
Then what is this article referring to? http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push-google-to-plug-holes-at-security-conference/
Click to expand...
Click to collapse
They distributed a trojan that installed malware at the same time it rooted your phone.

[Q] KNOX and Rooted Device

I hope I am nut cluttering things up with a stupid question but I would like to find out if rooting and KNOX are mutually exclusive. My situation is that I will be moving from a personal to corporate liable account at work soon (taking my S4 with me) and their only requirement is securing the device on MobileIron with KNOX. I don't really mind the stock rom but there are two or three things I would like to be able to do on my device that require root access (mostly config toggles with a profile manager and using TiBu).
Thanks for any wisdom you can pass on.
drichter12 said:
I hope I am nut cluttering things up with a stupid question but I would like to find out if rooting and KNOX are mutually exclusive. My situation is that I will be moving from a personal to corporate liable account at work soon (taking my S4 with me) and their only requirement is securing the device on MobileIron with KNOX. I don't really mind the stock rom but there are two or three things I would like to be able to do on my device that require root access (mostly config toggles with a profile manager and using TiBu).
Thanks for any wisdom you can pass on.
Click to expand...
Click to collapse
This belongs in the Q&A forum. You know...since this is a Q.

[Q] Rooting and KNOX

I hope I am not cluttering things up with a stupid question but I would like to find out if rooting and KNOX are mutually exclusive. My situation is that I will be moving from a personal to corporate liable account at work soon (taking my S4 with me) and their only requirement is securing the device on MobileIron with KNOX. I don't really mind the stock rom but there are two or three things I would like to be able to do on my device that require root access (mostly config toggles with a profile manager and using TiBu).
Thanks for any wisdom you can pass on.
drichter12 said:
I hope I am not cluttering things up with a stupid question but I would like to find out if rooting and KNOX are mutually exclusive. My situation is that I will be moving from a personal to corporate liable account at work soon (taking my S4 with me) and their only requirement is securing the device on MobileIron with KNOX. I don't really mind the stock rom but there are two or three things I would like to be able to do on my device that require root access (mostly config toggles with a profile manager and using TiBu).
Thanks for any wisdom you can pass on.
Click to expand...
Click to collapse
Same issue for me . . . any updates?
saintirish said:
Same issue for me . . . any updates?
Click to expand...
Click to collapse
Not yet.... I am moved over but they haven't set me up yet on MI. I reverted to un-rooted until then and will see what it looks like and maybe try rooting again after I am all set up.
I would not think that having administrator privileges on your device would prevent the Knox from working... I don't use Knox, though.

[Q] Device Control - Blacklist Applications

I am in the process of configuring a number of Note 4 (910F) with Android 4.4.4 for issue to employees within my department. To prevent people from using a corporate handset for their unauthorised purposes, the devices have to be as clean as possible, with access to base functions such as phone, contact, sms, camera and business applications, but remove access to unnecessary applications that are all part of the bloatware installed on them by the network operator.
For device management, we are using SOTI Mobicontrol. SOTI allows me to blacklist applications to prevent them from launching. For security and warranty reasons, rooting the devices to remove unwanted applications is not an option. Therefore the only option is to use the SOTI blacklist to remove access to the application icon for launch.
SOTI requires that I input the application path eg com.sec.android.samsung.samsungapps to add an application to the blacklist. For the majority of mainstream applications such as Amazon, Evernote etc these are readily available. I'm having difficulty in finding the details for things like S Voice, and other bloatware that has been installed as part of the ROM.
I have one device that I can use for testing, so can install applications onto that. Is there any application readily available which will be able to capture the application launch path for an app that doesn't require me to root the device? I've found a few lists on the forum that related to the same apps on different devices which has given me a starting point. Just thought there may be an easier way to find the information out from the device.
Any help gratefully accepted.
IP
Work smarter, not harder. 'Dilbert'
In my opinion, these forums are for helping others to be able to get the most out of their devices, to improve and to make them more enjoyable, that is not your case, here we come as enthusiasts, fans, you better hire a pro in order to accomplish your corporative goals
winol said:
In my opinion, these forums are for helping others to be able to get the most out of their devices, to improve and to make them more enjoyable, that is not your case, here we come as enthusiasts, fans, you better hire a pro in order to accomplish your corporative goals
Click to expand...
Click to collapse
Thanks for the reply. I am an enthusiast, both Android, HTC and Samsung. Where I've been happy to read through the forums and customise my own devices over the years, my 'enthusiast' status has now put me in a position at work where a little bit of advice would go a long way to helping me out.
It's all fine and well paying someone else to do something, but the advice I was looking for was to help me as learning a new skill or how to use a new tool or app is always useful and helps keep me in a job and putting food in the mouths of my children!
I could have easily not included anything about this being needed to help me out for a situation at work and got an entirely different response, but I'm an honest guy just looking for a little advice.
indigo_prime said:
I am in the process of configuring a number of Note 4 (910F) with Android 4.4.4 for issue to employees within my department. To prevent people from using a corporate handset for their unauthorised purposes, the devices have to be as clean as possible, with access to base functions such as phone, contact, sms, camera and business applications, but remove access to unnecessary applications that are all part of the bloatware installed on them by the network operator.
For device management, we are using SOTI Mobicontrol. SOTI allows me to blacklist applications to prevent them from launching. For security and warranty reasons, rooting the devices to remove unwanted applications is not an option. Therefore the only option is to use the SOTI blacklist to remove access to the application icon for launch.
SOTI requires that I input the application path eg com.sec.android.samsung.samsungapps to add an application to the blacklist. For the majority of mainstream applications such as Amazon, Evernote etc these are readily available. I'm having difficulty in finding the details for things like S Voice, and other bloatware that has been installed as part of the ROM.
I have one device that I can use for testing, so can install applications onto that. Is there any application readily available which will be able to capture the application launch path for an app that doesn't require me to root the device? I've found a few lists on the forum that related to the same apps on different devices which has given me a starting point. Just thought there may be an easier way to find the information out from the device.
Any help gratefully accepted.
IP
Work smarter, not harder. 'Dilbert'
Click to expand...
Click to collapse
Why you're not using knox? Which gives you & your team clean,safe & high security in a partition where your enterprise data & emails are there, also it's allows your team to enjoy device as it's.
I believe knox has been designed for this purpose only.
jdomadia said:
Why you're not using knox? Which gives you & your team clean,safe & high security in a partition where your enterprise data & emails are there, also it's allows your team to enjoy device as it's.
I believe knox has been designed for this purpose only.
Click to expand...
Click to collapse
Knox is an additional license for the SOTI software we are using for device management and my suggestion to include it as part of the project were ignored. Work want to 'see how it goes' without spending any more money!
If you want a better Corporate security:
KNOX
ROOT
Choose EITHER ONE or you are out of options.
KNOX is a corporate solution for most big enterprises provided by Samsung & it's a good investment.
ROOT gives you FULL control over any LINUX based OS (Android is a LINUX fork) & it's cheaper as it's FREE.
By using ROOT access, you can create secondary user that is very limited & password protected, even encrypted; in a way that it differs from Android guest mode.
Using ROOT access, you can even remove the BLOAT/Unnecessary apps entirely from your devices, therefore eliminates unwanted possible BUGs that may compromise your company securities.
Linux & Android security knowledge is highly required.
IMHO, for warranty issue, you can replace warranty with insurance.
...And from my knowledge, I've read that many people claim their warranty with KNOX counter tripped without problem from Samsung (But of course they un-ROOT it before claiming).
But remember, as long as your employee can access Download Mode, all of it is useless.

Categories

Resources