In enterprise environments, protecting sensitive data is a top priority. One often overlooked source of potential data leakage is the device clipboard, which allows users to copy and paste content between applications. To strengthen data security and prevent unauthorized sharing of corporate information, IT administrators may choose to restrict clipboard access on managed devices. For fully managed Samsung devices, this can be effectively achieved using SureMDM.
Purpose
The purpose of this article is to restrict the usage of the clipboard on Samsung devices enrolled as Fully Managed. By implementing these restrictions through SureMDM, you can ensure better control over data handling on corporate-owned devices.
Prerequisite
- Should have a SureMDM Account.
- It should be a Samsung device that should be enrolled as a Fully Managed device also support Knox Policy.
Steps
- Log in to SureMDM Console.
- Configure the settings below in the Android Profile:
Note: These settings can be configured if there is a default Android Profile created/set. Otherwise, the same can be configured by creating a new Android Profile.
Under the OEM Config Policy, choose Knox Service Plugin and configure the following settings:
Note: This configuration works on all Knox devices irrespective of Knox License
Configure the “Enable device policy controls” option:
Enable Device Restriction Policy Control option:
Disable the “Allow Clipboard” option. This setting comes under Device Restrictions:
Once the above settings have been configured in the Android Profile, deploy the same to the Samsung devices that are enrolled as a Fully Managed Device. Post deploying, the profile to Samsung devices, when the end users try to cut/copy any content from any of the applications that are allowed by the admin, the following pop-up will be seen:
Conclusion: By restricting clipboard access on fully managed Samsung devices using SureMDM, organizations can significantly reduce the risk of data leaks and ensure better control over corporate information. Implementing such security measures not only strengthens your overall data protection strategy but also promotes a safer and more compliant enterprise mobility environment.
Need help?