home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Configuring and Enforcing Security Policies

When Lookout detects a security issue on a protected device, it reports the device state in the lookout_threat_level custom attribute based on the risk levels you set during Configuring Threat Classification in Lookout Mobile Endpoint Security.

To take policy actions in MaaS360 based on risk levels reported by Lookout:

  1. Optionally, create policies to enforce at each risk level.
    You may wish to only create policies for medium or high risk devices, and restrict actions for low risk devices to alerts and other low-impact measures.
  2. Create a Device Group for each risk level.
  3. For each risk level, create a Compliance Rule Set and set it to a Group Based Rule that applies to the corresponding Device Group.

    Devices with the reported lookout_threat_level value are automatically moved into the corresponding group, and the Compliance Rule Set takes effect for those devices. When all active threats are remediated or removed, Lookout sets the lookout_threat_level to none and the device is returned to the previous (normal) Groups and associated policies in MaaS360.