Configuring and Enforcing a Compliance Policy
Once Lookout Mobile Endpoint Security (MES) is active for end users and providing threat information to your MDM, it’s time to create a compliance policy based on Lookout threat detection. When you are satisfied that the system is working as expected, you can add device threat levels from Lookout into the compliance calculation for company devices.