home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Configuring and Enforcing a Compliance Policy

Once Lookout Mobile Endpoint Security (MES) is active for end users and providing threat information to your MDM, it’s time to create a compliance policy based on Lookout threat detection. When you are satisfied that the system is working as expected, you can add device threat levels from Lookout into the compliance calculation for company devices.