home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

How Third-Party Threat Intelligence Feeds Work

Determine what specific feeds to configure based on relevance to your tenant.

  • Admins and security professionals build their own scripts and tools to upload data to the API Feed for their MES environment.
  • The tenant ingests the feed, entering the stream of URLs into the new deny list for the default device group. This makes them available to all device groups that inherit policy from the default group.
  • A device group configured to not inherit from the default group has access to the standard MES deny list with a capacity of 100 domains.
  • Standalone tenants have a single feed. Multi-tenancy environment tenants may have up to two feeds: One from the org and a tenant-specific feed.