home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Show Page Sections

Using the Threat Feed Configuration API

Authenticate

You authenticate to the API using the Lookout platform’s OAuth 2.0 Client Credentials Grant Flow where you obtain a key that you exchange for an access token to use in API calls. See MES API Authentication for the procedure to get an access token.

Make Requests

  • Get feed metadata
  • Create a new threat feed.
  • Update a threat feed metadata
    • title and description fields.
    • allow Lookout to ingest the feed for analysis without tagging the data with any customer-identifying information.
  • Delete a threat feed.
  • Download elements from a feed.
  • Upload elements to a feed.

Configuration Scenarios

Use the threat feed configuration API to manage these configuration scenarios.

  • Single threat feed for an enterprise.
  • Two threat feeds per tenant for multi-tenancy. One feed is at the org level and one feed at the tenant level.