MES Research Workflows
Research workflows you can exercise are:
- View capabilities and risks of mobile apps. When you determine an app poses unacceptable risks for your organization you can add it to your app denylist.
View risks associated with remote hosts (that is, hostnames) accessed by mobile apps. When you determine a hostname is malicious you can add it to a denylist used by Lookout Phishing and Content Protection and Secure DNS which acts as a security gateway for your organization.
We describe two most common use cases and workflows for using the MES console's research capability.
- Incident response workflow
- Threat hunting workflow