home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

MES Research Workflows

Research workflows you can exercise are:

  • View capabilities and risks of mobile apps. When you determine an app poses unacceptable risks for your organization you can add it to your app denylist.
  • View risks associated with remote hosts (that is, hostnames) accessed by mobile apps. When you determine a hostname is malicious you can add it to a denylist used by Lookout Phishing and Content Protection and Secure DNS which acts as a security gateway for your organization.

    We describe two most common use cases and workflows for using the MES console's research capability.

  • Incident response workflow
  • Threat hunting workflow