home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Lookout for Small Business Admin App Quick Start

When activated, the Lookout for Work app detects mobile threats and helps to mitigate risk across your mobile fleet. Administrators for Lookout for Small Business (SMB) can benefit from using administrative features provided by the Lookout for Work mobile app.

Get Started

The Lookout SMB admin app lets you perform the most common administrative procedures right from your mobile device without having to log in to the web based Lookout administrator console.

  • Send invitations and reminders to enroll to your employees.

To get up and running:

  1. Install and activate Lookout for Work by doing one of the following:
    • Accepting the email invitation from your Lookout for Small to Medium Business console administrator.
    • Scanning a QR code from another SMB Admin App that is already activated.
  2. Accept permissions requested to fully protect your device.
  3. After Lookout for Work has finished analyzing your device, follow the prompts to activate your admin dashboard.
    You can activate the admin dashboard later by following the prompts the next time you open the app.
  4. The biometric login checkbox is enabled.
    You can clear the checkbox if you do not want to use biometric authentication to access the admin app.
    • You must use multifactor authentication (MFA) if it is enabled for use on your tenant. To use MFA you need an authenticator app on your device. Google Authenticator is the preferred app but any authenticator that uses time based OTPs (one-time passwords) should work.

      When you sign in to the MES SMB console on a PC, MES prompts you to scan a QR code with your authenticator to read in a secret seed value to generate short-lived one-time authentication codes. MES also generates 12 single-use recovery codes for use if you lose or misplace your authenticator. Download these codes to a safe location such as a password manager.

      On subsequent sign-ins you must enter the OTP generated by your authenticator to access the admin app.

  5. Start protecting your fleet by sending enrollment invitations to your employees by one of the following ways:
    • Have your employee scan the QR code directly from your phone.
    • Tap Share to send an email invitation from the SMB Admin app using your preferred messaging app.
  6. This step applies only to email invitations. On iOS devices, make sure your employees use the activation code provided to join your fleet. On Android devices, the code should automatically be entered once your employees download the app.
  7. Once the employee’s app is activated, Lookout performs an initial scan of their device. If any risks are found, the employee follows the steps displayed on their device to resolve the issue.

    For a more detailed view into the security status across the mobile fleet, Lookout administrators can log in to the web-based Lookout console at https://mtp.lookout.com/.

    How do I know whether my employees have enrolled? How do I know whether my devices are safe?

    View the Deployment Status details on the Lookout console dashboard:

    • Connected devices have installed and activated Lookout for Work.
    • Pending devices received an invitation, but haven't yet installed the app or activated their account after installing. Pending status is available only when MDM is used for deployment.
    • Disconnected devices haven't responded to Lookout for 30 days. The device may be off, out of range of a wireless network, or other temporary cause.
    • Unreachable devices have uninstalled the app.

    You can send reminders or new invitations by navigating to Enrollment > Invite Management.

    The Security Status section on the Lookout console dashboard provides a summary of any risks that Lookout detects on your enrolled devices:

    • Low Risk threats like adware might disrupt your users. Encourage them to open Lookout for Work and follow the steps in the app to remove the risk.
    • Medium Risk threats like spyware or data leaks present a more serious risk. Follow up with anyone who owns a Medium Risk device to take action.
    • High Risk threats like surveillanceware present an immediate, critical risk. Anyone with a High Risk device needs to immediately fix the problem and avoid doing business on their device until it returns to Secured status.

    You can review and configure risk levels and responses for different types of threats in the Protections section on the dashboard.