Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Policy Configuration and Creation Workflow

Policy management in the Lookout Cloud Security Platform includes several configuration steps that enable efficient and consistent creation of policies. You can apply these configurations to protect data stored in multiple cloud applications and to monitor web traffic.

  1. Create content rule templates
  2. Create Content Digital Rights templates
  3. Configure file type, MIME type, and file size for exclusion from scanning
  4. Configure folder sharing
  5. Set number of folder sublevels for DLP scanning
  6. Configure default policy violation actions
  7. Configure tenant-level default TLS-intercept settings
  8. Enable user coaching as a secondary action in a policy
  9. Enable continuous (step-up) authentication as a secondary action in a policy
  10. Create policies: Access Control, App Authentication, API Access, and DRM The following sections outline these steps.