Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Configure EMM for Use with Secure Cloud Access

  1. From your chosen vendor, obtain the API key used to make the calls needed to verify information about a device.
  2. Create the EMM configuration in Secure Cloud Access.
    The following sections outline these steps.