Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Creating, Viewing, and Scheduling Reports

You can create a variety of reports that provide a comprehensive view of information such as:

  • how and from where users access data from cloud applications and from websites,
  • how and with whom the data is shared, and
  • whether users have taken all appropriate security precautions.

    In addition, reports provide information that help to identify issues such as these:

  • anomalous/anonymous data access
  • deviations in the defined policies
  • deviations from the defined regulatory compliances
  • possible malware threats
  • types of websites accessed (for example, shopping, business and economy, news and media, technology and computers, dating, or gambling).

    Anomaly reports focus on the User and Entity Behavioral Analysis (UEBA) capability provided by the Lookout Cloud Security Platform. They show anomalous user and content activity, which can indicate insider threats or potential malware or ransomware.

    Compliance reports provide insights into your organization's compliance status and adherence to security policies. They show findings from observations of policy violations, users and applications involved, and remediation steps to address non-compliance issues.

    You can also generate a consolidated report named Executive Summary Report that contains detailed assessment of risks, policy violations, and threat exposure across your organization’s cloud environments and user activities.

  • You can create reports and run them at a scheduled time on a selected day, or on one day of a week for the entire week. You can also view the scheduled reports and download them for further analysis.

    Reports are generated based on global time zone settings.