Lookout Mobile Endpoint Security
  • 22 Mar 2022
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Lookout Mobile Endpoint Security

  • Dark
    Light
  • PDF

Article Summary

Lookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Devices

Parameters

  1. Host Name or IP Address (required, default https://api.lookout.com/) - The hostname or IP address of the Lookout Mobile Endpoint Security server.
  2. User Name and Password (required) - The credentials for a user account that has the permissions to fetch assets. This can be a read-only access account.
  3. Enterprise GUID (required) - The globally unique identifier associated with a user account that has permissions to fetch assets. Obtain the GUID from Lookout.
  4. Application Token - Specify the application token to fetch the threat data.
    To generate the application token:
    1. Log in to the Lookout MES Console as an administrator.

    2. In the left navigation bar, navigate to System > Application Keys.

    3. Click Generate Key in the upper-right.

    4. Specify a label name, then click Next.

    5. Copy the generated key clicking Click to Copy Application Key to Clipboard.

    6. Copy the key from the clipboard into the adapter Application Token parameter.

      Note: Copy the generated key immediately to the Axonius adapter, as you cannot access the key again.

  5. Verify SSL (required, default: False) - Select whether to verify the SSL certificate offered by the value supplied in Host Name or IP Address. For more details, see SSL Trust & CA Settings.
  6. HTTPS Proxy (optional, default: empty) - A proxy to use when connecting to the value supplied in Host Name or IP Address.
    • If supplied, Axonius will utilize the proxy when connecting to the value supplied in Host Name or IP Address.
    • If not supplied, Axonius will connect directly to the value supplied in Host Name or IP Address.
  7. HTTPS Proxy User Name (optional, default: empty) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
    • If supplied, Axonius will authenticate with this value when connecting to the value supplied in HTTPS Proxy.
    • If not supplied, Axonius will not perform authentication when connecting to the value supplied in HTTPS Proxy.
  8. HTTPS Proxy Password (optional, default: empty) - The password to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
    • If supplied, Axonius will authenticate with this value when connecting to the value supplied in HTTPS Proxy.
    • If not supplied, Axonius will not perform authentication when connecting to the value supplied in HTTPS Proxy.
  9. For details on the common adapter connection parameters and buttons, see Adding a New Adapter Connection.

Lookout_adapter_30-1-22


Advanced Settings

Note:

Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to ​Advanced Configuration for Adapters

  • Threat data time limit in hours (optional, default: 720) - Specify the threat data time limit in hours. The maximum value is 8760 hours (a year). The default is 720 (a month).

Lookout_advanced_30-1-22


Note:

To learn more about Adapter Configuration tab advanced settings, see Adapter Advanced Settings.


APIs

Axonius uses the Lookout API.

Required Permissions

The value supplied in User Name must have permissions to fetch assets. You can use a local account with Read-Only access as long as it is identity-managed by Lookout and not by an external services provider.

LookoutConfig.png



Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.