Workspace ONE Mobile Threat Defense

Workspace ONE Mobile Threat Defense provides endpoint security and protection for iOS, Android, and Chrome OS, securing devices against app, device, OS, and network-based threats. Integrating Mobile Threat Defense with Workspace ONE UEM empowers your organization to adopt secure mobility without compromising productivity. It allows the integration of mobile security threat and device events into your security incident and event workflows. Additionally, Mobile Threat Defense allows you to streamline the management of devices and drive enforcement when threats are detected.

Requirements

  • Workspace ONE Mobile Threat Defense.
  • A currently supported version (non EOL) of Workspace ONE UEM, shared SaaS, Managed Hosting, or on-premises.
  • Administrator access to the Workspace ONE UEM Console.
  • Workspace ONE Intelligent Hub 23.05 or later installed on devices intended for protection.
  • Workspace ONE Tunnel 23.01.1 or later (for Phishing and Content Protection)

Network Requirements

Devices protected with Workspace ONE Mobile Threat Defense must be able to communicate with Lookout Services. Add the following IP addresses to your firewall when devices are running on a closed or restricted network.

Device

  • Secure DNS (https 443)
dns.prod.lookout.com
  • MiTM Reference Endpoint (https 443)
*.protect.prod.lkt.is
  • IP Addresses for Lookout Services
    • 52.11.153.147
    • 52.11.153.253
    • 54.153.102.83
    • 54.153.102.84

MTD Console (443)

https://vmware.lookout.com

Supported Platforms

  • Android 10.0+
  • Apple iOS 14.0+
  • Apple iPadOS 14.0+
  • Chrome OS x.x

Privacy

For more information about how VMware handles information collected through our products, see the VMware Privacy Policy at https://www.vmware.com/help/privacy.html.

For more information about what data is collected from your end users’ devices, visit the VMware Workspace ONE Privacy Disclosure page: https://www.vmware.com/help/privacy/uem-privacy-disclosure.html.

For more information about how our Mobile Threat Defense service provider, Lookout, uses data from end user devices for its security research and to improve its ability to detect new threats, visit https://legaldocs.lookout.com/en/enterprise-privacy-policy.pdf.

check-circle-line exclamation-circle-line close-line
Scroll to top icon