Introduction to Lumu Agents

Introduction to Lumu Agents

As we show in our Deployment and Integration overview, organizations can enjoy full compromise visibility with Lumu, regardless of users connecting via VPN or straight to cloud-based applications.

Lumu Agent is an endpoint software program provided by Lumu that is installed on a user's machine. This enables the detection of adversarial activity in roaming devices no matter where they are.
The Lumu agent is available for different types of devices and operating systems. For more information about its features, installation files and procedures, consult our documentation:
  1. Lumu Agent for Windows
  2. Lumu Agent for macOS
  3. Lumu Agent for Linux
  4. Lumu Agent Collector for Windows Server
The Lumu Agent runs silently while intentionally and continuously collecting network metadata to be analyzed by Lumu for measuring compromise in real time.

Lumu Agent deployment architecture Lumu Agent deployment architecture

The Lumu Agent can be deployed easily to your entire user population, and you can control groups and status of each agent at a glance through the Lumu Portal.

Agent management area of the Lumu Portal Agent management area of the Lumu Portal

Advantages of Lumu Agents

Device-level Compromise Visibility
Detect compromises beyond your local perimeter and Identify how the compromises spread  across your devices.

Detailed Installation Status and Useful Endpoint Intelligence
Monitor your Lumu Agent deployment, status, see detailed information of your devices, and prioritize important groups.

Multiple Installation Options
The Lumu Portal offers a self-service option for data collection for different types of devices and deployments.

Requirements

The Lumu Agent is a lightweight sensor, you will find specific requirements on the documentation of each platform.

The Lumu Agent is part of the Lumu Insights and Lumu Defender subscriptions, which offers you additional correlation capabilities, Lumu Email, and overall better compromise detection and provides you with internal IP visibility, allowing you to monitor malicious traffic within your network to specific endpoints.

To know more about our illumination options, consult Lumu Offerings.

Deploy Agents

The Lumu Portal offers a self-service option for data collection. Follow these simple steps to download, install, and activate Lumu Agents to start illuminating threats and adversaries:


Create a Group

To activate your installed agents, you must create at least one installation group. Start by creating a group to generate an activation code.

Download Agent

Once you have added a group, the next step is to download the agent installation files. For this, go to the Lumu Portal, navigate to the Agents menu, click in the download option, then select the installation type according to your IT assets and management system needs:

  1. Windows: to download the files for single installations or for bulk deployments for Windows devices.
  2. macOS: to download the installation files for devices with macOS architectures.
  3. Linux: to download the installation files for devices with certain distributions of Linux OS.
  4. Agent Collector for Windows Server: To download the agent for Windows Server devices that act as domain controllers.
Agent installation options Agent installation options

If you're worried about your organization's devices performance being affected or potential impact on the functioning of your cybersecurity stack due to having installed the agent, we suggest reading this article on our FAQ.

        • Related Articles

        • Lumu Agent Collector for Windows Server

          Up until now, the Lumu Agent has been an endpoint software program installed on a user's machine which enables the detection of adversarial activity; however, the compromise detection capabilities of the Lumu Agent are now available for Windows ...
        • Lumu Agent for Windows

          The installation of the Lumu Agent for Windows is simple and straightforward. They could be deployed easily to your entire user population through an IT assets management system, thus facilitating their installation and administration. This document ...
        • Manage Lumu Agents

          In the Agents section of the Lumu Portal, you have information regarding all your agents at a glance. All the information is collected automatically from each device that runs the agent. In this guide, we will cover how to manage Lumu Agents. For ...
        • Deploy Lumu Agent using Group Policy (GPO)

          The installation of the Lumu Agent for Windows is simple and straightforward. This article describes how to deploy the Windows Agent quickly to your entire user population through Group Policy Objects (GPO) in a Windows Server. For getting started ...
        • Lumu Agent Deployment via NinjaOne RMM

          The Lumu Agent can be deployed remotely in corporate environments using an array of tools such as Remote Monitoring and Management software (RMM). This article describes the remote installation procedure of the Lumu Agent for Windows and macOS using ...