As we show in our
Deployment and Integration overview, organizations can enjoy full compromise visibility with Lumu, regardless of users connecting via VPN or straight to cloud-based applications.
is an endpoint software program provided by Lumu that is installed on a user's machine. This enables the detection of adversarial activity in roaming devices no matter where they are.
The Lumu Agent runs silently while intentionally and continuously collecting network metadata to be analyzed by Lumu for measuring compromise in real time.
Lumu Agent deployment architecture
The Lumu Agent can be deployed easily to your entire user population, and you can control groups and status of each agent at a glance through the Lumu Portal.
Agent management area of the Lumu Portal
Advantages of Lumu Agents
Device-level Compromise Visibility
Detect compromises beyond your local perimeter and Identify how the compromises spread
across your devices.
Detailed Installation Status and Useful Endpoint Intelligence
Monitor your Lumu Agent deployment, status, see detailed information of your devices, and prioritize important groups.
Multiple Installation Options
The Lumu Portal offers a self-service option for data collection for different types of devices and deployments.
The Lumu Agent is a lightweight sensor, you will find specific requirements on the documentation of each platform.
The Lumu Agent is part of the
subscriptions, which offers you additional correlation capabilities, Lumu Email, and overall better compromise detection and provides you with internal IP visibility, allowing you to monitor malicious traffic within your network to specific endpoints.
The Lumu Portal offers a self-service option for data collection. Follow these simple steps to download, install, and activate Lumu Agents to start illuminating threats and adversaries:
Create a Group
Once you have added a group, the next step is to download the agent installation files. For this, go to the
Lumu Portal, navigate to the
menu, click in the
option, then select the installation type according to your IT assets and management system needs:
download the files for single installations or for bulk deployments for Windows devices.
macOS: to download the installation files for devices with macOS architectures.
Linux: to download the installation files for devices with certain distributions of Linux OS.
Agent Collector for Windows Server: To download the agent for Windows Server devices that act as domain controllers.
Agent installation options
If you're worried about your organization's devices performance being affected or potential impact on the functioning of your cybersecurity stack due to having installed the agent, we suggest reading this article on our FAQ