How do I configure Lumu?

How do I configure Lumu?

Follow these simple steps to set up your network for real-time compromise assessment in minutes:

Open a Lumu Free Account


Create your Lumu Free account at .

Create and Configure a Collector


Deploy the best collector type for your organization unique infrastructure.

You may review the Lumu Free quick start guide and our deployment documentation for more details.
        • Related Articles

        • How is the network metadata collected?

          You may use Lumu’s public DNS as forwarders on your internal DNS Servers. Lumu also provides virtual appliances, cloud collectors, agents, spambox and custom collectors (API) to cover your hybrid environments. Consult our deployment documentation for ...
        • What is Lumu Insights?

          Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
        • What is Continuous Compromise Assessment?

          Lumu’s Continuous Compromise Assessment is a patent-pending model that enables organizations to measure their unique compromise levels, using their own network metadata. This model allows you to identify when, where, and how your infrastructure is ...
        • Does Lumu collect and process full network data?

          No. Lumu uses specific techniques to facilitate collecting key elements of your network metadata. Signaling traffic in this form instead of doing a full packet capture is optimal, as it represents only a tiny fraction of the total network traffic, ...
        • How can I configure SSO in the Lumu Portal using Okta?

          Single Sign-on (SSO) allows you to log in to the Lumu portal through Identity Providers using their current credentials. Instead of requiring users to manage multiple usernames and passwords, SSO allows you to log in to multiple applications using ...