I’m Afraid the Lumu Agent will have a Negative Impact on the performance of my organization’s devices, what should I do?
The Lumu Agent is an extremely lightweight application and it will put very little load on the end user’s device as it doesn’t require much processing power to function.
Remember that installing the Lumu Agent is a simple and straightforward process, and it can be done in a completely transparent manner without any interaction from the device’s end user.
Installation via the most common RMM
tools is also supported which should simplify the installation process even further for larger organizations.
Should I be worried about negative interactions between the Lumu Agent and other solutions installed on my device?
No, our technical specialists have done extensive testing with Lumu and other products in the cybersecurity industry to see whether there was any impact in the performance of each tool. Based on our results, there shouldn’t be any reason to worry as there hasn’t been any evidence of negative interactions between Lumu and other solutions.
If for any reason this is still a worry, the Lumu VA
would be an alternative way to gain visibility on the devices of your workforce without putting any load on each individual device; however, the Lumu Agent is still the only data collection option that offers direct visibility into all of the device’s traffic.
We strongly advise installing the Lumu Agent to ensure the highest level of continuous compromise assessment on your remote perimeter’s devices.
Why do I have two agents with the same hostname in the agent list in the Lumu portal?
Summary When reinstalling a Windows Lumu Agent using the “Reinstall” feature, you may encounter two registered agents (duplicated) with different last sync times in the Lumu Portal, as shown in the following image: Details Reinstalling an active ...
I am worried about privacy, is Lumu able to see all the data that goes through my network?
We only see network metadata, which means that we do not see any confidential information like passwords. The information that we see are IPs and hostnames. All other information is discarded. To run Continuous Compromise Assessment, we do not need ...
Why do I have two uninstallation registers for Lumu Agent on Windows?
Summary When uninstalling a Lumu Agent using the default Microsoft Add/Remove Program utility, you may encounter two registries, as shown in the following image: Details Installing the Lumu Agent using the MSI file for version 18.104.22.168 or 22.214.171.124 and ...
Why do files, folders, tasks, and/or registries remain after the Lumu Agent is uninstalled in Windows?
Summary When uninstalling the Windows Lumu Agent, some remaining information of the Lumu Windows Agent may still be present in the machine. Details After uninstalling the Windows Lumu Agent, some related files may remain in the machine, such as: ...
What is the difference between Lumu Free, Lumu Insights and Lumu Defender?
Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...