Lumu Free Deployment Guide
As we show in our
Deployment and Integration article, Lumu Free is a limited-visibility offering for getting started with the power of Lumu’s Continuous Compromise Assessment model. With Lumu Free you can set up real-time DNS ingestion using Lumu Gateways.
, Lumu Free does not include a time limit, meaning you can know your compromise level for
as long as you would like.
Figure 1 - Lumu Free common deployment architecture.
Getting started with cybersecurity projects does NOT have to be a difficult endeavor. Getting up and running with Lumu Free is easy as 1, 2, 3. Follow these simple steps to set up your network for real-time compromise assessment in minutes:
Open a Lumu Free Account
Create your Lumu Free account at
portal.lumu.io, and invite your team.
Add a Public Gateway
Point your DNS to Lumu
As soon as you open your account, the Lumu Portal interactive Wizard will provide you with further guidance:
You also have the option to take a free short course with video instructions on getting started with Lumu Free in our
After setting up Lumu, you will start receiving alerts and notifications regarding communication between your infrastructure and adversaries. Dedicate some time to explore the
Lumu Portal and familiarize yourself with how Lumu will deliver
conclusive evidence on your unique compromise levels.
When you are ready to level up your Lumu experience by having detailed visibility, ingestion of extensive data sources, and more, upgrade to
Lumu Insights for
incorporating Continuous Compromise Assessment into your security operation.
Lumu Insights Deployment and Integration Guide
Incorporate the Continuous Compromise Assessment into Your Security Operation. As we show in our Deployment and Integration article, when greater visibility is desired, it's necessary to insert network metadata collectors inside your network ...
Getting Started with Lumu
In this article, we introduce you to all you need to know about using Lumu to measure and understand your business’s compromise level in real time. If you want to go straight to the deployment documentation, click here. Welcome to Lumu! Lumu ...
Deploy and Integrate
As we described in our Get Started article, all successful attacks have a common denominator: the cybercriminal must use the network. Lumu covers from simple to complex infrastructures collecting network metadata from your extended perimeter through ...