How is the network metadata collected?

How is the network metadata collected?

You may use Lumu’s public DNS as forwarders on your internal DNS Servers. Lumu also provides virtual appliances, cloud collectors, agents, Email Intelligence and custom collectors (API) to cover your hybrid environments.

Consult our deployment documentation for details.
        • Related Articles

        • What is the difference between Lumu Free, Lumu Insights and Lumu Defender?

          Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
        • What is Lumu Insights?

          Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
        • Why and how long do you store the metadata?

          Lumu stores your processed network metadata traffic for Playback™ capabilities, meaning we can compare and match every new indicator of compromise against stored metadata for every customer we are protecting. With regard to incident metadata, 45 ...
        • How can Lumu and DNS Firewalls work together?

          If your company already has a DNS firewall like OpenDNS (currently, Cisco Umbrella), Infoblox, or the like, Lumu seamlessly integrates with your DNS firewall to continue to benefit from blocking malicious DNS requests, while layering real-time ...
        • How to Flush the DNS Cache?

          DNS caching involves an Operating System (OS) or a browser capturing recently-visited IP addresses and saving them for loading pages more quickly. When DNS settings are updated, clearing the devices’ DNS cache helps you make the devices recognize the ...