How is the network metadata collected?

How is the network metadata collected?

You may use Lumu’s public DNS as forwarders on your internal DNS Servers. Lumu also provides virtual appliances, cloud collectors, agents, spambox and custom collectors (API) to cover your hybrid environments.

Consult our deployment documentation for details.
        • Related Articles

        • What is the difference between Lumu Free, Lumu Insights and Lumu Defender?

          Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
        • What is Lumu Insights?

          Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
        • Why and how long do you store the metadata?

          Lumu stores your processed network metadata traffic for Playback™ capabilities, meaning we can compare and match every new indicator of compromise against stored metadata for every customer we are protecting. With regard to incident metadata, 45 ...
        • How do I configure Lumu?

          Follow these simple steps to set up your network for real-time compromise assessment in minutes: Open a Lumu Free Account     Create your Lumu Free account at portal.lumu.io . Create and Configure a Collector     Deploy the best collector type for ...
        • How can Lumu and DNS Firewalls work together?

          If your company already has a DNS firewall like OpenDNS (currently, Cisco Umbrella), Infoblox, or the like, Lumu seamlessly integrates with your DNS firewall to continue to benefit from blocking malicious DNS requests, while layering real-time ...