Lumu Portal Features Overview

Lumu Portal

Lumu simplifies Continuous Compromise Assessment by consolidating its management, reporting, and related contextual intelligence within a single portal. Security teams no longer need to chase down data from multiple network monitoring tools.

The Lumu Portal is a centralized and intuitive interface that makes it easier for you to operate cybersecurity proficiently, detect compromises and carry out investigations. Reduce reaction times and take clear and concrete actions for mitigating and eradicating incidents.


In this article, we point out the key characteristics of the portal that help you set up and manage your organization’s compromise assessment.

Lumu Portal Browser support

The Lumu Portal is designed to fully function on the most common and widely used browsers. 
It is worth noting that each browser is frequently updated and maintained by its respective developer. This means that accessing the Lumu Portal from older versions of a browser may result in suboptimal functionality of the portal. 
To prevent this, we have designed the following support policy so we can provide the best user experience and to access the Lumu Portal

Supported Browser Versions

  1. Google Chrome : The two latest official versions will be supported
  2. Mozilla Firefox : The two latest official versions will be supported
  3. Microsoft Edge : The two latest official versions will be supported
  4. Safari : The two latest official versions will be supported
Only official versions running on operating systems supported by the developer of each browser are tested on by our team. The Lumu Portal may function correctly on older and outdated systems; however, it’s impossible to guarantee the Lumu Portal will work as intended both in beta browser versions and in outdated browser or operating system versions. We encourage our users to update their browser often and to use the latest version of their browser of choice to safely browse the internet and to experience the best version of the Lumu Portal.

Key Features

These are some capabilities and benefits our customers value the most:

 

User Friendly from the Beginning and Throughout

Transparent deployment for seamless data-collection, viewable on mobile, no client-installation needed, and more.

 

Consolidated Incidents View

A centralized way to manage your incidents, track statuses and review which compromises have been solved—for simpler and faster activation of response processes. 

 

Speed up and Prioritize Response

Lumu’s Compromise Context equips security defenders with actionable and real-time insights—for understanding which compromises represent the most immediate threats.

 

Measure the Attack Distribution

Group and view malicious traffic and see how and where a specific compromise is spreading inside your network..

 

Visualize the Sphere of Impact

Lumu’s proprietary Compromise Radar analyzes compromise behavior and shows how your assets are communicating with adversarial infrastructure.

 

Conduct In-Depth Threat Research

Download threat trigger resources to facilitate the configuration of your current cybersecurity strategy. See actionable steps for responding to incidents with integrated links to related articles by leading security researchers and Lumu Incident Response Playbooks.

 

Automated MITRE ATT&CK® Matrix

Lumu automates and operationalizes this framework by presenting the ATT&CK Matrix for each incident found on the portal, helping organizations spot gaps in defenses, identifying priorities, and making more accurate decisions about approaching risks.

Compromise

All your incidents and compromise activity in an easy-to-read dashboard with details on the activity and distribution of the Indicators of Compromise (IoC) that Lumu identified in your organization.

Explore the documentation related to the Compromise section:

Lumu Email

Set up and manage email metadata analysis and understand who in your organization is being attacked, and how they are being targeted. Explore the Lumu Email documentation.

Collectors

Manage gateways, virtual appliances, and agents. Review the Collectors documentation.

Integrations

Take advantage of our vendor-agnostic integrations to send Lumu’s confirmed compromise instances to any third-party tool for automated mitigation and remediation.

Explore the Integrations documentation.

Settings

Manage user accounts, scheduled reports, and labels. Explore the documentation related to the Compromise section:


        • Related Articles

        • Lumu Portal Two-Factor Authentication

          The Lumu Portal offers secure login alternatives through the use of two-factor authentication (2FA), in this case, One-time Password (OTP) on top of your account password. You can use the Authenticator app you prefer, such as Google Authenticator and ...
        • How to configure SSO in the Lumu Portal using Entra ID Active Directory

          Microsoft Azure is now called Entra ID Prerequisites: Before you can configure Single Sign-On (SSO) integration with the Lumu Portal using Entra ID, make sure that you have the following: Administrator access to your Entra ID portal. Lumu Support has ...
        • How to configure SSO in the Lumu Portal using Okta

          Single Sign-on (SSO) allows you to log in to the Lumu portal through Identity Providers using their current credentials. Instead of requiring users to manage multiple usernames and passwords, SSO allows you to log in to multiple applications using ...
        • How to configure SSO in the Lumu Portal using Thales (Safenet Trusted Access)

          Prerequisites Before you can configure Single Sign-On (SSO) integration with the Lumu Portal using Thales, ensure that you have the following: Administrator access to your Thales account. Lumu Support has provided you with the necessary instructions ...
        • Lumu Playback

          The cybersecurity industry has developed numerous methods to defend against zero-day threats and emerging attacks. However, many attacks still slip through undetected due to the increasingly sophisticated evasion tactics employed by cybercriminals. A ...