Custom Integrations - API
Ubiquiti Unifi Cloud Gateway Response Integration
This article shows how to leverage the Lumu Defender API and the Ubiquiti Unifi Cloud Gateway features to mitigate security risks. Response integration between Unifi Cloud Gateway and Lumu Requirements Ubiquiti Unifi Cloud Gateway You need a Ubiquiti ...
Imperva Cloud WAF Custom Response Integration
This article shows how to leverage the Lumu Defender API and Imperva Cloud WAF API to mitigate security risks. Response integration between Imperva Cloud WAF and Lumu Requirements Imperva Cloud WAF You need an Imperva Cloud WAF admin console to ...
ESET Endpoint Security On-premise Custom Response Integration
This article shows how to leverage ESET Endpoint Security through its ESET Protect Web Console and Lumu Defender API to enhance your Response capabilities. Response integration between ESET Endpoint and Lumu Requirements ESET PROTECT deployment An ...
Cynet 360 AutoXDR Custom Response Integration
This article shows how to leverage the Lumu Defender API and Cynet API to mitigate security risks. Response integration between Cynet 360 AutoXDR and Lumu Requirements A Cynet 360 AutoXDR Elite or above subscription The Cynet console must have the ...
Wazuh XDR Custom SecOps Integration
The Wazuh XDR Custom SecOps Integration allows you to poll and push adversary-related events to your Wazuh deployment. After configuring the integration, your Wazuh deployment will be able to receive and process Lumu events. By using it, you will be ...
Cortex XDR Custom SecOps Integration
The Cortex XDR Custom SecOps Integration allows you to poll and push adversary-related events to your Cortex XDR deployment. After configuring the integration, your Cortex deployment will be able to receive and process Lumu events. Using it lets you ...
Preparing Environment for Custom Integrations
Lumu Custom integrations are designed to run on multiple platforms by using: Python 3.10 or above or A Docker container. This article will focus on the environment setup using Python 3.10 or above. For Docker-specific instructions, refer to the ...
Kaspersky Endpoint Security On-Premise Custom Response Integration
This article shows how to leverage Kaspersky Endpoint Security, also known as KES, through its Kaspersky Security Center (KSC) Web Console and Lumu Defender API to enhance your Response capabilities. Response integration between Kaspersky Endpoint ...
Acronis Cyber Protect Cloud Custom Response Integration
This article shows how to leverage Acronis Cyber Protect Cloud API and Lumu Defender API to enhance your Response capabilities. Response integration between Acronis Cyber Protect Cloud and Lumu Requirements An Acronis Cyber Protect Cloud subscription ...
Forcepoint NGFW Custom Response Integration
This article shows how to leverage Forcepoint NGFW provided by the SMC (Security Manager Center) API and Lumu Defender API to enhance your Response capabilities. Response integration between Forcepoint NGFW and Lumu A typical Forcepoint NGFW ...
Jira Service Management Cloud Custom SecOps Integration
This article shows how to leverage Jira Service Management API and Lumu Defender API to enhance your SecOps capabilities, pushing Lumu incidents into a Jira SM (Service Management) deployment as Service Management Requests, and syncing both systems. ...
Chronicle SIEM Custom SecOps Integration
The Chronicle SIEM Custom SecOps integration allows you to receive Lumu detections and related operating events. In this article, you will find out how to configure your Chronicle SIEM instance and its Lumu integration to enhance your current ...
Kaseya BMS PSA Custom SecOps Integration
This article shows how to leverage Kaseya BMS API and Lumu Defender API to enhance your SecOps capabilities, pushing Lumu incidents into a BMS deployment as Service Desk - Tickets, and syncing both systems. SecOps integration between Kaseya BMS and ...
Elastic Defend Custom Response Integration
This article shows how to leverage the Lumu Defender API and Elastic Security API to mitigate security risks. Requirements Elastic Security subscription A Elastic Security subscription with the Elastic Defend Integration installed. Lumu Defender API ...
Cloudflare - S3 Compatible Storage Custom Data Collection Integration
In this article, you will find out how to configure your Cloudflare Enterprise subscription and the Lumu Custom Data Collection integration to pull, transform, and inject the DNS Gateway logs recorded by Cloudflare into Lumu to enhance the detection ...
Cato Networks Custom Data Collection Integration
In this article, you will find out how to configure your Cato Networks subscription and its Lumu Custom Data Collection integration to pull, transform, and inject the FW logs recorded by Cato Networks into Lumu to enhance the detection & response ...
Unisys Stealth Custom Response Integration
This article shows how to leverage the Lumu Defender API and Unisys Stealth Configuration API to mitigate security risks. This integration leverages the Unisys Stealth Dynamic Isolation feature. More details can be found in the Unisys Stealth ...
Malwarebytes Nebula Custom Response Integration
This article shows how to leverage the Lumu Defender API and Malwarebytes Nebula Configuration API to mitigate security risks. Requirements A Malwarebytes subscription. Malwarebytes DNS filtering module is required. If you don’t have this module ...
Akamai SIA Custom Response Integration
This article shows how to leverage the Lumu Defender API and Akamai SIA (ETP) Configuration API to mitigate security risks. Requirements An Akamai SIA subscription. An Akamai Control Center access is required for setting up and collecting Akamai ...
Akamai SIA Custom Data Collection Integration
In this article, you will find out how to configure your Akamai Secure Internet Access Enterprise (SIA) subscription and the Lumu Custom Data Collection integration to pull, transform, and inject the DNS query and Proxy logs recorded by Akamai into ...
GLPI Custom SecOps Integration
This article shows how to leverage GLPI API and Lumu Defender API to enhance your SecOps capabilities, pushing Lumu incidents into a GLPI deployment as Service Tickets, and syncing both systems. Requirements A GLPI active server and Web access. An ...
DNSFilter Custom Response Integration
This article shows how to leverage the Lumu Response API and DNSFilter API to mitigate security risks. Requirements An active DNSFilter subscription. A DNSFilter Pro subscription or up is required. Script host. A scripting host is required to deploy ...
DNSFilter Custom Data Collection Integration
In this article, you will find out how to configure your DNSFilter subscription and its Lumu Custom Data Collection integration to pull, transform, and inject the query logs recorded by DNSFilter into Lumu to enhance the detection & response ...
Microsoft Entra ID NSG Flow Logs Custom Data Collection Integration
Microsoft Azure is now called Entra ID In this article, you will find out how to configure your Microsoft Entra ID subscription and its Lumu Custom Data Collection integration to pull, transform, and inject Entra ID Network Security Group flow logs ...
Sophos UTM SG Custom Response Integration
This article shows how to leverage the Lumu Defender API and Sophos UTM SG API to mitigate security risks. Requirements Sophos UTM SG subscription You need a Sophos UTM SG with Firewall and Web filter capabilities. Lumu Defender API key To retrieve ...
ServiceNow Custom SecOps Integration
This article shows how to leverage ServiceNow API and Lumu Defender API to enhance your SecOps capabilities, pushing Lumu incidents into a ServiceNow deployment Incident Tickets, and syncing both systems. Requirements ServiceNow active subscription ...
Forcepoint Web Security Cloud Custom Response Integration
This article shows how to leverage the Lumu Defender API and Forcepoint Web Security Cloud to mitigate security risks. Forcepoint Web Security Cloud service doesn't have a REST API, so this script simulates the actions run by an admin user to feed a ...
Bitdefender Custom Response Integration
Bitdefender Custom Response Integration This article shows how to leverage the Lumu Defender API and Bitdefender API to mitigate security risks. Requirements GravityZone Business Security Enterprise, cloud version, ...
Check Point Harmony Email & Collaboration Custom Response Integration
This article shows how to leverage the Lumu Defender API and Check Point Harmony Email & Collaboration API to mitigate security risks. Requirements A Harmony Email & Collaboration subscription with Office 365 Mail or Gmail SaaS applications ...
Zscaler Custom Data Collection Integration
Before going through this article, check our Out-of-the-box App Integrations category. This is the recommended way to integrate the components of your cybersecurity stack with Lumu. If the product you are looking to integrate is there, it is advised ...
Sophos Antivirus Custom Response Integration
Before going through this article, check our Out-of-the-box App Integrations category . This is the recommended way to integrate the components of your cybersecurity stack with Lumu. If the product you are looking to integrate is there, it is advised ...
Trend Micro Apex Central Custom Response Integration
Before going through this article, check our Out-of-the-box App Integrations category. This is the recommended way to integrate the components of your cybersecurity stack with Lumu. If the product you are looking to integrate is there, it is advised ...
Trend Micro Web Security Custom Response Integration
Before going through this article, check our Out-of-the-box App Integrations category. This is the recommended way to integrate the components of your cybersecurity stack with Lumu. If the product you are looking to integrate is there, it is advised ...
Symantec Endpoint Protection Custom Response Integration
Before going through this article, check our Out-of-the-box App Integrations category. This is the recommended way to integrate the components of your cybersecurity stack with Lumu. If the product you are looking to integrate is there, it is advised ...