Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Product Training | Automate Attack Response with Lumu Defender and Fortinet

Watch this video on
Español
This training session provides a comprehensive walkthrough of the Lumu portal, specifically focusing on the management and analysis of security incidents. The presenter demonstrates how users can investigate malicious activities like Command and Control (C2C) and ransomware families such as Sodinokibi by utilizing features like the MITRE ATT&CK Matrix, incident response playbooks, and compromise radar. A key highlight is the introduction of a new email reporting feature that enables users to share detailed incident findings and PDF reports with external stakeholders or vendors directly from the portal.

Takeaways

  • External Reporting Feature: Lumu now allows the generation and emailing of incident reports to external parties, providing a PDF summary that includes all granular details and functional links found within the portal.
  • Dual-Feed Integration: The FortiGate integration generates two separate URLs: a domain/URL threat feed and an IP address block list, both of which must be configured as external connectors.
  • Threat Scope: Users can customize the integration to block specific threat categories, including malware, C2C, spam, phishing, and crypto-mining, with an initial sync covering the last 30 days of detected adversaries.
  • Configuration Best Practices: For FortiGate external connectors, it is recommended to set the refresh rate to 30 minutes and deactivate the HTTP setting during the setup process.
  • Automated Enforcement: Real-time protection is achieved by adding the Lumu threat feeds to “Security Profiles” (Web Filter) and “Firewall Policies,” setting the action to “block” or “deny” for all identified malicious traffic.

FAQs

What information is included in the new email reporting feature?

The recipient receives high-level incident information and a link to download a detailed PDF report containing all the data available in the portal’s incident tabs.

Which threat types can be selected for the FortiGate blocking process?

Users can choose to include malware, command and control (C2C), spam, phishing, and crypto mining in the integration configuration.

What specific version of FortiGate was used in the demonstration?

The demonstration was conducted using FortiGate version 7.2.0.

How are the malicious URLs applied within the FortiGate firewall?

The URLs are added as an external connector in the Security Fabric, then assigned to a Web Filter profile with the action set to block, and finally applied to a firewall policy.

Where can users find support if they have trouble with the integration?

Users can access documentation or submit a support ticket via the question mark icon located at the bottom of the Lumu portal, with 24/7 support available.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.