Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />9/18 <br />PRIVATE - Controlled by Lumifi Cyber <br />LINUX SERVER <br />SENSOR <br />ONBOARDING & <br />ACTIVATION <br />(CI-P-SENSOR) <br />LUMIFI monitors on-premises Linux Servers using the Lumifi Cyber Linux Server Sensor <br />(“Linux Server Sensor”). The Linux Server Sensor allows LUMIFI to monitor process <br />information, command execution, files, file events. The Linux Server Sensor converts that <br />information to metadata to then correlate traffic, processes, users, and commands for <br />security, DDoS, and breach attempt detections. LUMIFI will provide reasonable <br />assistance in activating the Linux Server Sensor(s) and will work with Customer to <br />ensure Linux Server Sensor stability. <br /> <br />Customer responsibilities during Linux Server Sensor onboarding: <br />• Understand how to and take responsibility for ensuring the Linux Server Sensor <br />agent is properly configured to send data to either an on-premises aggregator or <br />directly to Stellar Cyber <br />o NOTE: LUMIFI does not provide support for installing and properly <br />configuring a Linux Server, and is entirely the responsibility of the <br />Customer <br />• Install the Linux Server Sensor the desired customer Linux Server <br />• Ensure requested firewall rules have been added or modified according to <br />LUMIFI’s documentation <br /> <br />The Linux Server Sensor service is activated once the following are completed: <br />The Linux Server Sensor is activated once LUMIFI verifies expected data is <br />successfully being received into LUMIFI’s platforms and is operating normally. <br />CVI ONBOARDING <br />& ACTIVATION <br />(CI-CVI) <br />If Customer has purchased the add-on Continuous Vulnerability Identification service in <br />addition to a Collector, LUMIFI will configure the Collector for this service prior to <br />shipping the Collector. <br /> <br />Customer responsibilities during CVI onboarding: <br />• Provide list of targets for the CVI scans, i.e. IP Ranges, subnets etc. <br />• Enable any internal firewall rules needed for vulnerability scanning behind <br />firewalled internal networks <br />• Provide Domain Admin credentials if credentialed scanning is desired (multiple <br />secure methods are available) <br />CVI is activated once the following are completed: <br />The scanner license is activated on the Collector and has LUMIFI has confirmed the <br />configuration and enabled scans are being received as expected.