Log4j Vulnerability User Guide

Secure infrastructure with simple, actionable data against Log4j vulnerable files.

How This Feature Helps You

The Log4j Vulnerability DEX pack offers several benefits that can significantly enhance the security posture of an organization. Key advantages:

Actionable Data: Provides detailed, actionable data to determine the impacts, spread, and relative vulnerability to the Log4j vulnerability across your enterprise.

Threat Identification: Helps identify systems that are still vulnerable to the Log4j vulnerability, ensuring that these systems are prioritized for patching and remediation.

Patch Management: Facilitates the monitoring and management of patch status for systems affected by the Log4j vulnerability, ensuring that all systems are up-to-date and secure.

Impact Analysis: Offers insights into the potential impact of the Log4j vulnerability, helping prioritize remediation efforts based on the severity and spread of the threat.

Proactive Security: By continuously monitoring for new vulnerabilities related to Log4j, it helps maintain a proactive security stance, ensuring that emerging threats are addressed promptly.

These features collectively contribute to a more secure and resilient IT infrastructure.

Vulnerability Summary

This graph displays the systems that are secure and those that are still vulnerable to Log4j. The systems that have received an updated patch are in green. Those that have not been updated and are still vulnerable appear in red.

Note: Any system that has less than Log4j version 2.17 is considered vulnerable and will trigger the sensor. See Trigger Information for more details.

Vulnerable Systems

This grid provides details of the system and the files that are vulnerable to Log4j. Any system that has an Log4j version of 2.17 or lower is considered vulnerable. Select a system or file from the grid to display more details in the Unpatched Files (Selected) grid. You may also use the search bar to find a specific system. Unpatched Files (Selected) This grid displays details of vulnerable files. Included is information on the Full Path (the way that the Log4J vulnerability was accessed), the Run Time (when it occurred), and the number of affected Systems. This grid also has a Run Time Count to determine how many times the vulnerable file has run through the system.

Unpatched Files (Selected)

This grid displays details of vulnerable files. Included is information on the Full Path (the way that the Log4J vulnerability was accessed), the Run Time (when it occurred), and the number of affected Systems. This grid also has a Run Time Count to determine how many times the vulnerable file has run through the system.