Log4j Vulnerability User Guide

Secure infrastructure with simple, actionable data against Log4j vulnerable files.

Vulnerability Summary

This graph displays the systems that are secure and those that are still vulnerable to Log4j. The systems that have received an updated patch are in green. Those that have not been updated and are still vulnerable appear in red.

Note: Any system that has less than Log4j version 2.17 is considered vulnerable and will trigger the sensor. See Trigger Information for more details.

Vulnerable Systems

This grid provides details of the system and the files that are vulnerable to Log4j. Any system that has an Log4j version of 2.17 or lower is considered vulnerable. Select a system or file from the grid to display more details in the Unpatched Files (Selected) grid. You may also use the search bar to find a specific system. Unpatched Files (Selected) This grid displays details of vulnerable files. Included is information on the Full Path (the way that the Log4J vulnerability was accessed), the Run Time (when it occurred), and the number of affected Systems. This grid also has a Run Time Count to determine how many times the vulnerable file has run through the system.

Unpatched Files (Selected)

This grid displays details of vulnerable files. Included is information on the Full Path (the way that the Log4J vulnerability was accessed), the Run Time (when it occurred), and the number of affected Systems. This grid also has a Run Time Count to determine how many times the vulnerable file has run through the system.