{"id":70097,"date":"2021-12-23T06:54:20","date_gmt":"2021-12-23T14:54:20","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/solarwinds-copy\/"},"modified":"2024-03-08T10:03:52","modified_gmt":"2024-03-08T18:03:52","slug":"log4shell","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/log4shell\/","title":{"rendered":"Log4Shell"},"content":{"rendered":"<h1>Log4j<\/h1>\n<h2 class=\"c-title\">Detect and Respond to Log4Shell Vulnerability<\/h2>\n<p>Forescout can help you detect vulnerable instances of Log4j in your environment, patch or update software, identify ongoing exploits, and segment devices from the network.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png\" loading=\"lazy\"><\/p>\n<p><strong>Identify Vulnerable Devices<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Icon_Investigate-targeted-devices.png\" loading=\"lazy\"><\/p>\n<p><strong>Investigate Targeted Devices<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Patch-or-Change-Configurations.png\" loading=\"lazy\"><\/p>\n<p><strong>Patch or Change Configurations<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Investigate-Targeted-Devices.png\" loading=\"lazy\"><\/p>\n<p><strong>Identify Attacks: Detecting Ongoing Exploits<\/strong><\/p>\n<p><a href=\"\/blog\/forescout%E2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\" title=\"Read the Blog\" class=\"c-btn c-btn--primary\">Read the Blog<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/01\/FS-2022-Log4j-Page-Module-1.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Learn How to Mitigate Log4j Vulnerabilities with the Forescout Platform<\/h2>\n<p>Learn how to detect vulnerable managed assets with eyeSight and potentially exploited endpoints with eyeInspect.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=v70tMqLuqN4\" title=\"Watch Video\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Watch Video<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Screen-Shot-2021-12-24-at-8.12.11-AM.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Lessons Learned from Log4Shell<\/h2>\n<p>Forescout experts discuss the Log4j vulnerabilities \u2013 what happened, what was the impact and how do we mitigate these risks in the future.<\/p>\n<p><a href=\"https:\/\/youtu.be\/ME036t3yivk\" title=\"Watch Video\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Watch Video<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/01\/FS-2022-Log4j-Page-Module-2.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Forescout Platform<\/h2>\n<p>Forescout recommends updating your software to the latest version. For the most up to date information, refer to KB Article #12049 on Forescout\u2019s customer support portal.<\/p>\n<p><a href=\"https:\/\/forescout.force.com\/support\/s\/article\/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228\" title=\"Learn More\" class=\"c-btn c-btn--primary\">Learn More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/01\/FS-2022-Log4j-Page-Module-3.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Research &amp; Analysis<\/h2>\n<p>Get the latest technical communications on this evolving situation on our Vedere Labs technical blog.<\/p>\n<p><a href=\"https:\/\/github.com\/Forescout\/log4j_response\" title=\"Learn More\" class=\"c-btn c-btn--primary\">Learn More<\/a><\/p>\n<h2 class=\"c-title\">Forescout Products<\/h2>\n<p>Get the capabilities you need to build a tailored security solution for your Enterprise of Things  and the ability to orchestrate actions to reduce cyber risk.<\/p>\n<h3 class=\"c-card__title\">\neyeSight<br \/>\n<\/h3>\n<p>Assess Your Risk: Finding Vulnerable Devices<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesight\/\" title=\"eyeSight\" class=\"c-read-more c-link-expand u-mt-auto\">eyeSight<\/a><\/p>\n<h3 class=\"c-card__title\">\neyeInspect<br \/>\n<\/h3>\n<p>Identify Attacks: Detecting Ongoing Exploits<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyeinspect\/\" title=\"eyeInspect\" class=\"c-read-more c-link-expand u-mt-auto\">eyeInspect<\/a><\/p>\n<h3 class=\"c-card__title\">\neyeSegment<br \/>\n<\/h3>\n<p>Protect Your Organization: Segmenting the Network<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\" title=\"eyeSegment\" class=\"c-read-more c-link-expand u-mt-auto\">eyeSegment<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/dots.png\" class=\"c-split-cta__ornament c-split-cta__ornament--left\" loading=\"lazy\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/dots.png\" class=\"c-split-cta__ornament c-split-cta__ornament--right\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title\">Request a Demo<\/h2>\n<p>Get a personalized tour of our solutions and see how we can help you protect your Enterprise of Things.<\/p>\n<p><a href=\"\/demo\/\" title=\"Request a Demo\" class=\"c-btn c-btn c-btn--secondary u-mt-auto u-mt-auto\">Request a Demo<\/a><\/p>\n<h2 class=\"c-title\">Take a Test Drive<\/h2>\n<p>Embark on a 90-minute, hands-on tour of Forescout, covering device visibility, asset management, incident response and network segmentation.<\/p>\n<p><a href=\"\/test-drives\/\" title=\"Schedule a Test Drive\" class=\"c-btn c-btn c-btn--primary-dark u-mt-auto u-mt-auto\">Schedule a Test Drive<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Log4j Detect and Respond to Log4Shell Vulnerability Forescout can help you detect vulnerable instances of Log4j in your environment, patch or update software, identify ongoing exploits, and segment devices from the network. Identify Vulnerable Devices Investigate Targeted Devices Patch or Change Configurations Identify Attacks: Detecting Ongoing Exploits Read the Blog Learn How to Mitigate Log4j [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":101,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-70097","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4Shell - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/log4shell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4Shell - Forescout\" \/>\n<meta property=\"og:description\" content=\"Log4j Detect and Respond to Log4Shell Vulnerability Forescout can help you detect vulnerable instances of Log4j in your environment, patch or update software, identify ongoing exploits, and segment devices from the network. Identify Vulnerable Devices Investigate Targeted Devices Patch or Change Configurations Identify Attacks: Detecting Ongoing Exploits Read the Blog Learn How to Mitigate Log4j [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/log4shell\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T18:03:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/\",\"name\":\"Log4Shell - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png\",\"datePublished\":\"2021-12-23T14:54:20+00:00\",\"dateModified\":\"2024-03-08T18:03:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/log4shell\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png\",\"width\":100,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/log4shell\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Log4Shell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4Shell - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/log4shell\/","og_locale":"en_US","og_type":"article","og_title":"Log4Shell - Forescout","og_description":"Log4j Detect and Respond to Log4Shell Vulnerability Forescout can help you detect vulnerable instances of Log4j in your environment, patch or update software, identify ongoing exploits, and segment devices from the network. Identify Vulnerable Devices Investigate Targeted Devices Patch or Change Configurations Identify Attacks: Detecting Ongoing Exploits Read the Blog Learn How to Mitigate Log4j [&hellip;]","og_url":"https:\/\/www.forescout.com\/research-labs\/log4shell\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T18:03:52+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/","url":"https:\/\/www.forescout.com\/research-labs\/log4shell\/","name":"Log4Shell - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png","datePublished":"2021-12-23T14:54:20+00:00","dateModified":"2024-03-08T18:03:52+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/log4shell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/12\/Identify-Attacks-Detecting-Ongoing-Exploits.png","width":100,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/log4shell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Log4Shell"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70097"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70097\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70097"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}