Log4J - Log4Shell - Detections
Summary
This document displays information about the EDFs filled by the SEC - Endpoint Protection - Script - Log4J (Log4Shell) File Scan. These EDFs indicate vulnerability information about the Log4J/Log4Shell exploit.
Dependencies
Columns
| Column | Description |
|---|---|
| Client | The client of the displayed computer. |
| ComputerID | The ID of the displayed computer. |
| Computer | The name of the displayed computer. |
| Last Scan | The last time that a scan was performed. |
| Attack Attempts Detected | True if the YARA scan detected attack attempts; otherwise, False. |
| Vulnerable Files Present | True if vulnerable files were detected; otherwise, False. |
| Vulnerable Libraries Present | True if the Luna scan detected vulnerable libraries; otherwise, False. |
| Log Location | The location on the computer of the script log file. |
| YARA Log Location | The location on the computer of the YARA log file. |
| Luna Log Location | The location on the computer of the Luna log file. |