Log4J - Log4Shell - Detections
Summary
This document displays information about the EDFs filled by the SEC - Endpoint Protection - Script - Log4J (Log4Shell) File Scan. These EDFs indicate vulnerability information about the Log4J/Log4Shell exploit.
Dependencies
Columns
| Column | Description | 
|---|---|
| Client | The client of the displayed computer. | 
| ComputerID | The ID of the displayed computer. | 
| Computer | The name of the displayed computer. | 
| Last Scan | The last time that a scan was performed. | 
| Attack Attempts Detected | True if the YARA scan detected attack attempts; otherwise, False. | 
| Vulnerable Files Present | True if vulnerable files were detected; otherwise, False. | 
| Vulnerable Libraries Present | True if the Luna scan detected vulnerable libraries; otherwise, False. | 
| Log Location | The location on the computer of the script log file. | 
| YARA Log Location | The location on the computer of the YARA log file. | 
| Luna Log Location | The location on the computer of the Luna log file. |