Vulnerability Management Dashboard a scanner to check if they are affected by the Log4j or Log4shell vulnerability at all. All you have to do is add a test string.
Log4j has been on everyone's lips for several weeks. DriveLock had already commented on this in a detailed blog post on Log4j and Log4Shell. There are many descriptions of the vulnerability and criticality (CVE-2021-44228 in Apache Log4j 2) on the Internet. Nevertheless, many IT departments are challenged with the simple question: "Am I affected at all and if so, on which systems and in which application?"
Are you affected by Log4j at all?
There is a compilation of the affected applications on Github, for example, but does a company actually use them? Even if the IT department has the appropriate asset management, so-called shadow IT is left out. Comprehensive vulnerability scanning, such as that offered by DriveLock for end devices, can help here. This means that all systems can be scanned with little effort and it is clear in which application there is a need for action.
For users of DriveLock Vulnerability Management, there is a simple and clear dashboard that bundles the relevant information about Log4j.
This is how you put together the test string
In the DriveLock Vulnerability Management Dashboard you proceed as follows
- In the DriveLock Operations Center select "Add new dashboard tab".
- In the pop-up window for creating a dashboard, select "New dashboard from string". Then copy the test string provided by DriveLock into the input field (freely available on the website mentioned below).
This gives customers a dashboard that shows the relevant vulnerabilities in the upper area and the affected machines in the lower area.
More at DriveLock.com
About DriveLock The German company DriveLock SE was founded in 1999 and is now one of the leading international specialists for IT and data security with branches in Germany, France, Australia, Singapore, the Middle East and the USA. In times of digital transformation, the success of companies depends to a large extent on how reliably people, companies and services are protected against cyber attacks and the loss of valuable data. DriveLock is committed to protecting corporate data, devices and systems. For this purpose, the company relies on the latest technologies, experienced security experts and solutions based on the zero trust model. In today's security architectures, zero trust means a paradigm shift based on the maxim "Never trust, always verify". In this way, data can be reliably protected even in modern business models.