Log4Shell: A Tale of Two Detection Techniques
Tenable
FEBRUARY 15, 2022
Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Using an endpoint agent, for example endpoint detection and response (EDR), or a credentialed scan to identify Log4j instances will only get you so far. Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j.
Let's personalize your content