You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-manage-Log4shell-guidance.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.custom: admindeeplinkDEFENDER
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 06/29/2022
18
+
ms.date: 06/14/2024
19
19
---
20
20
21
21
# Learn how to manage the Log4Shell vulnerability in Microsoft Defender for Endpoint
@@ -25,11 +25,11 @@ The Log4Shell vulnerability is a remote code execution (RCE) vulnerability found
25
25
> [!NOTE]
26
26
> Refer to the blogs [Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability and](https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/)[Microsoft Security Response Center](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/) for guidance and technical information about the vulnerability and product specific mitigation recommendations to protect your organization.
27
27
28
-
## Overview of discovery, monitoring and mitigation capabilities
28
+
## Overview of discovery, monitoring, and mitigation capabilities
29
29
30
30
Defender Vulnerability Management provides you with the following capabilities to help you identify, monitor, and mitigate your organizational exposure to the Log4Shell vulnerability:
31
31
32
-
-**Discovery**: Detection of exposed devices, both Microsoft Defender for Endpoint onboarded devices as well as devices that have been discovered but aren't yet onboarded, is based on vulnerable software and vulnerable files detected on disk.
32
+
-**Discovery**: Detection of exposed devices, both Microsoft Defender for Endpoint onboarded devices and devices that have been discovered but aren't yet onboarded, is based on vulnerable software and vulnerable files detected on disk.
33
33
-**Threat awareness:** A consolidated view to assess your organizational exposure. This view shows your exposure at the device level and software level, and provides access to details on vulnerable files like, the last time it was seen, the last time it was executed and the last time it was executed with open ports. You can use this information to prioritize your remediation actions. It can take up to 24 hours for data related to exposed devices to appear on the dashboard.
34
34
-**Mitigation options:** Apply mitigation options to help lower your exposure risk.
35
35
-**Advanced hunting:** Use advanced hunting to return details for vulnerable log4j files identified on disk.
@@ -47,14 +47,16 @@ Defender Vulnerability Management provides you with the following capabilities t
47
47
48
48
Embedded Defender Vulnerability Management capabilities, along with enabling Log4j detection, in the Microsoft Defender portal, will help you discover devices exposed to the Log4Shell vulnerability.
49
49
50
-
Onboarded devices, are assessed using existing embedded Defender Vulnerability Management capabilities that can discover vulnerable software and files.
50
+
Onboarded devices are assessed using existing embedded Defender Vulnerability Management capabilities that can discover vulnerable software and files.
51
51
52
-
For detection on discovered but not yet onboarded devices, Log4j detection must be enabled. This will initiate probes in the same way device discovery actively probes your network. This includes probing from multiple onboarded endpoints (Windows 10+ and Windows Server 2019+ devices) and only probing within subnets, to detect devices that are vulnerable and remotely exposed to CVE-2021-44228.
52
+
For detection on discovered but not yet onboarded devices, Log4j detection must be enabled. This initiates probes in the same way device discovery actively probes your network. Probing includes multiple onboarded endpoints (Windows 10+ and Windows Server 2019+ devices) and only probing within subnets to detect devices that are vulnerable and remotely exposed to CVE-2021-44228.
53
53
54
54
To enable Log4 detection:
55
55
56
56
1. Go to **Settings** > **Device discovery** > **Discovery setup**.
:::image type="content" source="media/enable-log4j.png" alt-text="Screenshot of setting to enable log4j2 detection." lightbox="media/enable-log4j.png":::
@@ -95,7 +97,9 @@ This table describes the search capabilities supported platforms and versions:
95
97
## Learn about your Log4Shell exposure and mitigation options
96
98
97
99
1. In the Microsoft Defender portal, go to **Vulnerability management** > **Weaknesses**.
100
+
98
101
2. Select **CVE-2021-44228**.
102
+
99
103
3. Select **Open vulnerability page**.
100
104
101
105
:::image type="content" source="media/open-vulnerability-page.png" alt-text="Screenshot of vulnerability page on the vulnerability management dashboard." lightbox="media/open-vulnerability-page.png":::
@@ -106,6 +110,7 @@ This table describes the search capabilities supported platforms and versions:
106
110
The log4Shell vulnerability can be mitigated by preventing JNDI lookups on Log4j versions 2.10 - 2.14.1 with default configurations. To create this mitigation action, from the **Threat awareness dashboard**:
107
111
108
112
1. Select **View vulnerability details**.
113
+
109
114
2. Select **Mitigation options**.
110
115
111
116
You can choose to apply the mitigation to all exposed devices or select specific onboarded devices. To complete the process and apply the mitigation on devices, select **Create mitigation action**.
@@ -139,18 +144,21 @@ In cases where the mitigation needs to be reverted, follow these steps:
0 commit comments