Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
FortiSIEM - Log4j - Mitigating CVE-2021-44228
Please see link to mitigation steps Techincal Tip : FortiSIEM - Log4j - Mitigating CVE-2021-44228 and apply as soon as possible.
Please see the FortiGuard PSIRT announcement for more information https://www.fortiguard.com/psirt/FG-IR-21-245
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
Please see the FortiGuard PSIRT announcement for more information https://www.fortiguard.com/psirt/FG-IR-21-245
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
Solved! Go to Solution.
Labels:
- Labels:
-
SIEM
1 Solution
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Tony, Simon,
Link has been updated https://community.fortinet.com/t5/FortiSIEM/Techincal-Tip-FortiSIEM-Log4j-Mitigating-CVE-2021-44228/ta-p/201008
Thanks
Dan
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
Link has been updated https://community.fortinet.com/t5/FortiSIEM/Techincal-Tip-FortiSIEM-Log4j-Mitigating-CVE-2021-44228/ta-p/201008
Thanks
Dan
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
3 REPLIES 3
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The link is asking for credentials, I am not able to access to it even by having access to Support portal and been registered in the community.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Tony
I got the instructions through a ticket system, here you can find my ansible script that implements these:
https://fusecommunity.fortinet.com/groups/community-home/digestviewer/viewthread?MessageKey=795b04ad-ee44-46a3-828d-30fdb540c907&CommunityKey=cabea62a-f0c7-4c62-8f8c-e798d7c4ae38&tab=digestviewer#bm795b04ad-ee44-46a3-828d-30fdb540c907
Regards
Simon
I got the instructions through a ticket system, here you can find my ansible script that implements these:
https://fusecommunity.fortinet.com/groups/community-home/digestviewer/viewthread?MessageKey=795b04ad-ee44-46a3-828d-30fdb540c907&CommunityKey=cabea62a-f0c7-4c62-8f8c-e798d7c4ae38&tab=digestviewer#bm795b04ad-ee44-46a3-828d-30fdb540c907
Regards
Simon
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Tony, Simon,
Link has been updated https://community.fortinet.com/t5/FortiSIEM/Techincal-Tip-FortiSIEM-Log4j-Mitigating-CVE-2021-44228/ta-p/201008
Thanks
Dan
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------
Link has been updated https://community.fortinet.com/t5/FortiSIEM/Techincal-Tip-FortiSIEM-Log4j-Mitigating-CVE-2021-44228/ta-p/201008
Thanks
Dan
------------------------------
Daniel
FortiSIEM Product Manager
------------------------------