• Home
  • Podcast
  • Contact
Ervik.as
Cloud, Cyber Security, EUC, DaaS and HCI
  • Cloud
    • Azure
    • Citrix Cloud
    • Cloud Management
    • Nutanix Clusters
  • Cyber Security
    • Arctic Wolf
    • Cyber Security News
  • EUC
    • Citrix
      • Citrix Analytics
      • Citrix NetScaler
      • Citrix Provisioning
      • Receiver
      • ShareFile
      • Citrix Virtual Apps (XenApp)
      • Citrix Virtual Desktops (XenDesktop)
      • Workspace
      • Workspace app
    • DaaS
      • Azure Virtual Desktop
      • Frame
    • Microsoft
      • HoloLens
      • Microsoft App-V
      • Remote Desktop Services
      • Windows 7
      • Windows 8
      • Windows 10
      • Windows Server 2008
      • Windows Server 2008 R2
      • Windows Server 2012
      • Windows Server 2012 R2
      • Windows Server 2016
    • Thin Clients
      • Igel
      • Wyse
    • VMware
      • Fusion
      • Horizon View
      • Vmware ThinApp
      • Vmware Workstation
    • Parallels
      • Remote Application Server
  • End User Experience
    • ControlUp
    • eG Innovations
    • Goliath Technologies
    • Liquidware
  • Datacenter
    • Backup & Disaster Recovery
      • Altaro
      • HYCU
      • Unitrends
      • Rubrik
      • Veeam Software
    • Containers
      • Docker
      • Red Hat OpenShift
    • Hybrid Multi Cloud
      • Nutanix
        • Nutanix Database Service
        • Files
        • Flow
        • Nutanix AHV
        • Nutanix Cloud Platform
    • Server Virtualization
      • Nutanix AHV
      • Microsoft Hyper-V
      • VMware vSphere
      • Citrix Hypervisor (XenServer)
    • Network & Security
      • Nutanix Flow
      • Palo Alto Networks
  • About
    • Cookie Policy (EU)
    • News
      • Citrix Community News

Networking & Security/ Nutanix/ Nutanix Flow

Defend Against Apache Log4j Log4Shell Vulnerability with Nutanix Flow

Alexander Ervik Johnsen Log4j, Log4j Log4Shell, Microsegmentation, Nutanix, Nutanix Flow, Security 2022-01-03

Defend Against Apache Log4j Log4Shell Vulnerability with Nutanix Flow

Learn how to use Nutanix Flow microsegmentation to protect your critical infrastructure against the Log4j Log4Shell vulnerability.

In this video you’ll see how to use Nutanix Flow to help implement a defense in depth strategy to stop attackers from exploiting attacks like CVE-2021-44228 (Log4j Log4Shell). Stop traffic to and from any vulnerable VM on AHV processing logs and running Log4j with a few simple rules in a security policy.

For more information about Log4j check out: https://nvd.nist.gov/vuln/detail/CVE-…

For the Nutanix Security Advisory take a look at: https://download.nutanix.com/alerts/S…

Related Posts

Networking & Security /

Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices

Nutanix /

Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption

Nutanix Flow

Nutanix Flow /

Nutanix Security Central simplifies Microsegmentation Policies

Networking & Security /

Optimizing Security Postures Through Effective Security Operations

Nutanix /

Cisco Discontinues HyperFlex for Nutanix with new Strategic Relationship

‹ Choose friction free EUC with Citrix on Nutanix› Cisco ASAv appliance is now validated to run on Nutanix AHV

Back to Top

Crafted in the land of the Vikings 🇳🇴 by Alexander Ervik Johnsen.
Copyright 2000-2025 - www.ervik.as - All Rights Reserved