{"id":18805,"date":"2021-12-21T08:23:00","date_gmt":"2021-12-21T08:23:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=18805"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/","title":{"rendered":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2 is an open source Java logging framework, which is widely used in middleware, development frameworks and web applications to record log information. The vulnerability PoC has been made public on the Internet and can be exploited in the default configuration. The vulnerability has a wide range of impacts.<\/p>\n\n\n\n<p>To solve the customer&#8217;s potential web security risks as soon as possible, the NSFOCUS emergency response team extracted the attack payload, and the WAF offensive and defensive team formulated corresponding protection rules for the payload characteristics. At 2:48 A.M. on December 10 (China Standard Time), the NSFOCUS WAF team released effective protection rules officially. Proved by users who applied the rules immediately, NSFOCUS WAF can effectively intercept activities targeting the Log4j2 vulnerability.<\/p>\n\n\n\n<p>On December 12, vulnerability exploitation to bypass the rules appeared. The WAF and SOC team updated the protection rules instantly and blocked another wave of threats from the network. For users who are using NSFOCUS WAF, there are 3 steps to mitigate the risk of Log4j2 vulnerabilities.&nbsp; <\/p>\n\n\n\n<p><strong>Step1:<\/strong> Update the rule base to the latest version (6.0.7.3.52185)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"434\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-1024x434.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18814\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-1024x434.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-300x127.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-768x326.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-1536x651.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1-200x85.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step1.jpg 1903w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Step2:<\/strong> Enter Security Management&gt;Policy Management&gt;Web Server\/Plug-in Protection and tick the Log4j2 rule in the plug-in vulnerability rule.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"431\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-1024x431.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18816\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-1024x431.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-300x126.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-768x323.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-1536x647.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1-200x84.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step2-1.jpg 1904w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Step3:<\/strong> Enter Security Management&gt;Website Protection&gt;Policy Configuration, select the Web Server\/Plug-in Protection rules configured just now, and save the configuration.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3.jpg\"><img decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-1024x441.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18810\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-1024x441.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-300x129.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-768x330.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-1536x661.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3-200x86.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/12\/3step3.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2 is an open source Java logging framework, which is widely used in middleware, development frameworks and web applications to record log information. The vulnerability PoC has been made public on the Internet and can [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-18805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-21T08:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF\",\"datePublished\":\"2021-12-21T08:23:00+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/\"},\"wordCount\":257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/nsfocus3.jpg\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/\",\"name\":\"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/nsfocus3.jpg\",\"datePublished\":\"2021-12-21T08:23:00+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/nsfocus3.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/nsfocus3.jpg\",\"width\":394,\"height\":207,\"caption\":\"Green digital padlock with circular patterns.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS","og_description":"On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2","og_url":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/","og_site_name":"NSFOCUS","article_published_time":"2021-12-21T08:23:00+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS","twitter_description":"On December 9, NSFOCUS monitored the disclosure of the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) on the Internet. Apache Log4j2","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF","datePublished":"2021-12-21T08:23:00+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/"},"wordCount":257,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/","url":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/","name":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","datePublished":"2021-12-21T08:23:00+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/nsfocus3.jpg","width":394,"height":207,"caption":"Green digital padlock with circular patterns."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/3-steps-to-mitigate-the-log4j2-vulnerabilities-using-nsfocus-waf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"3 Steps to Mitigate the Log4j2 Vulnerabilities Using NSFOCUS WAF"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18805"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7730"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}