I addition to the blog-post about LogPoint and Log4j update here: https://www.logpoint.com/en/blog/status-on-log4j-vulnerability-in-logpoint/ - LogPoint also created another Blog-Post on how a combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and put a stop to the attack
Read it here: https://www.logpoint.com/en/blog/detecting-log4shell-requires-more-than-just-a-siem/
Regards,
Brian Hansen, LogPoint
VP, Customer Success