Skip to content

Rapid7 Insight

Rapid7 Insight

About

Partnering with Rapid7 gives you solutions you can count on, seamless controls, and the strategic guidance you need to stay ahead of attacks. The Insight Platform also helps unite your teams so you can stop putting out fires and focus on the threats that matter. Security, IT, and DevOps now have easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more.

Product Details

Vendor URL: Rapid7 Insight

Product Type: Vulnerability Management

Product Tier: Tier II

Integration Method: Syslog

Integration URL: Rapid7 Insight

Log Guide: N/A

Parser Details

Log Format: JSON

Expected Normalization Rate: Near 100%

Data Label: RAPID7_INSIGHT

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
last_found metadata.event_timestamp
last_found extensions.vulns.vulnerabilities[0].last_found
first_found extensions.vulns.vulnerabilities[0].first_found
solution_summary,solution_type extensions.vulns.vulnerabilities[0].description
proof extensions.vulns.vulnerabilities[0].name
solution_fix extensions.vulns.vulnerabilities[0].vendor_knowledge_base_article_id
vulnerability_id extensions.vulns.vulnerabilities[0].vendor_vulnerability_id

Product Event Types

type,subtype UDM Event Classification
blank GENERIC_EVENT

Log Sample

{"check_id":null,"first_found":"2023-07-25T23:18:08Z","key":"C:\\Program Files\\Java\\jre1.8.0_311\\bin\\java.dll","last_found":"2023-08-25T12:15:08.394Z","port":null,"proof":"\u003cp\u003e\u003cp\u003eVulnerable OS: Microsoft Windows 10 20H2\u003cp\u003e\u003c/p\u003e\u003c/p\u003e\u003cp\u003eVulnerable software installed: Oracle JRE 1.8.0.311 (C:\\Program Files\\Java\\jre1.8.0_311\\bin\\java.dll)\u003c/p\u003e\u003c/p\u003e","protocol":null,"solution_fix":"\u003cp\u003eDownload and apply the upgrade from: \u003ca href=\"https://www.java.com/en/download/manual.jsp\"\u003ehttps://www.java.com/en/download/manual.jsp\u003c/a\u003e\u003c/p\u003e","solution_id":"jre-upgrade-latest","solution_summary":"Upgrade to the latest version of Oracle Java","solution_type":"rollup","status":"VULNERABLE_VERS","vulnerability_id":"jre-vuln-cve-2023-21937"}

Sample Parsing

metadata.event_timestamp = "2023-08-25T13:38:44.765196Z"
metadata.event_type = "GENERIC_EVENT"
metadata.log_type"RAPID7_INSIGHT"
metadata.product_name"Insight"
metadata.vendor_name"Rapid7"
extensions.vulns.vulnerabilities[0].description = "rollup -- Upgrade to the latest version of Oracle Java"
extensions.vulns.vulnerabilities[0].first_found = "2023-07-25T23:18:08Z"
extensions.vulns.vulnerabilities[0].last_found = "2023-08-25T12:15:08.394Z"
extensions.vulns.vulnerabilities[0].name = "Vulnerable OS: Microsoft Windows 10 20H2 Vulnerable software installed: Oracle JRE 1.8.0.311 (C:\Program Files\Java\jre1.8.0_311\bin\java.dll)"
extensions.vulns.vulnerabilities[0].vendor_knowledge_base_article_id = "Download and apply the upgrade from: https://www.java.com/en/download/manual.jsp"
extensions.vulns.vulnerabilities[0].vendor_vulnerability_id = "jre-vuln-cve-2023-21937"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon