Product Tutorials

Enabling Critical Controls In Nexpose Ultimate

Enabling Critical Controls In Nexpose Ultimate

Are you looking for a platform that allows you to not only provide vulnerability management but also assess your security controls effectiveness? Watch this video to see how Nexpose Ultimate allows you to easily see what top controls you have in place, where there are gaps in your controls configuration, and measure coverage over time.

How to Quickly Investigate Security Incidents in UserInsight

How to Quickly Investigate Security Incidents in UserInsight

Are you interested in a product that allows you to easily investigate security incidents? Maybe you are an incident responder that is sick of crawling through logs for information. In UserInsight you are able to easily understand an attacker's session on your network. How did they get into your network? Whose credentials did they steal? What did they do when they were inside? And more! Watch this video to see how our investigations workbench works.

How to Easily Deploy Honey Pots and Honey Users in UserInsight

How to Easily Deploy Honey Pots and Honey Users in UserInsight

UserInsight allows you to detect the most common attack paths being used today in real time so you can contain these incidents quickly. One way UserInsight can detect attackers early is through honey pots and honey users. If anyone were to scan your network the honey pot(s) would be triggered and UserInsight would alert you. See how easy it is to deploy a UserInsight honey pot and honey user on your network. Once the honey pot and honey users are deployed we will maintain your honey net.

Detecting Lateral Movement with UserInsight

Detecting Lateral Movement with UserInsight

UserInsight allows you to detect the most common attack paths being used today in real time so you can contain these incidents quickly. One way UserInsight detects malicious behavior is by alerting you when it detects incidents involving lateral movement. Watch this video to see how this works.

Integrating Vulnerability Data into UserInsight

Integrating Vulnerability Data into UserInsight

See how integrating vulnerability data into UserInsight allows you to understand how vulnerabilities relate to your users, giving you added context when containing incidents or investigating remediation efforts.

Quickly Identify and Contain Incidents with UserInsight

Quickly Identify and Contain Incidents with UserInsight

The average breach goes undetected for 229 days. It's time to demand more from your security vendors. See how UserInsight can help you identify and contain incidents quickly.

See How the Nexpose Top Remediation Report Can Prioritize Remediation Efforts

See How the Nexpose Top Remediation Report Can Prioritize Remediation Efforts

With the Nexpose top remediation report you are able to prioritize your remediation efforts. This report tells you the top vulnerabilities you should remediate in order to make the biggest impact and lower the most risk across your environment.

How to Create Custom Scan Templates in Nexpose for Targeted Scanning

How to Create Custom Scan Templates in Nexpose for Targeted Scanning

Within Nexpose you are able to create custom scan templates giving you the flexibility to scan for relevant threats across relevant assets. Watch now.

Testing Your Network Segmentation with Metasploit Pro

Testing Your Network Segmentation with Metasploit Pro

Testing your network segmentation is easy with Metasploit Pro. Whether you are looking to do this in order to achieve PCI 3.0 standards, or if you simply want to test that a specific network is indeed, unreachable from other segments, you can easily do this using Metasploit Pro. Watch now.

See How Rapid7 Products Can Help You Achieve PCI 3.0 Compliance

See How Rapid7 Products Can Help You Achieve PCI 3.0 Compliance

A major concern for security teams in the retail space is around achieving PCI compliance and ensuring customers that their credit card information is safe. See how Rapid7 products can help you achieve PCI compliance. Watch this video to learn more.

See How to Test Your User's Credentials Using, Brute-Force, Social Engineering, and Password Reuse Tactics with Metasploit Pro

See How to Test Your User's Credentials Using, Brute-Force, Social Engineering, and Password Reuse Tactics with Metasploit Pro

According to the latest Verizon data breach report, two out of three breaches involved stolen user credentials. See how to test your user's credentials using the common tactics attackers use within Metasploit Pro.

How to Monitor Cloud Application Usage in UserInsight

How to Monitor Cloud Application Usage in UserInsight

Looking to get a grasp on what cloud apps your user's are using? Looking to investigate a disgruntled employee to see if they are downloading data from cloud applications? Are you worried that your user's cloud app credentials could be stolen and you have no visibility? Watch this video to see how UserInsight can effectively monitor cloud application usage across all users on your network and alert you when suspicious activity occurs.

How to Validate Vulnerabilities in Metasploit Pro

How to Validate Vulnerabilities in Metasploit Pro

So, you've done an effective job scanning your network for vulnerabilities, but do you know exactly which vulnerabilities are exploitable on your network? Maybe some vulnerabilities are hidden behind security controls for example, and are not actually exploitable. With Metasploit Pro you are able to easily validate the vulnerabilities that you find so that you can prioritize remediation efforts on vulnerabilities that pose the highest risk. Watch this video to see how this works.

How Rapid7 RealContext within Nexpose Allows You to Focus on the Most Critical Vulnerabilities

How Rapid7 RealContext within Nexpose Allows You to Focus on the Most Critical Vulnerabilities

Gone are the days when a security team can remove all vulnerabilities from their network. See how Rapid7's RealContext within Nexpose allows you to tag your critical assets so that they are always a priority when it comes to remediation.

How to Use Dynamic Asset Groups in Nexpose to Report and Analyze Vulnerabilities within Certain Asset Groups

How to Use Dynamic Asset Groups in Nexpose to Report and Analyze Vulnerabilities within Certain Asset Groups

Watch this video to see how you can use our dynamic asset groups feature within Nexpose to scan for vulnerabilities and provide reporting around custom asset groups. Looking to scan for a recent vulnerability? Need a vulnerability report for your Windows machines only? This is how to do it.