<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ InsightIDR - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Wed, 22 Apr 2026 07:17:24 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/insightidr/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[InsightIDR AI Alert Triage Automatically Classifies Alerts with 99.93% Benign Alert Accuracy]]></title>
      <description><![CDATA[<h3>Rapid7 AI Alert Triage helps SOC analysts quickly and accurately triage thousands of daily alerts, improving efficiency and enabling focus.</h3><p>One universal truth in <a href="/fundamentals/security-operations-center/" target="_self">Security Operations Centers (SOCs)</a> is that analysts are overwhelmed by the high volume of alerts they receive. In a recent <a href="https://www.vectra.ai/resources/2023-state-of-threat-detection">survey</a>, SOC teams reported they are inundated with an average of 4,484 alerts daily, with a staggering 67% being ignored due to alert fatigue and the high volume of false positives. Also reported in the same survey, the number of security alerts they received had “significantly increased” in the last three years. All this can lead to alert fatigue, resulting in missed or ignored alerts and potentially exposing an organization to legitimate threats, impacting SOC performance.</p><h2>Introducing AI Alert Triage for InsightIDR</h2><p>Rapid7's AI Alert Triage –  trained and tested by the Rapid7 global MDR service across trillions of alerts worldwide — will soon be available to users of our next-gen SIEM, InsightIDR, at no additional cost. The AI Alert Triage engine quickly suggests an initial disposition (benign or malicious) for alerts, providing clarity into why that disposition was chosen and supporting information from the investigation.</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb9acfb908fa95a76/6874c7c987996581fcf1f9eb/image1.png" alt="image1.png" caption="The new AI Suggested Disposition field shows the alert classification, along with detailed information to assist the SOC analyst." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb9acfb908fa95a76/6874c7c987996581fcf1f9eb/image1.png" data-sys-asset-uid="bltb9acfb908fa95a76" data-sys-asset-filename="image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="The new AI Suggested Disposition field shows the alert classification, along with detailed information to assist the SOC analyst." data-sys-asset-alt="image1.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">The new AI Suggested Disposition field shows the alert classification, along with detailed information to assist the SOC analyst.</figcaption></div></figure><p></p><p>Without access to the Rapid7 AI Alert Triage capability, SOC teams can waste significant time manually evaluating and correctly classifying malicious alerts, increasing their threat exposure and contributing to SOC inefficiency. With AI Alert Triage, SOC analysts can automatically and accurately focus limited security resources on legitimate threats and improve SOC performance.</p><h2>Built on Decades of AI Expertise in Security</h2><p>Rapid7 is not new to infusing AI with its security applications. Rapid7 is a <a href="/blog/post/2024/06/13/rapid7-infuses-generative-ai-into-the-insightplatform-to-supercharge-secops-and-augment-mdr-services/">pioneer</a> in AI development for security use cases, starting in our earliest days with our VM Expert System in the early 2000s. Since then, Rapid7 has integrated <a href="/fundamentals/generative-ai-cybersecurity/" target="_self">Generative AI</a> into the Command Platform to supercharge SecOps and augment MDR services.</p><p>Our AI-powered platform processes more than 8 trillion alerts weekly for our MDR customer base with a 99.93% benign alert closure rate. This has resulted in hundreds of hours of manual effort saved for the SOC analysts.</p><h2>AI Alert Triage Improves Your SOC’s Effectiveness</h2><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbf1f07cbb294c4a3/6874c7f928ceaf70449ccc1a/image2.png" alt="image2.png" caption="Having thousands of daily alerts automatically and correctly classified is a huge productivity boost for overwhelmed SOC analysts." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbf1f07cbb294c4a3/6874c7f928ceaf70449ccc1a/image2.png" data-sys-asset-uid="bltbf1f07cbb294c4a3" data-sys-asset-filename="image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Having thousands of daily alerts automatically and correctly classified is a huge productivity boost for overwhelmed SOC analysts." data-sys-asset-alt="image2.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Having thousands of daily alerts automatically and correctly classified is a huge productivity boost for overwhelmed SOC analysts.</figcaption></div></figure><p></p><p>SOC analysts being overwhelmed by high volumes of daily alerts is hardly a new phenomenon. However, up until now, SOC analysts have been unable to effectively deal with this massive number of alerts, and organizations have become victims of alert fatigue. The same <a href="https://www.vectra.ai/resources/2023-state-of-threat-detection">survey</a> referenced above reports that analysts spend nearly 3 hours (2.7) each day manually triaging alerts, a figure rising to more than 4 hours a day for 27% of respondents. And, on average, security analysts are unable to deal with over two-thirds (67%) of the daily alerts they receive. What’s more, they say 83% of these alerts are false positives and not worth their time.</p><p>By using AI Alert Triage, Rapid7 customers can leverage decades of proven Rapid7 AI technology to quickly and accurately classify the deluge of alerts and not be forced into a situation where they intentionally ignore alerts. Key capabilities include:</p><ul><li><strong>Rapid identification and prioritization of genuine threats:</strong> AI Alert Triage helps customers quickly distinguish true positives from noise, enabling security teams to prioritize investigations based on validated, high-confidence alerts.</li><li><strong>Enhanced Threat Detection Speed and Accuracy:</strong> Leveraging MDR-validated AI ensures alerts reflect real threats, helping SOC teams respond swiftly and confidently to advanced threats and subtle attack indicators.</li><li><strong>Human oversight of automatic classification: </strong>AI Alert Triage has attained a 99.93% benign alert closure rate with more than 8 trillion weekly alerts; every alert is documented, with full transparency and opportunity for human intervention.</li><li><strong>Reduced Alert Fatigue and False Positives: </strong>With AI Alert Triage validated by MDR analysts, customers experience dramatically reduced false positives, significantly cutting down time wasted on non-critical alerts.</li><li><strong>Streamlined Workflows and Focus:</strong> AI Alert Triage automates repetitive tasks to streamline initial analysis, enabling security teams to jumpstart investigations and dedicate more time and resources to critical initiatives.</li></ul><h2>Transform Your SOC Performance Through Proven AI Assistance</h2><p>Unmatched 99.93% benign alert accuracy and speed in Rapid7’s AI models drive trust and confidence in automatic decision-making and reduce alert fatigue for SOC analysts, improving SOC performance and speed. At Rapid7, we are pioneering the infusion of <a href="/fundamentals/artificial-intelligence/" target="_self">artificial intelligence</a> into the <a href="/platform/" target="_self">Command platform</a>, empowering  SOCs around the globe and dramatically transforming their effectiveness through GenAI.</p><p>To learn more about AI Alert Triage, contact your account team or your Customer Success Advisor.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/29/insightidr-ai-alert-triage-automatically-classifies-alerts-with-99-93-accuracy</link>
      <guid isPermaLink="false">blt0d6d4c3616f5838e</guid>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Chris Wraight]]></dc:creator>
      <pubDate>Tue, 29 Apr 2025 14:40:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt313358125bafc1d2/683de1783d7b5e8f0f136669/gettyimages-2158068190.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[New IDR Log Search Enhancements: Accelerate, Streamline, and Simplify Investigations]]></title>
      <description><![CDATA[<h3>Co-authored by Ed Montgomery & René Fusco, Rapid7</h3><p>In today’s cybersecurity landscape, organizations need robust detection and response solutions to stay ahead of evolving threats. Rapid7’s InsightIDR, the foundation of our <a href="/services/managed-detection-and-response-mdr/">Managed Detection and Response (MDR) service</a>, empowers security teams with advanced analytics, automation, and expert-led investigations. Whether used as a standalone SIEM and XDR platform or in combination with MDR, InsightIDR’s latest Log Search enhancements bring even more value  across the board. These updates accelerate response times, simplify complex queries, and improve the investigation process for both our MDR clients and product-only customers.</p><p>These updates, including Simplified Query Building, Pre-Computed Queries, and Bloom Filters, enhance the speed, accuracy, and accessibility of log search for security teams, ensuring faster, more targeted threat investigations for organizations.</p><p>Let’s explore how these updates elevate the detection and response lifecycle.</p><h2>Simplified Query Building: Empowering Analysts to Act Faster</h2><p>A key element of any detection and response solution is the ability to quickly turn data into actionable insights. Simplified Query Building enables analysts to construct and refine log searches faster, without complex syntax or technical details. This user-friendly interface enables any InsightIDR user, regardless of technical expertise, to create advanced queries through point-and-click prompts, accessing critical data quickly to streamline investigations.</p><p>By lowering the barrier to creating queries, Simplified Query Building provides organizations with timely, data-backed insights into incidents, reducing investigation time for both Rapid7’s MDR team and InsightIDR customers. This update ensures that every security team member, regardless of tenure, can access and leverage the power of InsightIDR’s log data without becoming bogged down by technical complexities.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt611ebcfe1acd2f57/683dde652cfe325157dc159e/Screenshot-2024-11-14-at-3.24.12-PM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-11-14-at-3.24.12-PM.png" asset-alt="Screenshot-2024-11-14-at-3.24.12-PM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt611ebcfe1acd2f57/683dde652cfe325157dc159e/Screenshot-2024-11-14-at-3.24.12-PM.png" data-sys-asset-uid="blt611ebcfe1acd2f57" data-sys-asset-filename="Screenshot-2024-11-14-at-3.24.12-PM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-11-14-at-3.24.12-PM.png" sys-style-type="display"/></figure><h2>Pre-Computed Queries: Reducing Time-to-Response for All Investigations</h2><p>Time is critical when it comes to threat response.With Pre-Computed Queries (PCQs), both MDR and product-only customers benefit from reduced log search times. PCQs enable predictably fast, near-instant access to insights by pre-calculating query results in real-time as data arrives, enhancing responsiveness for all InsightIDR users.</p><p><strong>Customer Feedback</strong></p><blockquote><em>"As an MSSP, InsightIDR's ability to handle large amounts of data is key for identifying threats in our client environments. Pre-Computed Queries have reduced return times for complex searches by over 70%, allowing us to create more impactful insights for our clients."</em></blockquote><blockquote>— Mat Cornish, Technical Director, Longwall Security</blockquote><p>While InsightIDR already supports saving queries for reuse, PCQs take it further by pre-computing results, helping analysts to instantly identify patterns or gather evidence. Additionally, the Log Search home tab organizes queries by “Recent,” “Saved,” and “Pre-computed,” enabling users to quickly find what they need for streamlined incident handling. Whether you’re a customer conducting an in-house investigation or part of Rapid7’s MDR team, PCQs ensure faster insights and more efficient incident response.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6e1f8e45439f3604/683dde8d65b8ea5eb2cc8bdb/Screenshot-2024-11-14-at-3.27.27-PM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-11-14-at-3.27.27-PM.png" asset-alt="Screenshot-2024-11-14-at-3.27.27-PM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6e1f8e45439f3604/683dde8d65b8ea5eb2cc8bdb/Screenshot-2024-11-14-at-3.27.27-PM.png" data-sys-asset-uid="blt6e1f8e45439f3604" data-sys-asset-filename="Screenshot-2024-11-14-at-3.27.27-PM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-11-14-at-3.27.27-PM.png" sys-style-type="display"/></figure><h2>Bloom Filters: Accelerating Key Value Pair Searches for Precise Threat Hunts</h2><p>Not all queries can be pre-calculated in advance. Security teams are frequently asked questions about potential exposure to specific <a href="/fundamentals/indicators-of-compromise-iocs/">indicators of compromise (IoCs)</a>, such as flagged IP addresses or hash values. With Bloom Filters, both MDR and product-only customers gain a performance boost in search time for precise threat hunts by reducing unnecessary data processing.</p><p>For exact match searches, like identifying a compromised IP address or hunting for a suspicious hash value <em>where(hash.sha="...")</em>, Bloom Filters optimize search time by ruling out irrelevant data - enabling the algorithm to skip logs that would not have matches. This enhancement is implemented on the backend and occurs automatically for any search that contains an exact match key-value pair. Reducing the search space means accelerating analysts’ ability to hone in on the exact information they need, cutting down investigation time dramatically.</p><p>A recent research effort into InsightIDR’s new indexing approach, which leverages Bloom Filters, showed impressive results with:</p><ul><li>Improved Efficiency: Approximately 40-60% of all searches have experienced noticeable speed improvements since deployment.</li><li>Increased Precision: The new index has enabled applicable queries to skip irrelevant data three to four times more effectively, leading to shorter search durations for even more efficient investigations.</li></ul><h2>Bringing It All Together: Faster, More Effective Detection and Response</h2><p>Whether you’re a Rapid7 MDR customer or an InsightIDR product-only user, these Log Search updates significantly enhance detection and response capabilities. By reducing search times, simplifying complex queries, and pinpointing threats with greater accuracy, we provide every InsightIDR user with faster, more effective security outcomes.</p><p>This means:</p><ul><li>Faster Detection: Pre-Computed Queries and Bloom Filters accelerate search processes, enabling quicker response to incidents across both MDR and product-only use cases.</li><li>Improved Visibility: Simplified Query Building ensures analysts can quickly refine searches and access the data needed for comprehensive investigations.</li><li>Targeted Threat Hunts: Optimized key-value pair searches focus on the most relevant data, delivering quicker results for security teams.</li></ul><p>Want to see these improvements in action? <a href="/contact/">Contact us </a>today to learn how Rapid7’s MDR service can protect your organization. You can also <a href="/products/insightidr/try/">try InsightIDR for free</a> with a 30-day trial.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/11/15/new-idr-log-search-enhancements-accelerate-streamline-and-simplify-investigations</link>
      <guid isPermaLink="false">blt04c62e89ea861e44</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[Managed Detection and Response (MDR)]]></category>
      <category><![CDATA[SIEM]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Fri, 15 Nov 2024 14:30:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt385c4f4058f069b7/683ddec8bc38b1d7de477c59/GettyImages-1479352738.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in Rapid7 Products & Services: Q3 2024 in Review]]></title>
      <description><![CDATA[<p>This was one of the most exciting quarters at Rapid7 as we announced the next chapter in our mission to give customers command of their attack surface: the <a href="/platform/">Rapid7 Command Platform</a>, our unified threat exposure and detection and response platform. With this, we introduced two exciting new products:</p><ul><li><strong>Surface Command</strong>: Unifies asset inventory and attack surface management</li><li><strong>Exposure Command</strong>: Brings together the comprehensive visibility of Surface Command with hybrid vulnerability management for true end-to-end risk management <br/></li></ul><p>While building on our legacy as a pioneer in vulnerability management, we’ve also made expansions on the detection and response side of the house – expanding our Managed Detection and Response capabilities with the release of MDR for the Extended Ecosystem. Read on for more details on these exciting launches across Rapid7 products and services.</p><h2>Achieve complete attack surface visibility and proactively eliminate exposures from endpoint to cloud</h2><p>As digital infrastructure continues to evolve from traditional on-prem models to hybrid, distributed teams and systems, one thing remains the same – the attack surface continues to grow, creating more risk and a wider visibility gap. </p><p>With the August launches of both Surface Command and Exposure Command, Rapid7 is closing the visibility gap and providing your team with the tools to visualize, prioritize, and remediate risk from endpoint to cloud.</p><h3>Surface Command: Comprehensive visibility you can trust</h3><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8ba80dc0a7a99ca9/683de230e3c8aa2e06830e09/Screenshot-2024-09-30-at-10.52.28-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-30-at-10.52.28-AM.png" asset-alt="Screenshot-2024-09-30-at-10.52.28-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8ba80dc0a7a99ca9/683de230e3c8aa2e06830e09/Screenshot-2024-09-30-at-10.52.28-AM.png" data-sys-asset-uid="blt8ba80dc0a7a99ca9" data-sys-asset-filename="Screenshot-2024-09-30-at-10.52.28-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-30-at-10.52.28-AM.png" sys-style-type="display"/></figure><p><strong>Surface Command </strong>provides the foundational attack surface visibility that underpins the Command Platform by breaking down security data silos and combining comprehensive external attack surface monitoring with internal asset visibility across hybrid environments. The result? A dynamic 360-degree view of your entire attack surface in one place. With this view, you can:<br/></p><ul><li><strong>Visualize</strong> <strong>your entire digital estate</strong> from endpoint to cloud</li><li><strong>Prioritize and mitigate exposures and potential threats </strong>with a risk-aware and adversary-driven view of your entire attack surface</li><li><strong>Identify and address </strong><strong>misconfigurations, shadow IT, and compliance issues</strong></li></ul><p><a href="/products/command/attack-surface-management-asm/">Learn more</a> about Surface Command.</p><h3>Exposure Command: Pinpoint and extinguish critical risks from endpoint to cloud</h3><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltca1fb88ba8e0a9fa/683de25630073e3c99eb18e6/Screenshot-2024-09-30-at-10.55.31-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-30-at-10.55.31-AM.png" asset-alt="Screenshot-2024-09-30-at-10.55.31-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltca1fb88ba8e0a9fa/683de25630073e3c99eb18e6/Screenshot-2024-09-30-at-10.55.31-AM.png" data-sys-asset-uid="bltca1fb88ba8e0a9fa" data-sys-asset-filename="Screenshot-2024-09-30-at-10.55.31-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-30-at-10.55.31-AM.png" sys-style-type="display"/></figure><p><strong>Exposure Command </strong>extends the power of Surface Command by combining complete attack surface visibility with high-fidelity risk context and insight into your organization’s security posture. Exposure Command aggregates findings from both Rapid7’s native exposure detection capabilities as well as third-party exposure and enrichment sources you’ve already got in place, so you are able to:<br/></p><ul><li><strong>Extend risk coverage to cloud environments </strong>with real-time agentless assessment</li><li><strong>Zero-in on exposures and vulnerabilities </strong>with the threat-aware risk context</li><li><strong>Continuously assess your attack surface, </strong><strong>validate exposures, and receive actionable remediation guidance</strong></li><li><strong>Efficiently operationalize your exposure management program </strong><strong>and automate enforcement of security and compliance policies with native, no-code automation</strong></li></ul><p><a href="/products/command/exposure-management/">Learn more</a> about Exposure Command.</p><h3>Continuous red teaming at your (managed) service with Vector Command</h3><p>Attackers are relentlessly looking for weak spots and new access points into your organization – you should be too. Leverage Vector Command – our latest continuous red teaming service – to proactively test your external attack surface with ongoing red team exercises and expert guidance from Rapid7’s team of managed services experts.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt585363ae8ffbce79/683de27caaf620dd3a79df23/Screenshot-2024-09-30-at-10.56.29-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-30-at-10.56.29-AM.png" asset-alt="Screenshot-2024-09-30-at-10.56.29-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt585363ae8ffbce79/683de27caaf620dd3a79df23/Screenshot-2024-09-30-at-10.56.29-AM.png" data-sys-asset-uid="blt585363ae8ffbce79" data-sys-asset-filename="Screenshot-2024-09-30-at-10.56.29-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-30-at-10.56.29-AM.png" sys-style-type="display"/></figure><p>With Vector Command, your team will experience:</p><ul><li><strong>Increased visibility of the external attack surface</strong> with persistent, proactive reconnaissance of both known and unknown internet-facing assets</li><li><strong>Improved prioritization </strong>with ongoing, expert-led red team operations to continuously validate your most critical external exposures</li><li><strong>Same-day reporting of successful exploits with expert-vetted attack paths</strong> for multi-vector attack chains and a curated list of “attractive assets” that are likely to be exploited</li><li><strong>Monthly expert consultation</strong> to confidently drive remediation efforts and resiliency planning</li></ul><p><a href="/services/continuous-red-team-service/">Learn more</a> about Vector Command.</p><h3>Improved scale, reliability and contextualized reporting for cloud and on-prem vulnerability management</h3><p>The increased scale, rate of change, and complexity associated with cloud and on-prem environments makes managing vulnerabilities a challenge. This quarter we continued to advance our agentless vulnerability assessment capabilities to drive improved scalability and extended reporting to allow teams to quickly identify, prioritize, and remediate vulnerabilities at scale. This includes:</p><ul><li><strong>In-cloud assessment for Azure hosts</strong> drive improved cost efficiency for running vulnerability assessments at scale across all cloud hosts running on Microsoft Azure.</li><li><strong>Unified cloud vulnerability reporting</strong> combines context and insights across discovered CVEs, software and resources with proof data included by default to enable more effective and accelerated vulnerability remediation.</li><li><strong>Increased granularity for cloud vulnerability first found dates</strong> enables teams to quickly understand where an organization is exposed to a given CVE both at an organizational level across their environment globally or on a per-resource basis.<strong>Accurately report on MTTR with first found date enhancement for on-prem vulnerabilities</strong> with the addition of “First Found” and “Reintroduced” columns, providing deeper visibility into when a vulnerability was first discovered and if it was later reintroduced after patching.</li></ul><h3>Comprehensive content coverage for policies and critical systems</h3><p>We strive to provide you with fast and broad coverage for critical policies and systems so you can accurately assess the environment for vulnerability and compliance risks. This past quarter we added a number of new policy coverages and enhancements to InsightVM and Nexpose, including:</p><ul><li><strong>Arista EOS coverage:</strong> Arista is a popular alternative to Cisco, and this expansion provides you with broader coverage of your boundary devices and better insights into critical assets.</li><li><strong>Released policy coverage</strong> for DISA STIG Windows Server 2016 and Windows Server 2019; DISA STIG for Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 9; and CIS Benchmark for Fortinet Fortigate to ensure continued compliance.</li><li><strong>Enhanced existing coverages for critical systems </strong>like Alpine Linux, Oracle Linux, Windows Server 2022, and Debian Linux.</li></ul><h2>Pinpoint critical signals and act confidently against threats with cloud-ready detection and response</h2><h3>Introducing MDR for the Extended Ecosystem</h3><p>In an ever-expanding cybersecurity landscape, organizations are under more pressure than ever to keep pace with the widening attack surface. That’s why we’re so excited to bring extended support and coverage capabilities to our MDR customers with the launch of Rapid7 MDR for the Extended Ecosystem. With this addition, we’re extending our service to include triage, investigation, and response to alerts from third-party tools already in use within customer organizations.</p><p>This initial release will bring support for major EPPs such as Microsoft Defender for Endpoint, CrowdStrike Falcon, and SentinelOne, with plans to extend coverage to more third-party tools across cloud, identity, and network in the coming months. </p><p>Read this <a href="/blog/post/2024/09/23/expanding-the-security-horizon-introducing-rapid7-mdr-for-the-extended-ecosystem/">recent blog entry</a> to learn how this extension of MDR sets Rapid7 apart and brings your team coverage, protection, and peace of mind.</p><h3>Rapid7 named a Leader in IDC MarketScape: Worldwide SIEM for SMB and Enterprise</h3><p>We’re excited to share we’ve been recognized as a Leader in the IDC MarketScape: Worldwide SIEM for SMB 2024 Vendor Assessment (doc #US52038824, September 2024) and the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment (doc #US51541324, September 2024). We’re proud that IDC highlights InsightIDR’s superior threat detection content, ease of implementation, and tangible ROI – all areas where we continually invest to provide users with a streamlined, complex-free experience.</p><p>To our customers: Thank you. Your partnership, feedback, and trust fuels our dedication to delivering the detection and response functionalities you need to take command of your attack surface and keep your organization safe. Read more about the reports <a href="/blog/post/2024/09/10/rapid7-named-a-leader-in-idc-marketscape-worldwide-siem-for-smb/">here</a>.</p><h3>Intuitive log search enhancements to empower practitioners of all levels</h3><p>Collecting, analyzing, and correlating logs from various sources is table stakes in identifying potential threats, detecting malicious behaviors, and responding to incidents effectively. Within InsightIDR we continue to enhance our Log Search functionality to empower you to go beyond simply correlating logs so you can feel confident securing your organization and enhancing your security posture.</p><p>Reformatted Log Search not only optimizes view and streamlines accessibility, but it reduces friction with notable enhancements:</p><ul><li><strong>Pre-computed queries</strong> auto-run in less than half a second and can be leveraged from our OOTB library of queries or built custom using “groupby” or “calculate” commands.</li><li><strong>Automatic key suggestions</strong> are provided to analysts during query building based on the log selection to ensure faster time to investigate (as opposed to recalling and populating individually).</li><li>Using the <strong>select clause</strong>, you can leverage new key suggestions to choose those to include in your search results. You can also customize their names and order.</li></ul><h2>The latest research and intelligence from Rapid7 Labs</h2><h3>Ransomware Radar Report: Findings and insights into the booming ransomware space</h3><p>According to Rapid7 Labs Ransomware Radar Report, ransomware continues to evolve at a rapid pace. With the first half of 2024 seeing a +67% increase in the average number of ransomware groups actively posting to leak sites each month, it doesn’t appear that things are slowing down.<br/><a href="/research/report/ransomware-radar-report/">The report</a> offers analysis and insights to help security practitioners understand and anticipate the latest developments around ransomware attacks. This research is based on data from Rapid7’s Incident Response and Rapid7 Labs teams as well as thousands of publicly reported ransomware incidents observed from January of 2023 through June of 2024.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt582cd18dcdd5fe86/683de29f4b2b7f5178e161ee/Screenshot-2024-09-30-at-11.50.34-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-30-at-11.50.34-AM.png" asset-alt="Screenshot-2024-09-30-at-11.50.34-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt582cd18dcdd5fe86/683de29f4b2b7f5178e161ee/Screenshot-2024-09-30-at-11.50.34-AM.png" data-sys-asset-uid="blt582cd18dcdd5fe86" data-sys-asset-filename="Screenshot-2024-09-30-at-11.50.34-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-30-at-11.50.34-AM.png" sys-style-type="display"/></figure><p>Read the <a href="/research/report/ransomware-radar-report/">Ransomware Radar Report</a> now to learn the key takeaways for keeping your organization safe from ransomware.</p><h2>Emergent Threat Response: Real-time guidance for critical threats</h2><p>Rapid7’s Emergent Threat Response (ETR) program from <a href="/research/">Rapid7 Labs</a> delivers fast, expert analysis and first-rate security content for the highest-priority security threats to help both Rapid7 customers and the greater security community understand their exposure and act quickly to defend their networks against rising threats.</p><p>In Q3, Rapid7’s Emergent Threat Response team provided expert analysis, InsightIDR and InsightVM content, and mitigation guidance for multiple critical, actively exploited vulnerabilities and widespread attacks:</p><ul><li>July 29: <a href="/blog/post/2024/07/30/vmware-esxi-cve-2024-37085-targeted-in-ransomware-campaigns/">VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns</a></li><li>September 5: Rapid7 discovered and worked with the vendor to disclose <a href="/blog/post/2024/09/05/cve-2024-45195-apache-ofbiz-unauthenticated-remote-code-execution-fixed/">CVE-2024-45195, a remote code execution vulnerability in Apache OFBiz</a></li><li>September 9:</li><li><a href="/blog/post/2024/09/09/etr-multiple-vulnerabilities-in-veeam-backup-and-replication/">Multiple Vulnerabilities in Veeam Backup & Replication</a></li><li><a href="/blog/post/2024/09/09/etr-cve-2024-40766-critical-improper-access-control-vulnerability-affecting-sonicwall-devices/">CVE-2024-40766: Critical Improper Access Control Vulnerability Affecting SonicWall Devices</a></li><li>September 19: <a href="/blog/post/2024/09/19/etr-high-risk-vulnerabilities-in-common-enterprise-technologies/">High-risk vulnerabilities in common enterprise technologies</a>, including Adobe ColdFusion CVE-2024-41874, Broadcom VMware vCenter Server CVEs (CVE-2024-38812, CVE-2024-38813), and Ivanti Endpoint Manager CVE-2024-29847</li><li>September 26: <a href="/blog/post/2024/09/26/etr-multiple-vulnerabilities-in-common-unix-printing-system-cups/">Multiple Vulnerabilities in Common Unix Printing System (CUPS)</a></li></ul><p>Follow along <a href="/blog/tag/emergent-threat-response/" target="_self">here</a> to receive the latest emergent threat guidance from our team.</p><h2>Stay tuned for more!</h2><p>As always, we’re continuing to work on exciting product enhancements and releases throughout the year. Keep an eye on our <a href="/blog/">blog</a> and <a href="https://help.rapid7.com/insightidr/release-notes/">release notes</a> as we continue to highlight the latest in product and service investments at Rapid7.</p><div><h4><a href="/products/command/attack-surface-management-asm/trial/" target="_self"><strong>Try Rapid7's Surface Command  </strong></a> ▶︎</h4><p>Access this hands-on, read-only experience of Surface Command to see how your team can accelerate high-risk asset identification, prioritization, and remediation.</p></div>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/10/01/whats-new-in-rapid7-products-services-q3-2024-in-review</link>
      <guid isPermaLink="false">blt7ec536e0edd95253</guid>
      <category><![CDATA[Product Updates]]></category>
      <category><![CDATA[Exposure Command]]></category>
      <category><![CDATA[Surface Command]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Margaret Wei]]></dc:creator>
      <pubDate>Tue, 01 Oct 2024 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt36df9134a8a745c1/683de2cada5c30c5c7a83566/GettyImages-1805661754.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Named a Leader in IDC MarketScape: Worldwide SIEM for SMB and Enterprise]]></title>
      <description><![CDATA[<p>Rapid7 is excited to share we have been recognized as a Leader in the <a href="/info/idc-marketscape-worldwide-siem-smb-2024-vendor-leader/">IDC MarketScape: Worldwide SIEM </a>for SMB 2024 Vendor Assessment (doc #US52038824, September 2024) and the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment (doc #US51541324, September 2024). We want to thank our customers for their partnership, feedback, and trust, all of which continue to guide how we build and innovate toward our mission to deliver command of the attack surface and keep security teams ready for whatever comes next.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf40357adb94e43a4/683de9be5619a13720c6ed08/Screenshot-2024-09-18-at-9.05.17-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-18-at-9.05.17-AM.png" asset-alt="Screenshot-2024-09-18-at-9.05.17-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf40357adb94e43a4/683de9be5619a13720c6ed08/Screenshot-2024-09-18-at-9.05.17-AM.png" data-sys-asset-uid="bltf40357adb94e43a4" data-sys-asset-filename="Screenshot-2024-09-18-at-9.05.17-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-18-at-9.05.17-AM.png" sys-style-type="display"/></figure><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte7596a55006b08f5/683de9d465b8ea7042cc8f7b/Screenshot-2024-09-10-at-8.38.50-AM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-09-10-at-8.38.50-AM.png" asset-alt="Screenshot-2024-09-10-at-8.38.50-AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte7596a55006b08f5/683de9d465b8ea7042cc8f7b/Screenshot-2024-09-10-at-8.38.50-AM.png" data-sys-asset-uid="blte7596a55006b08f5" data-sys-asset-filename="Screenshot-2024-09-10-at-8.38.50-AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-09-10-at-8.38.50-AM.png" sys-style-type="display"/></figure><h2>What sets InsightIDR apart from other SIEMs</h2><p>When we entered this space almost nine years ago, we were driven by customers who were bogged down by the complexity and ineffectiveness of traditional SIEMs. Unfortunately, challenging deployments, constant tuning, unmanageable alerts, and inflated total cost of ownership continue to plague many SIEM users today - making it impossible to maximize utility of these products and challenging team effectiveness.</p><p>InsightIDR is different.</p><p><strong>1. Intuitive deployment and UI to maximize efficiency</strong></p><p>A strong SIEM product can be the nucleus of the SOC - helping to harmonize otherwise disparate data into a clear picture of the attack surface and relevant insights. Unfortunately, many SIEMs are off track from the start due to: <br/></p><ul><li>Complex deployments</li><li>High operational overhead</li><li>Tedious configuration work that consumes team resources <br/></li></ul><p>InsightIDR’s cloud-native, SaaS delivery makes it fast and easy to get started without the burdens of heavy infrastructure management, while ensuring you have the scale to grow with your business when you need it. Easily identify the priority data to ingest and quickly start collecting the right information with:<br/></p><ul><li>Intuitive onboarding wizards</li><li>Flexibility to leverage our native data collection (endpoint agent, network sensor, collectors)</li><li>Ability to connect your extended security ecosystem with vast integrations</li><li>Auto-enrichment of logs with user and asset details via our attribution engine</li><li>Custom log parsers</li><li>In-product guidance <br/></li></ul><p>With 13 months of readily searchable data and flexible search modes that can accommodate your most experienced to your most junior analysts, InsightIDR puts your data to work for you - not the other way around.</p><p><br/><strong>2. Optimized for modern threat detection</strong></p><p>While collecting the right telemetry is a critical piece of unifying the attack surface, too many SIEMs are overly indexed on log aggregation. Lost in logs and making sense of data, teams can lose sight of the thing that matters most: staying ahead of an attack.</p><p>InsightIDR has taken a detections-first approach to SIEM and is proud to deliver a robust library of out-of-the-box detections that customers can trust and use as a starting line to augment their own threat intelligence and detections engineering programs. With coverage across all phases of the MITRE ATT&CK framework, this is the same detections library used in the field by our own Rapid7 MDR SOC experts - ensuring strong signal-to-noise detections and constant curation to keep teams ahead of emergent threats. </p><p>This library marries both AI-charged user and attacker behavioral detections alongside known IOC coverage to ensure you are ready for both evasive, headline-making unknown threats as well as recognized adversary TTPs. Detections are comprehensive across the modern attack surface - from endpoint-to-cloud - and can easily be customized or added onto so customers can feel confident they are covered no matter where threats begin.</p><p><strong>3. Ready to respond across the attack surface</strong></p><p>With a rapidly expanding attack surface, all teams are challenged to ensure they know how to investigate and respond effectively to alerts. It’s harder than ever to understand lateral movement and the full blast radius, so it’s critical to ensure analysts have enough context to take action - and the right playbooks and tools in place to execute when they’re ready to do so. </p><p>InsightIDR is built around making sure analyst teams are ready to respond effectively to threats every time. Highly correlated investigation timelines unify related alerts and events across the security ecosystem to give a cohesive view of an attack and all relevant evidence in one place. </p><p>Integrated access to the Velociraptor DFIR framework enables teams to quickly query fleets of endpoints to assess and understand the blast radius of an attack. And when it’s time to take action, alerts are paired with descriptive guidance and recommendations vetted by our own SOC experts. Fully embedded SOAR capabilities and pre-built playbooks accelerate readiness and time-to-respond. We understand the friction and toll that noisy alerts and complex investigations can take on SOC teams; InsightIDR reduces this burnout and the likelihood of analyst churn by decreasing cycles and friction across investigation workflows - creating happier and more effective teams.</p><p><strong>4. Tangible return on investment</strong></p><p>Probably one of the things that many SIEMs are most notorious for is high and unpredictable costs and resource consumption - with few results to show for it. Traditional ingestion-based models have always been a challenge for security teams - and it’s getting even more difficult as the attack surface becomes increasingly dynamic. </p><p>InsightIDR is available in a number of flexible packages designed around real customer needs and security journeys. Our Threat Complete product marries InsightIDR with our leading vulnerability management to deliver proactive, threat-informed risk management to further reduce noise and strengthen security posture. </p><p>Predictable, asset-based pricing across our packages means no surprise charges to explain to your C-Suite or Board. And executive dashboards help you share insights and show progress to your wider organization to be able to show how you are advancing your threat detection and incident response program.</p><h2>We are proud to be a Leader</h2><p>Thank you to the IDC MarketScape for this recognition. We are proud to be named a Leader in both reports, but we are always most proud of the thousands of customers and partners across the globe who trust Rapid7 at the center of their security program. To learn more, <a href="/info/idc-marketscape-worldwide-siem-smb-2024-vendor-leader/">access a complimentary excerpt of the IDC MarketScape</a> for SMB and Enterprise<strong> </strong>or start exploring <a href="/products/insightidr/">InsightIDR</a>.<br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/09/10/rapid7-named-a-leader-in-idc-marketscape-worldwide-siem-for-smb</link>
      <guid isPermaLink="false">blt6a03dc096d4cfdb9</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[SIEM]]></category><dc:creator><![CDATA[Meaghan Buchanan]]></dc:creator>
      <pubDate>Tue, 10 Sep 2024 13:01:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7a8fde0ee3aabc28/67efc952fcc9c25db24b371a/infographic-news-idc-2024-recognition.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in Rapid7 Products & Services: Q2 2024 in Review]]></title>
      <description><![CDATA[<p>This quarter we continued to make investments that provide security professionals with a holistic, actionable view of their entire attack surface. In Q2, we focused on enhancing visualization, prioritization, and integration capabilities across our key products and services. Below we’ve highlighted key releases and updates from the quarter across Rapid7 products and services—including InsightCloudSec, InsightVM, InsightIDR, Managed Detection and Response, and Rapid7 Labs.</p><h2>Rapid7 acquires Noetic to deliver comprehensive visibility and command of your attack surface</h2><p>Rapid7 has acquired Noetic, a leading provider of continuous cyber asset inventory, visibility, and management. This acquisition further enhances our ability to provide customers with the necessary control to monitor and manage exposures across their entire attack surface - from endpoint to cloud - with confidence. <a href="/products/command/request-demo/">Visit our announcement overview page</a> to learn more and stay tuned for additional details coming this summer.</p><h2>Anticipate imminent threats from endpoint to cloud</h2><h3>Uncover multiple paths to risky compromised resources across cloud environments</h3><p>We continue to enhance <a href="https://docs.rapid7.com/insightcloudsec/attack-paths/">Attack Path Analysis</a> in InsightCloudSec, most recently adding a new visualization that shows all of the various paths to a potentially compromised resource, providing a better understanding of the potential blast radius of an attack. We’ve also added the ability to export Attack Path graphs as a PDF, JPG, PNG, or SVG for easy sharing with additional stakeholders.</p><h3>Automatically prioritize the most at-risk resources based on Layered Context</h3><p>Layered Context provides insight into the riskiest resources running across cloud environments by taking into account a variety of risk signals from vulnerabilities to identity-related risk and public accessibility. This context makes it easier for security teams to effectively and efficiently prioritize cloud risk remediation efforts.</p><p>We recently released the following updates to Layered context:</p><ul><li><strong>Automatic prioritization of riskiest resources</strong> by taking into account the presence of toxic combinations to assign a relative risk score to all cloud resources. </li><li>A new risk tab, located on the Resource Details panel, that <strong>details all the risks impacting a resource in one view, transparently and efficiently</strong> diagnosing what is risky and why.</li></ul><h3>Access agent-based policy assessment results with InsightVM’s Bulk Export API.</h3><p>Agent-based policy assessment is used to conduct configuration assessments of IT assets against widely used industry benchmarks or custom internal policies. Now customers can use the new <a href="https://docs.rapid7.com/insightvm/bulk-export-api/">Bulk Export API</a> to export the policy assessment results data to their business intelligence tools and build custom visualizations and workflows that meet their reporting needs. Additionally, this API allows for efficient request and download of large data sets directly from the Insight Platform, avoiding unnecessary load on the Security Console and giving greater flexibility in handling the high volume of data that policy assessments produce.</p><h3>Insight Agent support for ARM-based Windows 11 devices in InsightVM</h3><p>Take advantage of the ARM processor chip’s great performance and low power requirements while maintaining agent-based visibility and assessment of remote assets within InsightVM. We also released enhanced vulnerability coverage for Windows 11 to provide customers with even higher quality, accurate vulnerability content.</p><h2>Pinpoint critical signals of an attack and act confidently against threats</h2><h3>Rapid7 AI Engine extended to include Generative AI, driving improved MDR efficiency</h3><p>Enhancements to the Rapid7 AI Engine have brought <a href="/blog/post/2024/06/13/rapid7-infuses-generative-ai-into-the-insightplatform-to-supercharge-secops-and-augment-mdr-services/">new Generative AI capabilities</a> to the Rapid7 SOC, improving the efficacy and efficiency of our MDR services. These new additions include:</p><ul><li>The new <strong>SOC Assistant</strong> that guides our internal SOC and MDR analysts through complex investigations and streamlines response workflows by querying sources like the Rapid7 MDR Handbook, keeping our analysts a step ahead.</li><li>The ability to <strong>automatically generate incident reports once investigations are closed out</strong>, streamlining a typically manual and time-intensive process. Every report that is generated by the Rapid7 AI Engine is reviewed and enhanced as needed by our SOC teams, making certain every data point is accurate and actionable.</li></ul><h3>Stop attacks before they begin with Rapid7’s patented Ransomware Prevention</h3><p>Rapid7’s patented, preemptive <a href="/solutions/ransomware-prevention/">Ransomware Prevention</a> technology focuses on disrupting the evasive behaviors that ransomware and other forms of malware leverage, preventing both known and unknown (zero-day) attacks before they start. Coexisting alongside NGAV, EDR, and EPP solutions, Ransomware Prevention:</p><ul><li><strong>Provides an</strong> <strong>additional layer of protection on the endpoint</strong> focused on mitigating the risk associated with ransomware by using proprietary Data Encryption detection and response technology. </li><li><strong>Focuses on the inner techniques </strong>that malicious and evasive attacks employ and embed in processes (instead of passively looking for patterns and analyzing processes and behaviors on runtime or post-execution), manipulating their logic so that they refrain from execution.</li></ul><h3>Monitor Crowdstrike Falcon EDR alerts within InsightIDR for streamlined alert triage</h3><p>Simplify operations and optimize resource allocation by further integrating third party endpoint detection and response solutions with Rapid7. Managed Detection and Response customers can <a href="https://docs.rapid7.com/insightidr/crowdstrike-falcon-event-source/">integrate CrowdStrike Falcon Endpoint with InsightIDR</a> and leverage Rapid7’s highly skilled and experienced MDR SOC to help triage incoming alerts.</p><h3>A growing library of actionable detections in InsightIDR</h3><p>In Q2 2024 we added over 750 new detection rules. See them in-product or visit the <a href="https://docs.rapid7.com/insightidr/detection-library-overview">Detection Library</a> for descriptions and recommendations.</p><h2>The latest in cybersecurity trends and research</h2><h3>New research from Rapid7 Labs: The 2024 Attack Intelligence Report</h3><p>Since 2020, Rapid7 has tracked huge increases in zero-day exploits, ransomware attacks, mass compromise incidents, and evolutions in attacker behavior. In our <a href="/research/report/2024-attack-intelligence-report/?utm_source=marketo&amp;utm_medium=email&amp;utm_content=customer-promo-email&amp;utm_campaign=global-pla-air-report-customer-eng-cyas">2024 Attack Intelligence Report</a>, Rapid7 Labs analyzed 14 months of attacker behavior and marquee vulnerabilities and provides expert analysis and practical guidance for security professionals.</p><p>Dive into key findings—like how 36% of the widely exploited vulnerabilities Rapid7 tracked involved network edge technology—in the report <a href="/research/report/2024-attack-intelligence-report/?utm_source=marketo&amp;utm_medium=email&amp;utm_content=customer-promo-email&amp;utm_campaign=global-pla-air-report-customer-eng-cyas">here</a>.</p><h3>Take Command: Global security leaders, hands-on practitioners, and top researchers weigh in on the latest cybersecurity trends</h3><p>In May we partnered with AWS for our <a href="https://rapid7.brighttalk.com/">Take Command 2024 Cybersecurity Summit</a>, where we took a deep dive into new attack intelligence technologies like AI that are disrupting the threat landscape, macro influences on SOC teams, MDR services to build cyber resilience, and more. The sessions deliver clear guidance to zero in on threats and proactively prevent breaches—check them out on demand <a href="https://rapid7.brighttalk.com/americas/">here</a>.</p><h3>Stay tuned for more!</h3><p>As always, we’re continuing to work on exciting product enhancements and releases throughout the year. Keep an eye on our blog and <a href="https://help.rapid7.com/insightidr/release-notes/">release notes</a> as we continue to highlight the latest in product and service investments at Rapid7.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/07/11/whats-new-in-rapid7-products-services-q2-2024-in-review</link>
      <guid isPermaLink="false">blt35b3c8c5fb4c988e</guid>
      <category><![CDATA[InsightCloudSec]]></category>
      <category><![CDATA[InsightVM]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[Managed Detection and Response (MDR)]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Margaret Wei]]></dc:creator>
      <pubDate>Thu, 11 Jul 2024 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8844ca232e7caa99/683de6ab2cfe32fe35dc17ee/GettyImages-1693759239.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 completes IRAP PROTECTED assessment for Insight Platform solutions]]></title>
      <description><![CDATA[<p>Exciting news from Australia!</p><p>Rapid7 has <a href="/about/press-releases/rapid7-completes-irap-protected-assessment/">successfully completed</a> an Information Security Registered Assessors Program (IRAP) assessment to PROTECTED Level for several of our Insight Platform solutions.</p><h2>What is IRAP?</h2><p>An IRAP assessment is an independent assessment of the implementation, appropriateness, and effectiveness of a system’s security controls. Achieving IRAP PROTECTED status means Australian Government agencies requiring PROTECTED level controls can access our industry-leading, practitioner-first security solutions. Meeting this status further strengthens our position as a trusted partner for Australian government organizations seeking to enhance their cybersecurity posture.</p><p>Rapid7 is one of the only vendors to be IRAP-assessed across what we consider a consolidated cybersecurity operation. This places us in a unique position to supply services across federal, state, and local government in Australia. It provides our government customers with the confidence that we have the right governance and controls in place for our own business in order to deliver that service effectively for our customers, specifically covering:</p><ul><li>Vulnerability management on traditional infrastructure</li><li>Endpoints</li><li>The secure implementation of web applications</li><li>Detection and response to alerts or threats</li><li>The ability to securely automate workflows</li></ul><h2>Why is being IRAP PROTECTED important?</h2><p>Being IRAP-assessed demonstrates our commitment to providing secure and reliable information security services for Government Systems, Cloud Service Providers, Cloud Services, and Information and Communications Technology (ICT) Systems, and more widely to our Australian customers.</p><p>Importantly, it highlights how we take the <a href="/fundamentals/shared-responsibility-model/">shared responsibility model</a> extremely seriously. It also shows we’re protecting our customers’ information and data across their traditional infrastructure and in the cloud.</p><h2>Which solutions are approved?</h2><p>Solutions assessed and approved for PROTECTED Level include InsightIDR (detection and response), InsightVM (vulnerability management), InsightAppSec (application security), and InsightConnect (orchestration and automation). These solutions provide a comprehensive security platform to help government agencies tackle the challenges of today's evolving cybersecurity landscape.</p><p>The successful completion of the IRAP assessment at the PROTECTED level demonstrates our commitment to supporting Australian government customers. It means they have access to a comprehensive security platform necessary to tackle the ever-evolving challenges of today's cybersecurity landscape.</p><p>As more government agencies migrate to hybrid cloud environments, we can help them better manage the growing complexity of identifying and securing the <a href="/fundamentals/attack-surface/">attack surface</a>.</p><p>As attackers become increasingly sophisticated, better armed, and faster, the IRAP assessment is yet another string in our cybersecurity bow, showcasing our potential to support Australian Government agencies and more widely, our customers.</p><div><h4>NEVER MISS AN EMERGING THREAT</h4><p>Be the first to learn about the latest vulnerabilities and cybersecurity news.</p><a href="#">Subscribe Now</a></div>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/07/08/rapid7-completes-irap-protected-assessment-for-insight-platform-solutions</link>
      <guid isPermaLink="false">blt2e2a38527786eb8a</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[InsightAppSec]]></category>
      <category><![CDATA[InsightVM]]></category>
      <category><![CDATA[InsightConnect]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Mon, 08 Jul 2024 20:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1df4c8940e2baa63/683de77d3e68ee590a889bad/GettyImages-1448456737.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in Rapid7 Products & Services: Q1 2024 in Review]]></title>
      <description><![CDATA[<p>We kicked off 2024 with a continued focus on bringing security professionals (which if you're reading this blog, is likely you!) the tools and functionality needed to anticipate risks, pinpoint threats, and respond faster with confidence. Below we’ve highlighted some key releases and updates from this past quarter across Rapid7 products and services—including InsightCloudSec, InsightVM, InsightIDR, Rapid7 Labs, and our managed services.</p><h2>Anticipate Imminent Threats Across Your Environment</h2><h3>Monitor, remediate, and takedown threats with Managed Digital Risk Protection (DRP)</h3><p>Rapid7’s new <a href="/solutions/managed-digital-risk-protection-services/">Managed Digital Risk Protection (DRP)</a> service provides expert monitoring and remediation of external threats across the clear, deep, and dark web to prevent attacks earlier.</p><p>Now available in our highest tier of Managed Threat Complete and as an add on for all other Managed D&R customers, Managed DRP extends your team with Rapid7 security experts to:</p><ul><li>Identify the first signs of a cyber threat to prevent a breach</li><li>Rapidly remediate and takedown threats to minimize exposure</li><li>Protect against ransomware data leakage, phishing, credential leakage, data leakage, and provide dark web monitoring</li></ul><p>Read more about the benefits of Managed DRP in our blog <a href="/blog/post/2024/02/06/four-key-benefits-of-rapid7s-new-managed-digital-risk-protection-service/">here</a>.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0773507ebde07cca/683deac018a553913968738a/Screenshot-2024-04-01-at-1.34.51-PM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2024-04-01-at-1.34.51-PM.png" asset-alt="Screenshot-2024-04-01-at-1.34.51-PM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0773507ebde07cca/683deac018a553913968738a/Screenshot-2024-04-01-at-1.34.51-PM.png" data-sys-asset-uid="blt0773507ebde07cca" data-sys-asset-filename="Screenshot-2024-04-01-at-1.34.51-PM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2024-04-01-at-1.34.51-PM.png" sys-style-type="display"/></figure><h3>Ensure safe AI development in the cloud with Rapid7 AI/ML Security Best Practices</h3><p>We’ve recently expanded InsightCloudSec’s support for GenAI development and training services (including AWS Bedrock, Azure OpenAI Service and GCP Vertex) to provide more coverage so teams can effectively identify, assess, and quickly act to resolve risks related to AI/ML development.</p><p>This expanded generative AI coverage enriches our proprietary compliance pack, <em>Rapid7 AI/ML Security Best Practices</em>, which continuously assesses your environment through event-driven harvesting to ensure your team is safely developing with AI in a manner that won’t leave you exposed to common risks like data leakage, model poisoning, and more.</p><p>As with all critical resources connected to your InsightCloudSec environment, these risks are enriched with <a href="https://docs.rapid7.com/insightcloudsec/layered-context/">Layered Context</a> to automatically prioritize AI/ML risk based on exploitability and potential impact. They’re also continuously monitored for effective permissions and actual usage to rightsize permissions to ensure alignment with LPA. In addition to this extensive visibility, InsightCloudSec offers native automation to alert on and even remediate risk across your environment without the need for human intervention.</p><h3>Stay ahead of emerging threats with insights and guidance from Rapid7 Labs</h3><p>In the first quarter of this year, Rapid7 initiated the Emergent Threat Response (ETR) process for 12 different threats, including (but not limited to):</p><ul><li>Zero-day exploitation of <a href="/blog/post/2024/01/11/etr-zero-day-exploitation-of-ivanti-connect-secure-and-policy-secure-gateways/">Ivanti Connect Secure and Ivanti Pulse Secure</a> gateways, the former of which has historically been targeted by both financially motivated and state-sponsored threat actors in addition to low-skilled attackers.</li><li>Critical CVEs affecting outdated versions of <a href="/blog/post/2024/01/19/etr-critical-cves-in-outdated-versions-of-atlassian-confluence-and-vmware-vcenter-server/">Atlassian Confluence and VMware vCenter Server</a>, both widely deployed products in corporate environments that have been high-value targets for adversaries, including in large-scale ransomware campaigns.</li><li>High-risk authentication bypass and remote code execution vulnerabilities in <a href="/blog/post/2024/02/20/etr-high-risk-vulnerabilities-in-connectwise-screenconnect/">ConnectWise ScreenConnect</a>, widely used software with potential for large-scale ransomware attacks, providing coverage before CVE identifiers were assigned.</li><li>Two authentication bypass vulnerabilities in <a href="/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/">JetBrains TeamCity</a> CI/CD server that were discovered by Rapid7’s research team.</li></ul><p>Rapid7’s ETR program is a cross-team effort to deliver fast, expert analysis alongside first-rate security content for the highest-priority security threats to help you understand any potential exposure and act quickly to defend your network. Keep up with future ETRs on our blog <a href="/blog/tag/emergent-threat-response/">here</a>.</p><h2>Pinpoint Critical and Actionable Insights to Effectively and Confidently Respond</h2><h3>Introducing the newest tier of Managed Threat Complete</h3><p>Since we released Managed Threat Complete last year, organizations all over the globe have unified their vulnerability management programs with their threat detection and response programs. Now, teams have a unified view into the full kill chain and a tailored service to turbocharge their program, mitigate the most pressing risks and eliminate threats.</p><p>Managed Threat Complete Ultimate goes beyond our previously available Managed Threat Complete bundles to include:</p><ul><li><strong>Managed Digital Risk Protection</strong> for monitoring and remediation of threats across the clear, deep, and dark web</li><li><strong>Managed Vulnerability Management</strong> for clarity guidance to remediate the highest priority risk</li><li><strong>Velociraptor, Rapid7’s leading open-source DFIR framework,</strong> from monitoring and hunting to in-depth investigations into potential threats, access the tool that is leveraged by our Incident Response experts on behalf of our managed customers </li><li><strong>Ransomware Prevention </strong>for recognizing threats and stopping attacks before they happen with multi-layered prevention (coming soon - stay tuned)</li></ul><h3>Get to the data you need faster with new Log Search and Investigation features in InsightIDR</h3><p>Our latest enhancements to Log Search and Investigations will help drive efficiency for your team and give you time back in your day-to-day—and when you really need it in the heat of an incident. Faster search times, easier-to-write queries, and intuitive recommendations will help you find event trends within your data and save you time without sacrificing results.</p><ul><li><strong>Triage investigations faster with log data readily accessible from the investigations timeline </strong>- with a click of the new “view log entry” button you’ll instantly see the context and log data behind an associated alert.</li><li><strong>Create precise queries quickly with new automatic suggestions</strong> - as you type in Log Search, the query bar will automatically suggest the elements of LEQL that you can use in your query to get to the data you need—like users, IP addresses, and processes—faster. </li><li><strong>Save time sifting through search results with new LEQL ‘select’ clause - </strong>define exactly what keys to return in the search results so you can quickly answer questions from log data and avoid superfluous information.</li></ul><h3>Easily view vital cloud alert context with Simplified Cloud Threat Alerts</h3><p>This quarter we launched Simplified Cloud Threat Alerts within InsightIDR to make it easier to quickly understand what a cloud alert - like those from AWS GuardDuty - means, which can be a daunting task for even the most experienced analysts due to the scale and complexity of cloud environments.</p><p>With this new feature, you can view details and known issues with the resources (e.g. assets, users, etc.) implicated in the alert and have clarity on the steps that should be taken to appropriately respond to the alert. This will help you:</p><ul><li><strong>Quickly understand what a given cloud resource is</strong>, its intended purpose, what applications it supports and who “owns” it.</li><li><strong>Get a clear picture around what an alert means</strong>, what next steps to take to verify the alert, or how to respond if the alert is in fact malicious.</li><li><strong>Prioritize response efforts</strong> based on potential impact with insight into whether or not the compromised resource is misconfigured, has active vulnerabilities, or has been recently updated in a manner that signals potential pre-attack reconnaissance.</li></ul><h3>A growing library of actionable detections in InsightIDR</h3><p>In Q1 2024 we added 1,349 new detection rules. See them in-product or visit the <a href="https://docs.rapid7.com/insightidr/detection-library-overview">Detection Library</a> for descriptions and recommendations.</p><h3>Stay tuned!</h3><p>As always, we’re continuing to work on exciting product enhancements and releases throughout the year. Keep an eye on our blog and <a href="https://help.rapid7.com/insightidr/release-notes/">release notes</a> as we continue to highlight the latest in product and service investments at Rapid7.</p><p><br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2024/04/04/whats-new-in-rapid7-products-services-q1-2024-in-review</link>
      <guid isPermaLink="false">blt7c516f8639dff22c</guid>
      <category><![CDATA[Managed Detection and Response (MDR)]]></category>
      <category><![CDATA[InsightCloudSec]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Margaret Wei]]></dc:creator>
      <pubDate>Thu, 04 Apr 2024 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcc56603b8687b9d7/683deac8aaf620078079e178/GettyImages-1394646005.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in Rapid7 Detection & Response: Q3 2023 in Review]]></title>
      <description><![CDATA[<p>This post takes a look at some of the investments we've made throughout Q3 2023 to our Detection and Response offerings to provide advanced DFIR capabilities with Velociraptor, more flexibility with custom detection rules, enhancements to our dashboard and log search features, and more. </p><h3>Stop attacks before they happen with Next-Gen Antivirus in Managed Threat Complete</h3><p>As endpoint attacks become more elusive and frequent, we know security teams need reliable coverage to keep their organizations safe. To provide teams with protection from both known and unknown threats, we’ve released multilayered prevention with Next-Gen Antivirus in Managed Threat Complete. Available through the Insight Agent, you’ll get immediate coverage with no additional configurations or deployments. With Managed Next-Gen Antivirus you’ll be able to:</p><ul><li>Block known and unknown threats early in the kill chain</li><li>Halt malware that’s built to bypass existing security controls</li><li>Maximize your security stack and ROI with existing Insight Agent</li><li>Leverage the expertise of our MDR team to triage and investigate these alerts<br/></li></ul><p>To see more on our Managed Next-Gen Antivirus offering, including a demo walkthrough, visit our <a href="/info/mtc/endpoint-protection/">Endpoint Hub Page here</a>.</p><h3>Achieve faster DFIR outcomes with Velociraptor now integrated into the Insight Platform</h3><p>As security teams are facing more and more persistent threats on their endpoints, it’s crucial to have proactive security measures that can identify attacks early in the kill chain, and the ability to access detailed evidence to drive complete remediation. We’re excited to announce that <a href="/products/insightidr/packages/">InsightIDR Ultimate customers</a> can now recognize the value of <a href="/products/velociraptor/">Velociraptor</a>, Rapid7’s open-source DFIR framework, faster than ever with its new integration into the Insight Platform.<br/></p><p>With no additional deployment or configurations required, InsightIDR customers can deploy Velociraptor through their existing Insight Agents for daily threat monitoring and hunting, swift threat response, and expanded threat detection capabilities. <a href="/blog/post/2023/09/29/unlock-broader-detections-forensics-with-velociraptor-in-rapid7-xdr/">For more details, check out our recent blog post here</a>.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte881ea905b4203e7/683de636cc6042ee50206972/Screenshot-2023-11-30-at-7.22.11-PM.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2023-11-30-at-7.22.11-PM.png" asset-alt="Screenshot-2023-11-30-at-7.22.11-PM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte881ea905b4203e7/683de636cc6042ee50206972/Screenshot-2023-11-30-at-7.22.11-PM.png" data-sys-asset-uid="blte881ea905b4203e7" data-sys-asset-filename="Screenshot-2023-11-30-at-7.22.11-PM.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2023-11-30-at-7.22.11-PM.png" sys-style-type="display"/></figure><p><em>A view of Velociraptor in InsightIDR</em></p><h3>Tailor alerts to your unique needs with Custom Detection Rules</h3><p>We know every organization has unique needs when it comes to detections and alerting on threats. While InsightIDR provides over 3,000 out-of-the-box detection rules to detect malicious behaviors, we've added additional capabilities with Custom Detection Rules to offer teams the ability to author rules tailored to their own individual needs. With Custom Detection Rules, you will be able to:</p><ul><li>Build upon Rapid7’s library of expertly curated detection rules by creating rules that uniquely fit your organization’s security needs</li><li>Use LEQL to write rule logic against a variety of data sources</li><li>Add grouping and threshold conditions to refine your rule logic over specific periods of time to decrease unnecessary noise</li><li>Assess the rules activity before it starts to trigger alerts for downstream teams</li><li>Group alerts by specific keys such as by user or by asset within investigations to reduce triage time</li><li>Create exceptions and view modification history as you would with out-of-the-box ABA detection rules</li><li><a href="https://docs.rapid7.com/insightidr/get-started-with-aba-automation">Attach InsightConnect automation workflows</a> to your custom rules to mitigate manual tasks such as containing assets and enriching data, or set up notifications when detections occur</li></ul><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9533ba08e565ab90/683de656237ea6185691c400/Screenshot-2023-11-30-at-7.24.33-PM-1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot-2023-11-30-at-7.24.33-PM-1.png" asset-alt="Screenshot-2023-11-30-at-7.24.33-PM-1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9533ba08e565ab90/683de656237ea6185691c400/Screenshot-2023-11-30-at-7.24.33-PM-1.png" data-sys-asset-uid="blt9533ba08e565ab90" data-sys-asset-filename="Screenshot-2023-11-30-at-7.24.33-PM-1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot-2023-11-30-at-7.24.33-PM-1.png" sys-style-type="display"/></figure><p><em>Creating a Custom Detection Rule in InsightIDR</em></p><h3>Enhanced Attacker Behavior Analytics (ABA) alert details in Investigations</h3><p>Easily view information about your ABA alerts that are a part of an investigation with our updated Evidence panel. With these updates, you’ll see more information on alerts, including their source event data and detection rule logic that generated them. Additionally, the Evidence button has also been renamed to Alert Details to more accurately reflect its function.</p><p>New alert details include:</p><ul><li>A brief description of the alert and a recommendation for triage</li><li>The detection rule logic that generated the alert and the corresponding key-value payload from your environment</li><li>The process tree, which displays details about the process that occurred when the alert was generated and the processes that occurred before and after <em>(only for MDR customers</em>)</li></ul><iframe title="Alert Evidence Panel in InsightIDR" src="//play.vidyard.com/znvYcow6HQKKMtwjk3R9nf.html?" width="640" height="360" scrolling="no" frameborder="0" allowtransparency="true" style="width: 640; height: 360;"></iframe><p></p><h3>Dashboard Improvements: Revamped card builder and a new heat map visualization</h3><p>Our recently released <strong>revamped card builder </strong>provides more functionality to make it faster and easier to build dashboard cards. For a look at what’s new, check out the demo below.</p><iframe title="Revamped Card Builder in InsightIDR" src="//play.vidyard.com/w88ETCFsmKkoDdM34n9uVN.html?" width="640" height="360" scrolling="no" frameborder="0" allowtransparency="true" style="width: 640; height: 360;"></iframe><p></p><p>The new <strong>calendar heat map visualization </strong>allows you to more easily visualize trends in your data over time so you can quickly spot trends and anomalies. To see this new visualization in action, check out the demo below.</p><iframe title="Heat Map in InsightIDR Dashboards" src="//play.vidyard.com/28s4MvuL3umofYdSjXzcQj.html?" width="640" height="360" scrolling="no" frameborder="0" allowtransparency="true" style="width: 640; height: 360;"></iframe><p></p><h3>Export data locally with new Log Search option</h3><p>You now have more flexibility when it comes to exporting your log search data, making it easier to gather evidence related to incidents for additional searching, sharing with others in your organization, or gathering evidence associated with incidents.</p><p>With this update you can now:</p><ul><li>Use edit key selection to define what columns to export to csv</li><li>Export results from a grouby/calculate query to a csv file<br/></li></ul><iframe title="Local Data Export in InsightIDR Log Search" src="//play.vidyard.com/d2bGXPjrvMRsDwLxCC8KYZ.html?" width="640" height="360" scrolling="no" frameborder="0" allowtransparency="true" style="width: 640; height: 360;"></iframe><p></p><h3>New event sources</h3><ul><li><strong>Microsoft Internet Information Services (IIS):</strong> A web server that is used to exchange web content with internet users. <a href="https://docs.rapid7.com/insightidr/microsoft-iis/">Read the documentation</a></li><li><strong>Amazon Security Lake:</strong> A security data lake service that allows customers to aggregate & manage security-related logs. <a href="https://docs.rapid7.com/insightidr/amazon-security-lake/">Read the documentation</a></li><li><strong>Salesforce Threat Detection: </strong>Uses machine learning to detect threats within a Salesforce organization. <a href="https://docs.rapid7.com/insightidr/salesforce-threat-detection/">Read the documentation</a></li></ul><h3>A growing library of actionable detections</h3><p>In Q3 2023 we added 530 new ABA detection rules. See them in-product or visit the <a href="https://docs.rapid7.com/insightidr/detection-library-overview">Detection Library</a> for actionable descriptions and recommendations.</p><h3>Stay tuned!</h3><p>As always, we’re continuing to work on exciting product enhancements and releases throughout the year. Keep an eye on our blog and <a href="https://help.rapid7.com/insightidr/release-notes/">release notes</a> as we continue to highlight the latest in detection and response at Rapid7.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/10/05/whats-new-in-rapid7-detection-response-q3-2023-in-review</link>
      <guid isPermaLink="false">bltc853c95024ba4c3e</guid>
      <category><![CDATA[Detection and Response]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[DFIR]]></category>
      <category><![CDATA[Velociraptor]]></category><dc:creator><![CDATA[Margaret Wei]]></dc:creator>
      <pubDate>Thu, 05 Oct 2023 15:49:48 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt373374bd38878905/683ddf3a3a1c5a5a094ba812/GettyImages-1128503636.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in Rapid7 Detection & Response: Q2 2023 in Review]]></title>
      <description><![CDATA[<p>We are excited to share another quarter of new Detection & Response capabilities and improvements. As we continue to innovate across our platform, we thank our customers for continuous insight, engagement, and direction.</p><p>Keenly focused on our mission to deliver solutions for consolidated, end-to-end security operations and a practitioner-focused experience, Rapid7 recently introduced <a href="/services/managed-detection-and-response-mdr/"><strong>Managed Threat Complete</strong></a> (MTC), which brings together our leading MDR service and industry-leading vulnerability management technology, enabling customers to level up their detection and response programs with complete coverage and a team of Rapid7 experts. </p><p>At the core of MTC is <a href="/products/insightidr/"><strong>InsightIDR</strong></a> (IDR), our cloud-native XDR technology that cuts through the noise and enables practitioners to focus on what matters most. Read on to learn about recent updates to MTC and IDR, including Log Search Open Preview, which is now the default experience for users, and support for AWS AppFabric.</p><h2>New Faster and Streamlined Log Search Experience Is Live!</h2><p>We are always striving to drive greater efficacy, productivity, and efficiency for our customers–and since querying data is such a huge part of security practitioners’ day-to-day, Log Search is always a significant area of focus. We are excited to officially introduce our new Log Search experience, which is now live and available for all InsightIDR and MDR customers.  This new experience delivers a faster and more simplified UI, while also unlocking more paths to build sophisticated queries and dashboards. Highlights include: </p><ul><li><strong>Easily Access Saved Queries</strong>: Identify, capture, edit, and share saved queries via the new Log Search interface. The “home page” gives you single-click access for all search-related activities.</li><li><strong>Refine Detection Rules From Search</strong>: Refine existing or create new detection rules directly from queries.</li><li><strong>Master Visualizations</strong>: Tweak and perfect visualizations before they are added to dashboards.</li></ul><iframe title="Log Search Brief Demo" src="//play.vidyard.com/9KiK513Ah8phC7YZAbAq1n.html?" width="640" height="360" scrolling="no" frameborder="0" allowtransparency="true" style="width: 640; height: 360;"></iframe><h2>Expanded Partnership with Amazon Web Services (AWS) Improves Cloud D&R Efficiency</h2><p>As part of our continued commitment to helping customers secure cloud infrastructure, InsightIDR now supports AWS AppFabric, which quickly connects SaaS applications for streamlined security management using a standard schema. By ingesting logs from AppFabric, customers have improved visibility into SaaS app activity and the ability to centralize security data within the Insight Platform—and ultimately, detect and respond to cloud threats faster. For additional information, see Rapid7’s recent <a href="/about/press-releases/rapid7-expands-relationship-with-aws-to-include-insightidr-support-for-aws-appfabric">press release</a> and <a href="/blog/post/2023/06/27/standardizing-saas-data-to-drive-greater-cloud-security-efficacy/">blog</a> post on this exciting news. </p><h2>More Flexibility for Detection Rule Exceptions</h2><p>We take pride in the fidelity of our out-of-the-box Detection Library while recognizing our customers’ need for flexibility to prioritize threats, fine-tune alerts, and manage detection exceptions for their unique environments. InsightIDR users can now use exceptions to modify and prioritize detection rules for specific users and asset levels. When creating an exception, users can convert the key-value pair into Log Entry Query Language (LEQL) for more specificity. The ability to write exceptions with multiple conditions in a single query saves valuable time and allows analysts to fine-tune specific detections where applicable. To learn more about leveraging LEQL for more complex tuning capability, read the <a href="https://docs.rapid7.com/insightidr/modify-detection-rules#step-4-define-exception-logic">documentation</a>.<br/></p><img src="https://lh5.googleusercontent.com/LqaQSud1sQFIuE3SFK6X-zNDhpN_0OTpS8TEkGwXEkUw2nxZaon6jacPdmGItADQISqZtsi0uWO0BcvFaOVESpiBuiC8QfKBEQLlKqkciqJvHk4AQnrJHHSuh9vZbSFZuYkD0pSOsvzpydi_w0CWZZs" width="auto" style="width: auto; height: auto;" /><h2>API Event Source for Palo Alto Cortex XDR Accelerates Triage</h2><p>A new API integration enables customers to ingest alerts from Cortex XDR into InsightIDR, providing an easy and secure way to triage PAN alerts. Users can set up a new event source to request incidents from the Incidents API within Cortex XDR and generate third-party alerts. Find configuration details <a href="https://docs.rapid7.com/insightidr/palo-alto-networks-cortex-xdr-incidents/">here</a>.</p><h2>Insight Agent Updates Improve Monitoring and Management</h2><ul><li>Users can configure how long Insight Agents are tracked to better monitor and manage the health and status of endpoint Agents. See our updated <a href="https://docs.rapid7.com/insight-agent/agent-settings/#insight-agent-retention-periods">Agent Management settings documentation</a> for configuration instructions and more details.</li><li>The Agent update limit is <a href="https://docs.rapid7.com/insight-agent/agent-settings#agent-update-throttle-controls">now dynamic based on a throttle percentage you specify</a>. This percentage is configurable in 5% increments up to 100%, which effectively turns off update throttling.</li></ul><h2>Velociraptor Version Release</h2><p>Rapid7 is excited to announce version 0.6.9 of Velociraptor–the premier open-source DFIR platform. Enhancements include direct SMB support, improvements to the GUI and the VQL scripting language, and the introduction of “lock down” server mode. </p><h2>MSSP Multi-Customer Investigations Support Prioritization Efficiency</h2><p>MSSPs now have access to an enhanced multi-customer investigation experience that improves the customer management workflow for analysts and increases the speed of investigations.<br/></p><img src="https://lh4.googleusercontent.com/T5OJ_25iIbV0lpShFnuqpdeRaPuWCA4wmLnpgQopM4XpKRwxmyarscNuwRIleE-xQMnSolZzmMnSVXjfpn6iHxiSwTLV3uCoemvbBqpzKoGL6XGfTeHN9pwzBDGOWKDw_X798KzF9U3JaSYlnnR60-o" width="auto" style="width: auto; height: auto;" /><p>The <a href="/partners/mssp-partner-program/">new interface</a> enables MSSP analysts to manage customers at scale. They can see a list of all of their customers in a single view, click into each individual customer to manage their investigations, and switch between managed customers without leaving InsightIDR. Learn more in the <a href="https://docs.rapid7.com/insightidr/multi-customer-investigations/">documentation</a>.<br/></p><img src="https://lh3.googleusercontent.com/Xxc0FMDqzN6KZcEt0S6Tb3xxlKS-VGwHg33dmAGWB_vYWeOOre1heQw_HSQxnea6DaTkDF7dYt5ct7Sb4-455tX_EDAUq4oLhAHVo5FVt1xcu2km6ZvIVgDqwm0JlO6gfcmgRLwrUUvZIkSfRLdUKs8" width="auto" style="width: auto; height: auto;" /><h2>Attacker Behavior Analytics (ABA) Detection Rules</h2><p>In Q2, we added 1197 new ABA detection rules for threats. See them in-product or visit the <a href="https://docs.rapid7.com/insightidr/detection-library-overview">Detection Library</a> for actionable descriptions and recommendations.</p><h2>Stay tuned!</h2><p>We’re always working on new product enhancements and functionality to ensure teams can stay ahead of potential threats and respond to attacks as quickly as possible. Keep an eye on the <a href="/blog/">Rapid7 blog</a> and the <a href="https://docs.rapid7.com/release-notes/insightidr/">InsightIDR release notes</a> to keep up to date with the latest Detection and Response releases at Rapid7.<br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/07/11/whats-new-in-rapid7-detection-response-q2-2023-in-review</link>
      <guid isPermaLink="false">blt2f4bd18f2877c869</guid>
      <category><![CDATA[Detection and Response]]></category>
      <category><![CDATA[Managed Threat Complete]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Stacy Moran]]></dc:creator>
      <pubDate>Tue, 11 Jul 2023 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt373374bd38878905/683ddf3a3a1c5a5a094ba812/GettyImages-1128503636.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Alerting Rules: InsightIDR Raises the Bar for Visibility and Coverage]]></title>
      <description><![CDATA[<p><em>By George Schneider, Information Security Manager at </em><a href="https://www.listrak.com/"><em>Listrak</em></a></p><p>I've worked in cybersecurity for over two decades, so I've seen plenty of platforms come and go—some even crash and burn. But Rapid7, specifically InsightIDR, has consistently performed above expectations. In fact, <a href="/products/insightidr/">InsightIDR</a> has become an essential resource for maintaining my company’s cybersecurity posture.</p><h2>Alerting <em>Rules!</em></h2><p>Back in the early days, a <a href="/fundamentals/siem/">SIEM</a> didn’t come with a bunch of standardized alerting rules. We had to write all of our own rules to actually find what we were looking for. Today, instead of spending six hours a day hunting for threats, InsightIDR does a lot of the work for the practitioner. Now, we spend a maximum of one hour a day responding to alerts. </p><p>In addition to saving time, the out-of-the-box rules are very effective; they find things that our other security products can't detect. This is a key reason I’ve been 100% happy with Rapid7. As a user, I just know it’s <em>functional</em>. It’s clear that InsightIDR is designed by and for users—there’s no fluff, and the kinks are already ironed out. Not only am I saving time and company resources, the solution is a joy to use. </p><h2>Source Coverage</h2><p>When scouting SIEM options, we wanted a platform that could ingest a lot of different log sources. Rapid7 covered all of the elements we use in the big platforms and various security appliances we have—and some in the cloud too. InsightIDR can ingest logs from all sources and correlate them (a key to any high-functioning SIEM) on day one. </p><h2>Trust the Process</h2><p>I can honestly say this is the first time I’ve ever used a product that adds new features and functionality every single quarter. It’s not just a new pretty interface either, Rapid7 consistently adds capabilities that move the product forward. </p><p>What’s also wonderful is that Rapid7 listens to customers, especially their feedback. Not to toot my own horn, but they’ve even released a handful of feature requests that I submitted over the years. So I can say with absolute sincerity that these improvements actually benefit <a href="/fundamentals/security-operations-center/">SOC</a> teams. They make us better at detecting the stuff that we’re most concerned about. </p><h2>Visibility and Coverage, Thanks, Insight Agent! </h2><p>If you’re not familiar with <a href="/blog/post/2023/04/26/using-rapid7-insight-agent-and-insightvm-scan-assistant-in-tandem/">Insight Agent</a>, it’s time to get acquainted. Insight Agent is critical for running forensics on a machine. If I have a machine that gets flagged for something through an automated alert, I can quickly jump in without delay because of the Insight Agent. I get lots of worthwhile information that helps me consistently finish investigations in a timely manner. I know in pretty short order whether an alert is nefarious or just a false positive.</p><p>And this is all built into the <a href="/platform/">Rapid7 platform</a>—it doesn’t require customization or installations to get up and running. You truly have a single pane of glass to do all of this, and it’s somehow super intuitive as well. Using the endpoint agent, I don’t have to switch over to something else to do additional work. It’s all right there. </p><blockquote>“Customer support at Rapid7 is outstanding. It’s the gold standard that I now use to evaluate all other customer support.”</blockquote><h2>Thinking Outside the Pane</h2><p>I also have to give a shout out to the Rapid7 community. The community at <a href="https://discuss.rapid7.com/">discuss.rapid7.com/</a> and the support I get from our Rapid7 account team cannot be overlooked. When I have a question about how to use something, my first step is to visit Discuss to see if somebody else has already posted some information about it—often saving me valuable time. If that doesn’t answer my question, the customer support at Rapid7 is outstanding. It’s the gold standard that I now use to evaluate all other customer support.</p><h2>The Bottom Line</h2><p>My bottom line? I love this product (and the people). To say it’s useful is an understatement. I would never recommend a product that I didn’t think was outstanding. I firmly believe in the Rapid7InsightIDR and experience how useful it is every day. So does my team.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/07/06/alerting-rules-insightidr-raises-the-bar-for-visibility-and-coverage</link>
      <guid isPermaLink="false">blt1d6113e7c204aec9</guid>
      <category><![CDATA[SIEM]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[Detection and Response]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 06 Jul 2023 16:01:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd1744b75daeedae7/683ddc9ccc6042c52e206657/GettyImages-1163059774.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Standardizing SaaS Data to Drive Greater Cloud Security Efficacy]]></title>
      <description><![CDATA[<p>The way we do business has fundamentally changed, and as a result, so must security. Whether it’s legacy modernization initiatives, process improvements, or bridging the gap between physical and digital—most organizational strategies and initiatives involve embracing the cloud. However, investing in the cloud doesn’t come without its complexities. </p><p>When organizations adopt new technologies and applications, they inadvertently introduce new opportunities for attackers through vulnerabilities and points of entry. To stay ahead of potential security concerns, teams need to rely on data in order to get an overview of their environment—ensuring protection.</p><p>Where this becomes a bigger challenge is two fold:</p><ol><li>Security professionals need to secure SaaS applications, but each app has its own methodology for generating and storing vital security and usage data.</li><li>Even if a security team puts in the work to centralize all this data, it must be normalized and standardized in order to be usable, which creates more work and visibility gaps.</li></ol><h2>Elevating Security Posture Around SaaS Applications</h2><p>As part of our continued commitment to ensuring customers stay future-ready and secure through their cloud adoption, we’re excited to announce our work with AWS on their new service that will continue the effort around data standardization. <a href="http://aws.amazon.com/appfabric">AWS AppFabric</a> quickly connects SaaS applications across the organization, so IT and security teams can easily manage and secure applications using a standard schema. </p><p>By using AppFabric to natively connect SaaS productivity and security applications to each other, security teams can automatically normalize application data (into the <a href="https://github.com/ocsf/">Open Cybersecurity Schema Framework (OCSF)</a> format) for administrators to set common policies, standardize security alerts, and easily manage user access across multiple applications.</p><p>For Rapid7 customers, InsightIDR will be able to ingest logs from AppFabric so security teams have access to that data—stay tuned for more! This is just one in a series of investments we are making to help secure your cloud infrastructure. </p><p>To learn more about how customers are leveraging Rapid7's elite security expertise and practitioner first platform to elevate their security program, check out  <a href="/services/managed-detection-and-response-mdr/">Managed XDR</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/06/27/standardizing-saas-data-to-drive-greater-cloud-security-efficacy</link>
      <guid isPermaLink="false">blt07518c05b8dd8b78</guid>
      <category><![CDATA[Managed Threat Complete]]></category>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[Cloud Security]]></category><dc:creator><![CDATA[Dina Durutlic]]></dc:creator>
      <pubDate>Tue, 27 Jun 2023 17:56:20 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt26718a02dbdf21ea/683de1dcff6aa9338d0ea8b7/GettyImages-1388013584.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[What’s New in InsightIDR: Q1 2023 in Review]]></title>
      <description><![CDATA[<p>InsightIDR received a number of exciting updates in Q1 2023, including faster search, a redesigned UI, updated investigations, support for Insight Network Sensor, Enhanced Endpoint Telemetry, and more.</p><p>In our effort to empower practitioners to feel confident in their detection and response capabilities, we focused on functionality that accelerates investigation and response time. Below you will find  key launches and enhancements from the last three months.</p><h3>Augmented Practitioner Log Search Experience: Faster Search Capabilities & Redesigned UI</h3><p>Equipped with new features and better interactivity for a more seamless user experience, the new Log Search provides teams the ability to load selected log sets <strong>3x faster</strong> in addition to providing:</p><ul><li>Easy share and analysis of Log Search queries.</li><li>Customization of log data in Table View, JSON Format, and Condensed Format.</li></ul><p><a href="https://docs.rapid7.com/insightidr/new-log-search/">Learn more about the improved Log Search here</a>.<br/></p><img src="https://lh5.googleusercontent.com/HOpj091Ozk9uL-SsKDvLncF-ctW4O6oRyNzI3P3vXEApBpjhMkFG2csLayKSdGGn0MNEBXUYP8ByvL3DQBB1vGrl1-t1qE8tWrNGQoTOpHCGhGA9YPKeN11NptWSNfXoor8lRnZXfCT3bMaE5iOczxQ" width="auto" style="width: auto; height: auto;" /><h3></h3><h3>Increased Visibility, More Coverage with Updated Investigations Functionality</h3><p>InsightIDR now provides more visibility into actions taken during an investigation. The investigation audit log records updates made in the investigation, when those updates were made, and the user who made them. Additional features include visibility in Log Search as a part of the Audit Logs log set. </p><p><a href="https://docs.rapid7.com/insightidr/investigations/#view-the-audit-log">To learn more about Viewing the Audit Log click here</a>.</p><p>Additionally, two new options are added in Investigations to help practitioners more accurately describe an investigation’s current state - waiting status and unknown disposition. Teams can:</p><ul><li>Use the <em><strong>Waiting</strong></em> status to indicate that the investigation is in a pending state while more information is gathered.</li><li>Use the <em><strong>Unknown</strong></em> disposition to indicate that the maliciousness of the investigation couldn’t be determined. </li></ul><h3>Understand Traffic data via VLANs or Ports with ERSPAN Support for Insight Network Sensor</h3><p>Security teams can now use Encapsulated Remote SPAN (ERSPAN) with the Insight Network</p><p>Sensor to mirror traffic associated with one or more VLANs or ports. When configured, a switch will send the SPAN traffic to a Sensor over IP. This allows teams to deploy a Sensor on whatever platform they want and get a copy of network traffic from a crucial network location such as a core switch. Practitioners can enable ERSPAN on a per Sensor basis from the  Sensor Management page.</p><h3>Enriched Endpoint Response with Enhanced Endpoint Telemetry (EET) Data</h3><p>InsightIDR customers can now leverage EET (captured by the Insight Agent) and capture <a href="/solutions/endpoint-detection-and-response/">endpoint</a> process start metadata to create custom detections, accelerate investigations, and help respond with greater precision. InsightIDR Advanced customers have access to a 7 day view; while InsightIDR Ultimate customers have a 13 month view. </p><p><a href="https://docs.rapid7.com/insightidr/enhanced-endpoint-telemetry/#Available-with-InsightIDRs-Advanced-and-Ultimate-Package">Learn more about the Enhanced Endpoint Telemetry release here</a>.<br/></p><img src="https://lh6.googleusercontent.com/v2YSNCkByjA984OkbnHhis2rsNibTTDzBq0iosNfOClPiShRgztncJtAz6P6MKR3wR0mc6tyFlS13i2ecIrztOuL1YyCssKKk6eMvVgapxrX2FneYjLt6Sv5KxD7HXsNlHDEC-2mZ3geJ2LRdjm6S6A" width="auto" style="width: auto; height: auto;" /><p></p><h3>Stay tuned!</h3><p>Rapid7 provides organizations the world’s only, practitioner-first security solutions. Each product, including InsightIDR, is purpose-built by practitioners, for practitioners to ensure teams achieve elevated outcomes without compromise. </p><p>We’re always working on new product enhancements and functionality to ensure teams can stay ahead of potential threats and malicious activity. Keep an eye on the <a href="/blog/">Rapid7 blog</a> and the <a href="https://docs.rapid7.com/release-notes/insightidr/">InsightIDR release notes</a> to keep up to date with the latest detection and response releases at Rapid7.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/03/29/whats-new-in-insightidr-q1-2023-in-review</link>
      <guid isPermaLink="false">blt6ca59a310794966f</guid>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Dina Durutlic]]></dc:creator>
      <pubDate>Wed, 29 Mar 2023 13:50:12 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt373374bd38878905/683ddf3a3a1c5a5a094ba812/GettyImages-1128503636.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Year In Review: Rapid7 InsightIDR]]></title>
      <description><![CDATA[<p>You’re in cybersecurity, so we’ll guess: 2022 crashed in with Log4Shell and, for the most part, got more challenging—never less. So, we kept making tangible improvements to InsightIDR, our cloud-native next-gen SIEM and XDR. We worked with some of our most forward-deployed practitioners: Rapid7 MDR, Threat Intelligence and Detections Engineering, our open source communities, and our customers. New features and functions address pain points and achieve specific goals. </p><p>Let’s review some of the highlights: </p><h3>Accelerated response time with automated Quick Actions</h3><p>Earlier in the year, InsightIDR launched the <a href="https://docs.rapid7.com/insightidr/quick-actions/">Quick Actions</a> feature which provides teams with instant automation to reduce the time it takes to search, investigate, and respond with a simple click. Example use-cases include:</p><ul><li><strong>Threat hunting within log search. </strong>Using the “Look Up File Hash with Threat Crowd” quick action, teams can learn more about a hash within an endpoint log. If the output of the quick action finds the file hash is malicious, practitioners can choose to investigate further.</li><li><strong>More context around alerts in investigations. </strong>Leveraging the “Look Up Domain with WHOIS” quick action enables teams to receive more context around an IP associated with an alert in an investigation<br/></li></ul><img src="https://lh3.googleusercontent.com/p7eGJC6SwbD14R5Vj5W0VDIuxyH7pvGqanPPAzN2D9oP4QRNuSfp1E7F9KvEHMWMubwkqJGqkAYuG4Q1w0awb8Eudjd3uiJgmyM9jl9WtfOb3cyAVoA_x87E_UrQqkjiOPuYXjoEmM-MGAOZ_hARkhE" width="auto" style="width: auto; height: auto;" /><p><br/><em>“InsightIDR is a real savior, we have reduced our time for log correlation, responding to incidents, not opening multiple tabs and logging into different platforms to understand what happened.</em>”—Abhi Patel, Information Security Officer, Prime Bank. Source: <a href="https://www.techvalidate.com/tvid/12F-814-667">TechValidate</a></p><p><strong>Expanded visibility across cloud and </strong><a href="/fundamentals/external-attack-surface-management-easm/"><strong>external attack surface</strong></a></p><p>With InsightIDR, teams have security that grows and scales alongside their business - both on-prem and in the cloud. This year we focused on empowering security teams with cloud incident response capabilities by providing robust integrations with AWS CloudTrail and Microsoft Azure, while also enabling cloud detections with our AWS Guard Duty Detections, AWS Cloud Trail Detections, and more.Customers have the full context of their cloud telemetry and detections alongside their wider environment to get a full, cohesive picture and investigate malicious activity and threats that may move across multiple devices and infrastructures.</p><p>Additionally, with Threat Command and InsightIDR together, customers can unlock a complete view of your external and internal attack surface. You can now view <a href="https://docs.rapid7.com/insightidr/threat-command-alerts/">Threat Command alerts</a> alongside their broader detection set in InsightIDR:</p><ul><li><strong>Prioritize and investigate Threat Command alerts:</strong><strong> </strong>Use InsightIDR’s investigation management capabilities and seamlessly pivot back to Threat Command to remediate the threat or ask an analyst for help.</li><li><strong>Tune Threat Command detection rules directly in InsightIDR: </strong><strong>A</strong>djust the rule action, set the rule priority, and add exceptions.</li></ul><p>Lastly, Rapid7 provides all customers with 13 months of data retention by default—so they are always audit-ready. To support compliance regulations, we launched new dashboards for organizations to ensure they are meeting requirements. For example, we launched new dashboards for CIS, a common security framework, covering:</p><ul><li>CIS Control 5 - Account Management</li><li>CIS Control 9 - Email and Web Browser Protections</li><li>CIS Control 10 - Malware Defense</li></ul><p><em>“With Rapid7’s InsightIDR, we have a greater handle on threats. We are able to resolve issues quicker and reduce maximum tolerable downtime, our incident management procedures and real-time actions have improved immeasurably too, and we have better cyber hygiene as well.”</em>—Security Officer, Medium Enterprise Chemicals Company. Source: <a href="https://www.techvalidate.com/tvid/AE7-68E-BE1">TechValidate</a></p><p><strong>Confidence with expertly curated and vetted detections</strong></p><p>Rapid7 Threat Intelligence and Detection Engineering (TIDE) team has curated and is continuously updating our XDR detection library that is expertly vetted by the Rapid7 MDR SOC. The detection library is a result of meticulous research, our vast open source community, security forums, and industry expertise to provide your teams the data they need for sophisticated detection and response. Last year we launched a slew of new detections, a bulk being IDS rules, but worth highlighting is the expanded coverage of tracked threat actors with the Threat Command integration. By integrating our Attacker Behavior Analytics (ABA) detection engine with Threat Command’s threat library intelligence, customers can access broader detections, and new threat groups with around 400 new ABA detection rules powered by thousands of new IOCs.</p><p>We also added a new ABA detection rule - <a href="/blog/post/2022/12/07/about-anomalous-data-transfer-detection-in-insightidr/">Anomalous Data Transfer (ADT)</a> that uses the Insight Network Sensor to identify large transfers of data sent by assets on a network and outputs alerts for easier monitoring of unusual behavior and potential exfiltration.<br/></p><img src="https://lh6.googleusercontent.com/T6tRGjfeakUBkJlRP_ZC5nPvU31Dcd4j_yJ9w6jiNvG_Y1JZ9VQIBz9SFCuOBOZosLVch0hJ2cukZPiKWAKYEAt5cJVZvTKJnYGTyuzfoOb1VJBZqVpsrwUys-Yir_DFmFJjF90impAUmld6JqSCc8c" width="auto" style="width: auto; height: auto;" /><p><em>“InsightIDR provided value to us on Day-1. We didn't have to write long lists of rules or tweak hundreds of settings in order to get security alerts from our operating environment. Better still, the signal-to-noise ratio of the alerts is great; little-to-no false positives."</em>—Philip Daly, VP Infrastructure and Information Security, Carlton One Engagement. Source: <a href="https://www.techvalidate.com/product-research/insightIDR/facts/C8F-522-736">TechValidate</a></p><p><strong>Looking ahead</strong></p><p>Watch this space! We’re always working on new product enhancements and functionality to ensure your team can stay ahead of potential threats and malicious activity. Keep an eye on the <a href="/blog/">Rapid7 blog</a> and the <a href="https://docs.rapid7.com/release-notes/insightidr/">InsightIDR release notes</a> to keep up to date with the latest detection and response releases at Rapid7.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/02/07/year-in-review-rapid7-insightidr</link>
      <guid isPermaLink="false">blt45a393d5be443ff0</guid>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Dina Durutlic]]></dc:creator>
      <pubDate>Tue, 07 Feb 2023 20:37:24 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt85920c71bc8fbf50/683ddcda590d7f0d4cde1a49/insightidr-q3.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Now Available Through Carahsoft’s NASPO ValuePoint]]></title>
      <description><![CDATA[<p>We are happy to announce that <a href="/products/">Rapid7’s cybersecurity products</a> have been added to the NASPO ValuePoint Cloud Solutions contract held by Carahsoft Technology Corp. The addition of this contract enables Carahsoft and its reseller partners to provide Rapid7’s Insight platform to participating States, Local Governments, and Educational (SLED) institutions.</p><p>“Rapid7’s Insight platform goes beyond threat detection by enabling organizations to quickly respond to attacks with intelligent automation,” said Alex Whitworth, Sales Director who leads the Rapid7 Team at Carahsoft. </p><p>“We are thrilled to work with Rapid7 and our reseller partners to deliver these advanced cloud risk management and threat detection solutions to NASPO members to further protect IT environments across the SLED space.”</p><p>NASPO ValuePoint is a cooperative purchasing program facilitating public procurement solicitations and agreements using a lead-state model. The program provides the highest standard of excellence in public cooperative contracting. By leveraging the leadership and expertise of all states and the purchasing power of their public entities, NASPO ValuePoint delivers the highest valued, reliable and competitively sourced contracts, offering public entities outstanding prices.</p><p>“In partnership with Carahsoft and their reseller partners, we look forward to providing broader availability of the Insight platform to help security teams better protect their organizations from an increasingly complex and volatile threat landscape,” said Damon Cabanillas, Vice President of Public Sector Sales at Rapid7. </p><p>The Rapid7 Insight platform is available through Carahsoft’s NASPO ValuePoint Master Agreement #AR2472. For more information, visit <a href="https://www.carahsoft.com/rapid7/contracts">https://www.carahsoft.com/rapid7/contracts</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/01/24/rapid7-now-available-through-carahsofts-naspo-valuepoint</link>
      <guid isPermaLink="false">bltd7650fc3b6d63d8d</guid>
      <category><![CDATA[Government]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Tue, 24 Jan 2023 15:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[What’s New in InsightIDR: Q4 2022 in Review]]></title>
      <description><![CDATA[<p>As we continue to empower security teams with the freedom to focus on what matters most, Q4 focused on investments and releases that contributed to that vision. With InsightIDR, Rapid7’s cloud-native XDR and <a href="/products/insightidr/">SIEM solution</a>, teams have the scale, comprehensive contextual coverage, and expertly vetted detections they need to thwart threats early in the attack chain.</p><p>This 2022 Q4 recap post offers a closer look at the recent investments and releases we’ve made over the past quarter. Here are some of the highlights:</p><h3>Easy to create and manage log search, dashboards, and reports</h3><p>You spoke, we listened! Per our customers, you can now create tables with multiple columns, allowing teams to see all data in one view. For example, simply add a query with a “where” clause and select a table display followed by the columns you want displayed. </p><p>Additionally, teams can reduce groupby search results with the having() clause. Customers can filter out what data is returned from groupby results with the option to layer in existing analytics function support (e.g. count, unique, max).</p><img src="https://lh3.googleusercontent.com/kvoM4WvGOKHyrbfY4RG7sDhlpBglHYPDmcndoMvsxF6KISWs6o1Z8nzsWHREBLaZTXIh0taMs7LQX7N9XFXr3nthtF8XCD9PQO8HsrAFOX0d4LnOCFV1pC5ITizZIZnSioqIOY7kRr4c24-j5QgT3DmRcQLfRSs1XeLvtgNtILirAW2lbbnEFVsf00NTmQ" width="auto" style="width: auto; height: auto;" /><p></p><h3>Accelerated time to value</h3><p>The InsightIDR Onboarding Progress Tracker, available for customers during their 90 day onboarding period, is a self-serve, centralized check-list of onboarding tasks with step-by-step guidance, completion statuses, and context on the “what” and “why” of each task.</p><p>No longer onboarding? No problem! We made the progress tracker available beyond the 90-day onboarding period so customers can evaluate setup progress and ensure InsightIDR is operating at full capacity to effectively detect, investigate, and respond to threats.</p><img src="https://lh3.googleusercontent.com/LG4Mdr0GrGNDbWLLsip0BCxKK4oea_D2kNvSUZHNxYWi9Gl2bZq8FdaRwNz6-CXyLw5YWh38XQq01OWR0YZrLSIFekCxxEBvGvOeD3JxuZLvhTxIKJOqcSbgMRRMk6FMhQvNc28ajN68LyOrxU0JRftUvKPzukWqMdY892K7HwK6CAshq7sY2uqvCujbAQ" width="auto" style="width: auto; height: auto;" /><p></p><h3>Visibility across your modern environment</h3><p>For those that leverage Palo Alto Cortex, you can now configure <strong>Palo Alto Cortex Data Lake</strong> to send activity to InsightIDR including syslog-encrypted Web Proxy, Firewall, Ingress Authentication, etc. Similarly, for customers leveraging Zscaler, you can now configure <strong>Zscaler Log Streaming Service (LSS)</strong> to receive and parse user activity and audit logs from Zscaler Private Access through the LSS. </p><p>For teams who do not have the bandwidth to set up and manage multiple event sources pertaining to Cisco Meraki, we have added support to ingest Cisco Meraki events through the <strong>Cisco Meraki API</strong>. This will enable you to deploy and add new event sources with less management. </p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt63a8d4bbf4bcbf04/683de0aecc604292b520678e/111723-1.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="111723-1.jpg" asset-alt="111723-1.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt63a8d4bbf4bcbf04/683de0aecc604292b520678e/111723-1.jpg" data-sys-asset-uid="blt63a8d4bbf4bcbf04" data-sys-asset-filename="111723-1.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="111723-1.jpg" sys-style-type="display"/></figure><p></p><p>Customers can now bring data from their <strong>Government Community Cloud (GCC)</strong> and <strong>GCC High</strong> environments when setting up the Office365 event source to ensure security standards are met when processing US Government data. </p><h3>Stay tuned!</h3><p>We’re always working on new product enhancements and functionality to ensure your team can stay ahead of potential threats and malicious activity. Keep an eye on the <a href="/blog/">Rapid7 blog</a> and the <a href="https://docs.rapid7.com/release-notes/insightidr/">InsightIDR release notes</a> to keep up to date with the latest detection and response releases at Rapid7.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/01/17/whats-new-in-insightidr-q4-2022-in-review</link>
      <guid isPermaLink="false">blt3ff7a0e3e7b43b78</guid>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Dina Durutlic]]></dc:creator>
      <pubDate>Tue, 17 Jan 2023 18:58:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltae20d294ed95cc3d/683de0d5590d7f7dabde1bbe/3-mistakes-d-r.jpeg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Ditch The Duct Tape: Reduce Security Sprawl With XDR]]></title>
      <description><![CDATA[<p>The New Year’s Day edition of <em>The Wall Street Journal</em> asked a big question in a big headline: “Can Southwest Airlines Buy Back Its Customers’ Love?”</p><p>While other airlines rebounded from extreme winter weather and service disruptions, Southwest—always top-rated, with a famously loyal following—melted down. It canceled more than 2,300 flights, stranding passengers and their baggage around the country over the Christmas holidays. The U.S. Department of Transportation is putting the entire event “under a microscope.”</p><p>Most believe Southwest will, in fact, be loved again. Tickets were refunded, travel expenses were reimbursed, and approximately 25,000 frequent flyer miles were doled out to each stranded customer. Whatever. That’s not why you should pay attention to this tale.</p><p>The object lesson that matters? <em>WSJ’s CIO Journal</em> followed up, reporting that “balky crew scheduling technology” caused the disaster. Airline staff who used the system had been frustrated by it for some time, but couldn’t get executive attention. A scathing <em>New York Times</em> op-ed on December 31, "The Shameful Open Secret Behind Southwest’s Failure," blames the strong incentives to address problems by “adding a bit of duct tape and wire to what you already have.”</p><p><strong>Balky tech that frustrates staff: Sound familiar?</strong></p><p>Two years ago, <em>ZDNet</em> reported the average enterprise managed 45 different tools to secure their environment. A few weeks ago, the <em>Silicon Valley Business Journal </em>said the number has jumped to 76, with sprawl driven by a need to keep pace with cloud adoption and remote work. Security teams are spending more than half their time manually producing reports, and pulling in data from multiple siloed tools.</p><p>The cybersecurity skills gap isn’t going anywhere. And the most tech savvy generation in human history—Gen Z, the latest entrants to adulthood and the workforce—is unlikely to stick it out in a burnout job laden with clunky tools. They grew up with customer-obsessed brands like Apple and Amazon and Zappos. Expectations about technology and elegant simplicity are built into all corners of their lives—work included— and they instantly know the difference between good and shambolic. Younger workers led <a href="https://www.pewresearch.org/fact-tank/2022/03/09/majority-of-workers-who-quit-a-job-in-2021-cite-low-pay-no-opportunities-for-advancement-feeling-disrespected/">The Great Resignation of 2021</a>.</p><p>The trend toward XDR adoption is part of a solution. While capabilities can vary, XDR should integrate and correlate data from across your environment, letting you prioritize and eliminate threats, automate repetitive tasks, and liberate people to do important work.</p><p><strong>If 2023 is your year to consider XDR, start with this Buyer’s Guide</strong></p><p>Our new<a href="/info/insightidr/2023-xdr-buyers-guide/?utm_medium=promo-bar&amp;utm_source=website&amp;utm_campaign=gc-ftf"> XDR Buyer’s Guide </a>is for all of you who want to consolidate, simplify, and attract top talent. In this guide, you’ll get:</p><ul><li>Must-have requirements any real XDR offers</li><li>Ways XDR is a staffing and efficiency game-changer</li><li>Key questions to ask as you evaluate options </li></ul><p>Last year, Southwest announced $2 billion in customer experience investments, including upgraded WiFi, in-seat power, and larger overhead bins, as well as a new multimedia brand campaign, “Go With Heart.”  </p><p>After taking very good care of stranded customers—and true  to form, the airline did—it announced a 10-year, $10 million plan to hit carbon reduction goals. <em>The Wall Street Journal</em> asked: “Could not the Southwest IT department have used another $10 million?”</p><p><strong>…and you’ve surely heard about this</strong></p><p>This morning at 7:20am, the <a href="https://www.cnn.com/us/live-news/faa-system-outage-us-flight-disruptions/index.html">FAA grounded all domestic departures</a> when the NOTAM (Notice to Air Mission) system failed. This critical system ingests information about anomalies at 19,000 airports for 45,000 flights every day, and alerts the right pilots at the right time. We woke up hearing about “failure to modernize” and also possible compromise. </p><p>Thanks for reading and come back tomorrow, as we'll be following this developing story closely.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2023/01/11/ditch-the-duct-tape-reduce-security-sprawl-with-xdr</link>
      <guid isPermaLink="false">bltd798df9c1d238b41</guid>
      <category><![CDATA[XDR]]></category>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Amy Hunt]]></dc:creator>
      <pubDate>Wed, 11 Jan 2023 14:51:31 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8d4b7b13b3985146/683dded670aa95fed3fe2ffc/GettyImages-106594866.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[About Anomalous Data Transfer detection in InsightIDR]]></title>
      <description><![CDATA[<p>Data exfiltration is an unauthorized movement or transfer of data occurring on an organization’s network. This can occur when a malicious actor gains access to a corporation’s network with the intention of stealing or leaking data.</p><p>Data exfiltration can also be carried out by inside actors moving data outside of the network accidentally, by uploading corporate files to their personal cloud – or deliberately to leak information that harms the organization.</p><p>Identifying this cyber risk is integral to securing your organization’s network.</p><h2>Of course, attackers use multiple methods</h2><p>Some use phishing scams to trick users into inputting personal login information into spoofed domains so that they can use the appropriate credentials to infiltrate the network. Once on to the network, the malicious actor can send the files they were searching for outside of their network using remote desktop, SSH, etc.</p><p>Another method? Ignoring security controls of a network. For example, employees may download unauthorized software for ease of use, but unintentionally allow a third party to gain access to sensitive information that was not meant to leave the network. People may use personal accounts and devices for work related tasks just because it’s easy. A malicious inside actor can also circumvent security controls to leak information outside of the network.</p><p>With many organizations moving to a hybrid model of work, it’s more important than ever to prevent data exfiltration, intended or unintended. This can be done by educating your employees of appropriate conduct when it comes to data usage and data sharing within and outside of your network. Education about common attack vectors attackers may use to steal their credentials will also help your employees keep your network secure. Additionally, education around what devices can access your network will make it easier to monitor whether a data breach is about to occur. Finally, assigning certain privileges based on employee functions will help.</p><p>Being able to detect data exfiltration is incredibly important for an organization’s environment and essential to your organization’s security posture. One of our new detections, Anomalous Data Transfer, provides you with the visibility into possible occurrences of data exfiltration within your network.</p><h2>Rapid7s approach for detecting Anomalous Data Transfers</h2><p>Anomalous Data Transfer is an InsightIDR detection which utilizes network flow data, produced by the Insight Network Sensor, to identify and mark unusual transfers of data and behavior. The detection identifies anomalously large transfers of data sent by assets out of a network, and outputs data exfiltration alerts.</p><img src="https://lh4.googleusercontent.com/Qv24jvRFIiRoJVLGRM1Cdu_4Pa8r9vFpUjuY6tIbeMX43u_85x_Kmrhr3va-kJoJ_3WpWMKWExhlbuKyIKIxf3e_2jcBZqH1xU76OYsBi1DYx9C-rFcdp29wWA7PWIUExDRI7U8sP2riutQx3sXunumg11F58zyHk348ynbsBSvPUNmXdOM_mn5bRgJQXg" width="auto" style="width: auto; height: auto;" /><p>The model dynamically derives a baseline for each asset based on its active periods over 30 days, and each hour, will output network activity that is anomalously high as compared to that baseline as a candidate for further investigation. This process effectively acts as a filter, reducing millions of network connections into a few candidate alerts to bring to the attention of a security analyst.</p><p>Further contextual information is included in each candidate alert to help a security team make informed decisions about how to investigate the possible occurrence of data exfiltration.</p><img src="https://lh6.googleusercontent.com/8Vfph8zFxIYLAzVGWQnNy_fdeJ3-3DhFG_-os83GNC7P9a3vVPA1euhhoKDns1WWnJVMNgPMreHkPdbzgBmubtP5Bc1dOVmvTceXUuQCsVfQcZ_yrfhqmKc04Zvwh_7PMuyhZCJxqqedpQ4l6qEPnwmOf1M-B17v5pnL6ExLJAaA1kgvyoIihx8vIWvgYQ" width="auto" style="width: auto; height: auto;" /><p>The user has the ability to tune exceptions for which anomalous data transfer alerts are shown by going into Managed Detections. The user can tune exception rules for Anomalous Data Transfer with the following attributes: Organization, Certificate, and Source IP/Subnet. This allows for the analysts to focus on alerts that are well tailored to their organization’s environment.</p><img src="https://lh3.googleusercontent.com/Caim1B9sn9SCb_3MDjFB3-t43SHJYMxduHygazEgMgjKBoE1OhE7cGSdAO9puYgSORAULxSkeFkXYQ7TIe2SzRTBKfCFcpHHJsVsC4q-mAbnHK8m_JAK4A2uAQBStUOhtfSFpyc7GGeeeRDSxo8-00C3-kLz9yrdHCIYc9dJ3hShXDTm6qoSzbgp9a0M0g" width="auto" style="width: auto; height: auto;" />]]></description>
      <link>https://www.rapid7.com/blog/post/2022/12/07/about-anomalous-data-transfer-detection-in-insightidr</link>
      <guid isPermaLink="false">blt4a267f0d915dd1ba</guid>
      <category><![CDATA[InsightIDR]]></category><dc:creator><![CDATA[Shivangi Pandey]]></dc:creator>
      <pubDate>Wed, 07 Dec 2022 19:14:26 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte12de5704c98ea5b/683de05fabf2ad2deb3c4391/GettyImages-1345780513.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Integration For AWS Verified Access]]></title>
      <description><![CDATA[<p>Today at re:invent, Amazon Web Services (AWS) unveiled its new AWS Verified Access service, and we are thrilled to announce that InsightIDR — Rapid7’s next-gen SIEM and XDR — will support log ingestion from this new service when it is made generally available.</p><h2>What Is AWS Verified Access?</h2><p>AWS Verified Access is a new service that allows AWS customers to simplify secure access to private applications running on AWS, without requiring the use of a VPN. Verified Access also lets customers easily implement Zero Trust policies for each application reached via the service. The data needed for these policies is provided by integrations between Verified Access and third-party solutions like IdPs and device management tools. For example:</p><ul><li>Access to a low-risk application might be granted to any employee who is logged into the organization’s IdP solution</li><li>Access to a highly sensitive application might only be granted to employees who are logged into the organization’s IdP solution, are part of a specific team at the company, are accessing from a company-managed computer that is fully updated, and have an IP address coming from a country on an allowlist</li></ul><p>For customers who already have IdP and device management solutions, Verified Access can integrate with many of these vendors, allowing the customer to use their existing provider to define policies while still getting the convenience of VPN-less access to their private applications through Verified Access.</p><h2>Unlock a Complete Picture of Your Cloud Security with InsightIDR</h2><p>Verified Access generates detailed logs for every authorization attempt. InsightIDR will be able to ingest these logs from AWS’s just-announced Amazon Security Lake. <a href="/products/insightidr/">InsightIDR</a> customers will be able to see ingress activity from Verified Access alongside ingress events from sources like AWS Identity Access Management (IAM), VPNs, productivity apps, and more — not to mention telemetry from their broader cloud and on-premises environments. Like all ingress activity logs sent to InsightIDR, logs from Verified Access will be able to be used to detect suspicious activity, as well as be brought into investigations to help establish a complete timeline and blast radius of an incident. In addition, customers will have the ability to create custom alerts off of Verified Access logs to further scrutinize and monitor access to sensitive applications.</p><p>InsightIDR’s support for Verified Access is just the latest capability to come out of our never-ending dedication to support our customers as they adopt the newest cloud technologies. </p>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/11/30/rapid7-integration-for-aws-verified-access</link>
      <guid isPermaLink="false">blt8564ec6c0aa60026</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Cloud Security]]></category><dc:creator><![CDATA[Aaron Sawitsky]]></dc:creator>
      <pubDate>Wed, 30 Nov 2022 14:02:50 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7d367632f462ceb6/683ddde3590d7f1ae6de1abd/GettyImages-1336250787-1.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[InsightIDR Launches Integration With New AWS Security Data Lake Service]]></title>
      <description><![CDATA[<p>It has been an action-packed day at AWS re:Invent. For security professionals, one of the most exciting announcements has to be the launch of Amazon Security Lake. We see a lot of potential for this new service, which is why Rapid7 is proud to announce the immediate availability of an integration between InsightIDR and Security Lake. Read on to learn more!</p><h2>What Is Amazon Security Lake?</h2><p>Amazon Security Lake gives AWS customers a security data lake that centralizes AWS and third-party security logs. What’s more, all data sent to Security Lake is formatted using the recently-launched <a href="/blog/post/2022/08/10/ocsf-working-together-to-standardize-data/">OCSF</a> standard. That means even if logs come from different services or different vendors, all logs for a given activity (e.g. all cloud activity logs, all network activity logs, etc.) will have the same format in Security Lake. This will make it easy for customers and their third-party vendors to make use of the data in Security Lake without first having to normalize data.</p><p>Another big feature in Security Lake is the granular control it offers. Customers can choose which users and third-party integrations can access which data sources and determine the duration of data that is available to each. For example, a customer might give their developers the ability to view CloudTrail data from the past five days so they can troubleshoot issues, but give InsightIDR the ability to view CloudTrail data from the past year.</p><h2>InsightIDR’s Integration With Amazon Security Lake</h2><p>InsightIDR’s new integration allows it to ingest log data from Security Lake. At the moment, InsightIDR will only ingest logs from AWS CloudTrail. Over time, we plan to add support for additional OCSF log types, which will allow customers to send data from multiple AWS and third-party services to InsightIDR through one Amazon Security Lake integration. This will give us the potential ability to immediately ingest and parse logs from any new third-party solution that gets introduced, as long as that solution can export its logs to Security Lake. Another customer benefit is that by consolidating the ingestion of multiple logs via Security Lake, onboarding and ongoing maintenance will be greatly reduced.</p><p>If you are an existing InsightIDR customer and want to take advantage of the new integration with Amazon Security Lake, instructions for setup are <a href="https://docs.rapid7.com/insightidr/aws-security-lake/">here</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/11/29/insightidr-launches-integration-with-new-aws-security-data-lake-service</link>
      <guid isPermaLink="false">bltae13a318df21f94f</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Cloud Security]]></category><dc:creator><![CDATA[Aaron Sawitsky]]></dc:creator>
      <pubDate>Tue, 29 Nov 2022 20:24:03 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta7601c1bd993f0d7/683ddd993323a5dff780a7fb/GettyImages-1354192776.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Search Made Easy: InsightIDR’s Secret Weapon for Efficiency and Efficacy]]></title>
      <description><![CDATA[<p><em>By Matt Heidet</em></p><p><em>Matt is a Senior Information Security Engineer at a Regional Financial Institution. He is a Customer and Guest Blogger for Rapid7</em></p><p>Have you ever groaned when divvying up incidents from a pen-test amongst an overworked team? Or maybe you’ve struggled to present how you adhere to multiple compliance frameworks to your board. As a Senior Information Security Engineer at a Regional Finance Institute, I’m all too familiar with the daily grind – too many threats, not nearly enough time. Fortunately, Rapid7’s InsightIDR has helped me and my team unify our data, verify the nature of threats, and uphold a security posture that we’re confident in.</p><p>InsightIDR has lots of features that have enabled my organization to identify and respond more easily to threats. In this blog post, I’m going to share some insight into my favorite – InsightIDR’s Log Search function.</p><h3>Back to the Beginning: Why We Chose Rapid7<br/></h3><p>Choosing InsightIDR was a no-brainer for us. We tried two other products, but as soon as we finished the proof-of-concept with Rapid7, we went straight to purchase. There was no point in even testing the others, as InsightIDR provided us with the visibility and context necessary to keep our environment secure </p><p>If you already have InsightVM, Rapid7’s vulnerability management solution, it’s a pretty smooth transition to InsightIDR. As existing InsightVM users, we already had the Rapid7 Insight Agent deployed on our endpoints, which provided us with real-time endpoint monitoring for vulnerabilities. When we added InsightIDR to our environment, we were automatically covered on those same endpoints, without any need to set up anything additional. </p><p>We were able to get up and running and integrate with a number of Azure Event Hubs out of the gate (a centralized service from which to collect Azure data and logs). Only a few other tools would provide that same capability – but they wouldn’t fit into our existing environment the way that Rapid7 did.</p><h3>Getting Started with Log Search<br/></h3><p>When we first started using InsightIDR, my team wanted to bring in as much data to InsightIDR as we could to get a clear picture of what was happening in our environment. We knew we needed holistic visibility, but weren’t 100% on what we should be alerting on or necessarily looking for. Luckily, InsightIDR’s Log Search intuitively organized all of our data and helped us get a view of everything in one place, narrowing our focus and enabling us to really focus on high priority data. </p><p>InsightIDR removed the complexity of traditional Log Search. If you’re not sure where to start, just start with a simple search – a host name, a kind of attack, or an event. Then, based on your results, you can create a more advanced search by filtering, iterating, or narrowing down your simple searches. From there, you can start creating reports. Your reports can tell you (and you can then customize) how you should be watching an endpoint, how you should be alerted, and more. </p><h3>Let’s Talk Outcomes</h3><p><br/>Now it’s time to do something with all this data! We were able to compare data from those sources to the email alerts that we got from Microsoft on Azure and easily generate a report based on the email events we were seeing from Microsoft. From there, we were able to generate custom detections.</p><p>One reason this was all so straightforward is that Rapid7’s powerful search language, Log Entry Query Language (LEQL – which allows you to construct queries that can extract the hidden insights within your logs), is easy to pick up. Even if you’re not a programmer or engineer, the structure and syntax of the language are accessible.</p><p>Once you get the first couple workflows ironed out, it’s easy to extrapolate to other ones. Once my team focused on this task we were able to come up with 45 custom detections over just three days!</p><h3><strong>Where</strong> Do I Go From Here?</h3><p><br/>Detections are your bread and butter, of course. But once you’re oriented to the dashboard, the language, and the basics of a workflow, the sky’s the limit. You can then customize your reports to your heart’s desire. My team currently has about 22 reports coming in daily, summarizing almost 100 custom detections that all stem from log search. </p><p>Rapid7’s alerting and reporting is hands down the best I’ve ever worked with. But it’s not just about volume – it’s also about versatility. We’re able to monitor all of our Cloud services – including Amazon, Azure, and Google – with ease. In the past, when using managed security providers, this wasn’t nearly as straightforward. We’re looking at InsightIDR’s pre-built Attacker Behavior Analytics (ABA) and User Behavior Analytics (UBA) detections with regularity, using a mix of both custom and pre-built “cards” (a visually appealing representation of data) in our InsightIDR dashboard.</p><p>Furthermore, it’s not just that you have options. The pre-built detections that InsightIDR ships out of the box boasts plenty of efficacy, resulting in unprecedented efficiency. The ability to have all of the data you need in one place – the equivalent of a “single pane of glass” – just can’t be overstated.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2022/11/22/search-made-easy-insightidrs-secret-weapon-for-efficiency-and-efficacy</link>
      <guid isPermaLink="false">blt5c3f1b3c1cc5c167</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[XDR]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Tue, 22 Nov 2022 14:48:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2ab062f8c00e11fb/683ddbef5619a1a71ec6e94e/bloghero-4.jpeg" medium="image" />
    </item>
  </channel>
</rss>