Rapid7 Support Resources

Customer Portal

Connect with Support

Need help? We’ve got you covered. Sign in to the Customer Portal for our top recommended help articles, and to connect with our awesome Support Team.
Create and manage your cases with ease and get routed to the right product specialist.

Customer Portal Sign In


Having trouble logging in?

Customer Support Guidebook

Learn how the Rapid7 Customer Support team can support you and your organization

Training & Certifications

Be awesome at everything you do -- get trained by Rapid7 experts and take your security skills to the next level.

Learn more

Consulting Services

Need a hand with your security program? From planning and strategy to full-service support, our Rapid7 experts have you covered.

View all services

Product Documentation

Find help using and administering Rapid7 products

InsightAppSec InsightIDR AppSpider Metasploit InsightConnect InsightOps InsightVM Komand Nexpose
View all docs

Read What’s New on the Rapid7 Blog

Attack Surface Analysis Part 2: Penetration Testing
In this three-part series, we’ll explore key considerations and strategies for choosing an attack surface analysis strategy, and the ways it can be used to increase awareness of both technical and process-related risks.
Jeffrey Gardner
Jun 15, 2021
Read More
Automated remediation level 1: Lock down fundamentals
Ensuring visibility across teams is a critical component in a shared data set where everyone can come to the same conclusions. And if this understanding and trust between teams is achieved, then you might be ready to get into the particulars of automated remediation.
Aaron Wells
Jun 14, 2021
Read More
Metasploit Wrap-Up
NSClient++ Community contributor Yann Castel has contributed an exploit module for NSClient++ which targets an authenticated command execution vulnerability. Users that are able to authenticate to the service as admin can leverage the external scripts feature to execute commands with SYSTEM level privileges. This allows the underlying server to be compromised. Castel is also working on another exploit module for NSClient++ which happens to be a local privilege escalation so stay tuned for more N
Spencer McIntyre
Jun 11, 2021
Read More
More recent blog posts

Visit the Customer Portal

File a case, view your open cases, get in touch.

Launch Portal