Rapid7 Support Resources

Customer Portal

Connect with Support

Need help? We’ve got you covered. Sign into the Customer Portal for our top recommended help articles, and to connect with our awesome Support Team.
Create and manage your cases with ease and get routed to the right product specialist.

Customer Portal Sign In

Introducing the Scheduler: Customers can now schedule time with a support engineer, directly in the Customer Portal. Learn how.

Having trouble logging in?

Customer Support Guidebook

Learn how the Rapid7 Customer Support team can support you and your organization

Training & Certifications

Be awesome at everything you do -- get trained by Rapid7 experts and take your security skills to the next level.

Learn more

Consulting Services

Need a hand with your security program? From planning and strategy to full-service support, our Rapid7 experts have you covered.

View all services

Product Documentation

Find help using and administering Rapid7 products

InsightAppSec InsightIDR AppSpider Metasploit InsightConnect InsightOps InsightVM Komand Nexpose
View all docs

Read What’s New on the Rapid7 Blog

Securing Cloud-Native Apps Requires Partnership
This blog was coauthored by Bria Grangard and Justin Buchanan. Every business is becoming a software business, and web applications are critical for their success. Because of this, web apps are often a primary target for many attackers. In fact, according to a recent Forrester report, web apps and software...
Bria Grangard
Feb 24, 2020
Read More
Rapid7 Named 2019 Global SOAR Company of the Year by Frost & Sullivan
We are thrilled to announce that global research and consulting firm Frost & Sullivan has named Rapid7 as the Global SOAR Company of the Year after analyzing our security orchestration, automation, and response (SOAR) tool, InsightConnect. Frost & Sullivan reported that InsightConnect is a “visionary...
Lauren Taylor
Feb 21, 2020
Read More
Metasploit Wrap-Up
Long live copy and paste Adam Galway enhanced the set PAYLOAD command to strip the /payload/, payload/, and / prefixes from a payload name in an effort to improve the user experience while configuring an exploit's payload. You can see the new behavior below! msf5 exploit(windows/smb/ms17_010_eternalblue)...
William Vu
Feb 21, 2020
Read More
More recent blog posts

Visit the Customer Portal

File a case, view your open cases, get in touch.

Launch Portal