Rapid7 Support Resources

Customer Portal

Connect with Support

Need help? We’ve got you covered. Sign in to the Customer Portal for our top recommended help articles, and to connect with our awesome Support Team.
Create and manage your cases with ease and get routed to the right product specialist.

Customer Portal Sign In

Introducing the Scheduler: Customers can now schedule time with a support engineer, directly in the Customer Portal. Learn how.

Having trouble logging in?

Customer Support Guidebook

Learn how the Rapid7 Customer Support team can support you and your organization

Training & Certifications

Be awesome at everything you do -- get trained by Rapid7 experts and take your security skills to the next level.

Learn more

Consulting Services

Need a hand with your security program? From planning and strategy to full-service support, our Rapid7 experts have you covered.

View all services

Product Documentation

Find help using and administering Rapid7 products

InsightAppSec InsightIDR AppSpider Metasploit InsightConnect InsightOps InsightVM Komand Nexpose
View all docs

Read What’s New on the Rapid7 Blog

Top 5 Ways to Get a Network Traffic Source on Your Network
In my last blog post, I looked at How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response. However, none of these use cases are possible without a source of network traffic. If you want to monitor network traffic on your network, you will need a source of network packets. Thankfully,...
Darragh Delaney
Jul 15, 2020
Read More
Patch Tuesday - July 2020
100+ vulnerabilities patched during Patch Tuesdays the new norm Another 123 CVEs are covered this month from Microsoft for the 2020-Jul Patch Tuesday. In addition to our usual suspects like Windows, Internet Explorer/Microsoft Edge, and Microsoft Office this Patch Tuesday addresses several developer-type...
Richard Tsang
Jul 15, 2020
Read More
Windows DNS Server Remote Code Execution Vulnerability (CVE-2020-1350): What You Need to Know
On Tuesday, July 14, 2020, Microsoft released a patch for a 17-year-old remote code execution (RCE) vulnerability in Windows Domain Name System (DNS) servers discovered by Check Point researchers—and disclosed in CVE-2020-1350. While there is a patch, organizations that are able to can quickly deploy...
boB Rudis
Jul 14, 2020
Read More
More recent blog posts

Visit the Customer Portal

File a case, view your open cases, get in touch.

Launch Portal