Rapid7 Insight VM (On-Prem) Connector

Rapid7 InsightVM solution discovers risks across all your endpoints, cloud, and virtualized infrastructure. Tenable Exposure Management integrates with Rapid7 InsightVM to ingest assets and their associated vulnerabilities from your on-premises environment. This connector is based on scheduled reports and requires you to create dedicated report templates within the Rapid7 console. During each sync, the connector retrieves vulnerability and asset data from these reports to provide visibility into risks across your endpoints, virtual machines, and infrastructure. The integration helps you prioritize vulnerabilities, track remediation efforts, and monitor your security posture directly within Exposure Management.

Tip: For more information on how third-party integrations work, see Connectors.

Connector Details

Details Description

Supported products

Rapid7 Insight VM (On-Prem)

Important! This guide describes the InsightVM Application Programming Interface (API) version 3. The API follows the Representational State Transfer (REST) design pattern and, unless stated otherwise, uses JSON (application/json) as the default request and response format. The API is hypermedia-friendly and implements Hypermedia as the Engine of Application State (HATEOAS) principles. All API requests must be made over HTTPS to the Security Console.

Category

Endpoint Security

Ingested data

Assets and Findings

Ingested Asset Classes

Devices

Integration type

UNI directional (data is transferred from the Connector to Tenable Exposure Management in one direction)

Supported version and type

SaaS (latest)

Prerequisites and User Permissions

Before you begin configuring the connector, make sure to:

  • Identify your Rapid7 Server URL (e.g., https://<your-server-hostname>:<port>).

  • Review the System Requirements for your deployment environment.

    Important! The performance of the connector, including synchronization times, depends on the system configuration of the Rapid7 Security Console. Ensure that your environment meets the system requirements to avoid degraded performance or sync failures.

Add a Connector

To add a new connector:

  1. In the left navigation menu, click Connectors.

    The Connectors page appears.

  2. In the upper-right corner, click Add new connector.

    The Connector Library appears.

  3. In the search box, type the name of the connector.

  4. On the tile for the connector, click Connect.

    The connector configuration options appear.

Configure the Rapid7 Insight VM Connector

  1. (Optional) In the Connector's Name text box, type a descriptive name for the connector.

  2. (Optional) To use a preconfigured on-prem connector to connect to this connector, from the Gateway drop-down, select the on-prem connector you want to use for the connector. Otherwise, select Don't use gateway.

    Note: For information about configuring a gateway, see Tenable On-Prem Connector.
  3. In the Server URL text box, type the server URL for your Rapid7 instance.

  4. In the Username and Password text boxes, type your Rapid7 client credentials.

  5. In the Data pulling configuration section, you can configure dynamic settings specific to the connector.

    • In the Asset Retention text box, type the number of days after which you want assets to be removed from Tenable Exposure Management. If an asset has not been detected or updated within the specified number of days, it is automatically removed from the application, ensuring your asset inventory is current and relevant.

      Tip: For more information, see Asset Retention.
  6. In the Test connectivity section, click the Test Connectivity button to verify that Tenable Exposure Management can connect to your connector instance.

    • A successful connectivity test confirms that the platform can connect to the connector instance. It does not, however, guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.

    • If the connectivity test fails, an error message with details about the issue appears. Click Show tests for more information about the exact error.

  7. In the Connector scheduling section, configure the time and day(s) on which you want connector syncs to occur.

    Tip: For more information, see Connector Scheduling.
  8. Click Create. Tenable Exposure Management begins syncing the connector. The sync can take some time to complete.

  9. To confirm the sync is complete, do the following:

Rapid7 Insight VM in Tenable Exposure Management

Locate Connector Assets in Tenable Exposure Management

As the connector discovers assets, Tenable Exposure Management ingests those devices for reporting.

To view assets by connector:

  1. In Tenable Exposure Management, navigate to the Assets page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view assets.

    The asset list updates to show only assets from the selected connector.

  3. Click on any asset to view Asset Details.

Locate Connector Weaknesses in Tenable Exposure Management

As the connector discovers weaknesses, Tenable Exposure Management ingests those weaknesses for reporting.

To view weaknesses by connector: 

  1. In Tenable Exposure Management, navigate to the Weaknesses page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view weaknesses.

    The weaknesses list updates to show only weaknesses from the selected connector.

  3. Click on any weakness to view Weakness Details.

Locate Connector Findings in Tenable Exposure Management

As the connector discovers individual findings, Tenable Exposure Management ingests those findings for reporting.

To view findings by connector:

  1. In Tenable Exposure Management, navigate to the Findings page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view findings

    The findings list updates to show only assets from the selected connector.

  3. Click on any asset to view Finding Details.

Data Mapping

Exposure Management integrates with the connector via API to retrieve relevant weakness and asset data, which is then mapped into the Exposure Management system. The following tables outline how fields and their values are mapped from the connector to Exposure Management.

Device Mapping

Tenable Exposure Management UI Field

Rapid7 InsightVM (On-Prem) field

Unique Identifier id
Asset - Name

hostName or Asset Names

Note: In rare cases where the hostname is not available, the IP address is used as a fallback.

Asset - Operating Systems os or osFingerprint.vendor/Asset OS Name
Asset - Host Fully Qualified DNS host_name

Asset - IPv4 Adresses

Asset - IPv6 Adresses

ip or Asset IP Address
Asset - Mac Address mac or address.mac or Asset MAC AddressesAsset MAC Addresses
Asset - First Observation Date history[0].date
Asset - Last Observed At history[-1].date
Asset - Host Fully Qualified DNS hostName or Asset Names

Asset - External Tags

Custom Tag

Site Name

Asset Owner

Asset Criticality

Site Importance

Asset Location

Asset Custom Attributes

osFingerprint.os/os

Asset OS Family/osFingerprint.family

Finding Mapping

Tenable Exposure Management UI Field

Rapid7 InsightVM (On-Prem) field

Unique Identifier Vulnerability ID + Service Protocol + Service Port
Finding Name Vulnerability Title
CVEs Vulnerability CVE IDs
Severity Driver Vulnerability CVSSv3 Score
Description Vulnerability Description
Finding Custom Attributes

Vulnerability Proof

Service Port

Service Protocol

Vulnerability CVSSv3 Vector

First Seen Vulnerable Since
Last seen (Observed) Vulnerability Test Date

Finding Status Mapping

Tenable Exposure Management Status

Rapid7 InsightVM (On-Prem) Status / Condition

Active

All ingested findings are considered active

Fixed

Findings no longer appear in the scan findings

Finding Severity Mapping

Tenable Exposure Management Severity

Rapid7 InsightVM (On-Prem) Score

Critical

CVSS v3: 9.0 - 10.0

High

CVSS v3: 7.0 - 8.9

Medium

CVSS v3: 4.0 - 6.9

Low

CVSS v3: 1-3.9

None

CVSS v3: 0

Note:For Rapid7 Insight VM On-Prem, Tenable uses the Vulnerability CVSSv3 Score field to determine severity.

Status Update Mechanisms

Every day, Tenable Exposure Management syncs with the vendor's platform to receive updates on existing findings and assets and to retrieve new ones (if any were added).

The table below describes how the status update mechanism works in the connector for findings and assets ingested into Tenable Exposure Management.

Update Type in Exposure Management

Mechanism (When?)

Archiving Assets

- Asset not seen for X days according to Last Seen. See Asset Retention

Change of a Finding status from "Active" to "Fixed"

- Finding no longer appears in the scan findings

Note: Updates on the vendor side are reflected in Tenable Exposure Management only when the next scheduled connector sync time is complete (once a day).

Uniqueness Criteria

Tenable Exposure Management uses defined uniqueness criteria to determine whether an ingested asset or finding should be recognized as a distinct record. These criteria help define how assets and findings are identified and counted from each connector.

Tip:  Read all about Third-Party Data Deduplication in Tenable Exposure Management .

The uniqueness criteria for this connector are as follows:

Data

Uniqueness Criteria

Asset

id

Finding

Vulnerability ID + Service Protocol + Service Port
Detection Vulnerability ID
Solution Vulnerability Solution

API Endpoints in Use

API: V3

API

Use in Tenable Exposure Management

Required Permissions

GET #{{ server_url }}/api/3/sites

-

Allow listing sites

POST #{{ server_url }}/api/3/report

-

Allow create report

POST #{{ server_url }}/api/3/reports/#{{ report_id }}/generate

-

Allow generating domains

GET#{{ server_url }}/api/3/reports/#{{ report_id }}/history/#{{ report_instance_id }}/output

Assets, Findings, Solutions

Allow read report

GET {{ server_url }}/api/3/tags Asset tags -

GET #{{ server_url }}/api/3/asset_groups

Asset tags

Allow listing asset_groups

GET server_url }}/api/3/asset_groups/#{{ asset_group_id }}/assets

Asset tags

Allow listing asset_groups assets

GET {{ server_url }}/api/3/vulnerabilities

Findings (Only on report_with_api variant)

-

Support Limitations and Expected Behavior

This section outlines any irregularities, expected behaviors, or limitations related to integration of the connector and Exposure Management. It also highlights details about ingested and non-ingested data to clarify data handling and functionality within this integration.

Data Validation

This section shows how to validate and compare data between Tenable Exposure Management and the Rapid7 Insight VM On-Prem platform.

Asset Data Validation

Objective: Ensure the number of scanned virtual machines (VMs) in Rapid7 Insight VM On-Prem aligns with the assets (devices) displayed in Tenable Exposure Management.

In Rapid7 Insight VM On-Prem:

  1. In the left menu, click Assets

    The asset table appears.

  2. The asset table displays all scanned virtual machines.

    The total number of assets will appear on the bottom of the screen.

In Tenable Exposure Management:

  1. Locate your connector assets.

  2. Compare the total number of assets between Rapid7 Insight VM On-Prem and Tenable Exposure Management.

Expected outcome: The number of visible assets in Exposure Management will match the number of VM assets in Rapid7.

If an asset is not visible in Exposure Management, check the following conditions:

  • Archived based on the last observed date (last seen).

    Tip: To learn more on how assets and findings change status, see Status Update Mechanisms.

Finding Data Validation

Objective: Ensure the number of vulnerabilities associated with assets in Rapid7 InsightVM aligns with the findings displayed in Tenable Exposure Management.

In Rapid7 InsightVM:

You can view vulnerabilities (findings) in Rapid7 in one of the following ways:

  • Through the Assets view: 

    1. Navigate to Assets.

      In the Assets table view, each asset row displays a count of associated vulnerabilities.


    2. To get the findings total, sum the total number of vulnerabilities across all assets.

  • Through the Vulnerabilities view: 

    1. Navigate to Vulnerabilities.

    2. Scroll down to view the vulnerabilities table. This table is aggregated by unique vulnerability name and displays the number of findings for each vulnerability.

In Tenable Exposure Management:

  1. Locate your connector findings.

  2. Compare the total number of findings between Rapid7 Insight VM On-Prem and Tenable Exposure Management.

Expected outcome: The total numbers returned in Rapid7 Inisght VM On-Prem and Exposure Management should match.

If a finding is missing from Exposure Management or no longer active, check the following conditions:

  • The finding no longer appears in the scan findings.

  • The finding is marked as Fixed and appears under the Fixed state on the Findings screen.

  • The finding no longer appears because its related asset was archived.

    Tip: To learn more on how assets and findings are archived or change status, see Status Update Mechanisms.