Skip to main content

Rapid7 Nexpose Data Warehouse

Rapid7 Nexpose is an on-premises vulnerability scanner, which allows you to export data to an external data warehouse. You can use the Rapid7 Nexpose Data Warehouse connector to bring host and security data from your data warehouse into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Rapid7 Nexpose and how to obtain that information from Rapid7. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Rapid7 Nexpose Data Warehouse from the Connector drop-down. If you cannot find the connector in the drop-down, make sure you have installed it first. You must provide the following information to authenticate Rapid7 Nexpose Data Warehouse with Brinqa:

  • Server name: The URL of your PostgreSQL server.

  • Server port: The TCP/IP port of your PostgreSQL server. The server port defaults to 5432.

  • Database name: The name of your Nexpose data warehouse database.

  • User and Password: The login credentials for the PostgreSQL Server. The user must have read access to the database.

Additional settings

The Rapid7 Nexpose Data Warehouse connector contains additional options for specific configuration:

  • Fetch size: Set the number of rows per batch during query processing. The default is 1000.

  • Use SSL: Use a SSL connection to the target database during the data import process. This ensures that all data transmitted from the warehouse is encrypted in transit.

  • Skip certificate verification: Select this option to allow for untrusted certificates.

Types of data to retrieve

The Rapid7 Nexpose Data Warehouse connector can retrieve the following types of data from the data warehouse:

Table 1: Data retrieved from Rapid7 Nexpose

Connector ObjectRequiredMaps to Data Model
HostYesHost
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

The Rapid7 Nexpose Data Warehouse connector does not currently support operation options for the types of data it retrieves.

For detailed steps on how to view the data retrieved from Rapid7 Nexpose Data Warehouse in the Brinqa Platform, see How to view your data.

Attribute mappings

Click the tabs below to view the mappings between the source and the Brinqa data model attributes.

Table 2: Host attribute mappings

Source Field NameMaps to Attribute
address.getIpAddressipAddresses, privateIpAddresses
address.getMacAddressmacAddresses
assessed_for_policiesLocal variable
assessed_for_vulnerabilitiesLocal variable
assetIduid
associatedValues.assetGroups.getLocal variable
associatedValues.tags.gettags
categoriescategories
credential_statusLocal variable
descriptiondescription
hostnamehostnames, publicDnsName, privateDnsName
instance idcloudInstanceId
last_assessed_for_vulnerabilitieslastSeen, lastScanned
namename
os_architectureLocal variable
os_cpeLocal variable
os_descriptionos
os_familyLocal variable
os_nameLocal variable
os_systemLocal variable
os_typeLocal variable
os_vendorLocal variable
os_versionLocal variable
publicIpAddress.getpublicIpAddress
risk_modifierLocal variable
sitesLocal variable
statusstatus
unique identifiersLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Changelog

The Rapid7 Nexpose Data Warehouse connector has undergone the following changes:

3.3.3

  • No change.

3.0.16

  • Changed the VULNERABILITY_ID attribute type on the Vulnerability Definition object from string to integer.

3.0.15

  • Changed the ASSESSED_FOR_VULNERABILITIES attribute type on the Host object from string to boolean.

3.0.14

  • Fixed an issue where the CREDENTIAL_STATUS attribute on the Host object was incorrectly set to the boolean type.

3.0.12

  • Fixed an issue where the connector was not pulling in data.

3.0.11

  • Updated to fetch azure_vmid as the Instance ID for Azure assets.

3.0.10

  • Added a 'fixed' status if the remediation_date is set in the source.

3.0.9

  • Added a CATEGORIES attribute in the Vulnerability object to store information about the vulnerability type.

3.0.8

  • Enhanced to normalize hostnames retrieved from Rapid7 Nexpose Data Warehouse.

3.0.7

  • Segregated local process files to avoid conflicts between multiple syncs.

3.0.0