/
vuln.rapid7

vuln.rapid7

Introduction

The tags begin with vuln.rapid7 identifies events generated by Rapid7.

Valid tags and data tables

The full tag must have four levels. The first two are fixed as vuln.rapid7. The third level identifies the type of events sent. The fourth level identifies the event subtype.

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tags

Data tables

Product / Service

Tags

Data tables

Rapid7 InsightVM

vuln.rapid7.insightvm.access

vuln.rapid7.insightvm.access

vuln.rapid7.insightvm.assets

vuln.rapid7.insightvm.assets

vuln.rapid7.insightvm.audit

vuln.rapid7.insightvm.audit

vuln.rapid7.insightvm.auth

vuln.rapid7.insightvm.auth

vuln.rapid7.insightvm.scans

vuln.rapid7.insightvm.scans

vuln.rapid7.insightvm.sites

vuln.rapid7.insightvm.sites

vuln.rapid7.insightvm.vulnerabilities

vuln.rapid7.insightvm.vulnerabilities

vuln.rapid7.insightvm_cloud.asset

vuln.rapid7.insightvm_cloud.asset

vuln.rapid7.insightvm_cloud.scan

vuln.rapid7.insightvm_cloud.scan

vuln.rapid7.insightvm_cloud.site

vuln.rapid7.insightvm_cloud.site

vuln.rapid7.insightvm_cloud.vulnerability

vuln.rapid7.insightvm_cloud.vulnerability

Rapid7 Nexpose

vuln.rapid7.nexpose.asset

vuln.rapid7.nexpose.asset

vuln.rapid7.nexpose.vuln

vuln.rapid7.nexpose.vuln

Table structure

These are the fields displayed by these tables:

 

Related content

vuln.rapid7
vuln.rapid7
More like this
Vulnerability detection
Vulnerability detection
More like this
vuln - Vulnerability Detection
vuln - Vulnerability Detection
More like this
Rapid7 InsightVM collector
Rapid7 InsightVM collector
More like this
threatintel.discovery
threatintel.discovery
More like this
vuln.hackerone
vuln.hackerone
More like this