Products
Insight Platform Solutions
XDR & SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
Vulnerability Management
INSIGHTVM
Dynamic Application Security Testing
INSIGHTAPPSEC
Orchestration & Automation (SOAR)
INSIGHTCONNECT
Cloud Security
INSIGHTCLOUDSEC
More Solutions
Penetration Testing
METASPLOIT
On-Prem Vulnerability Management
NEXPOSE
Digital Forensics and Incident Response (DFIR)
Velociraptor
Explore Offer
Explore offer
Services
MANAGED SERVICES
Detection and Response
24/7 MONITORING & REMEDIATION FROM MDR EXPERTS
Vulnerability Management
PERFECTLY OPTIMIZED RISK ASSESSMENT
Application Security
SCAN MANAGEMENT & VULNERABILITY VALIDATION
OTHER SERVICES
Security Advisory Services
PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES
Product Consulting
QUICK-START & CONFIGURATION
Training & Certification
SKILLS & ADVANCEMENT
Penetration Services
TEST YOUR DEFENSES IN REAL-TIME
IoT Security Testing
SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD
Premium Support
PRIORITY HELP & FASTER SOLUTIONS
Support & Resources
SUPPORT
Support Portal
CONTACT CUSTOMER SUPPORT
Product Documentation
EXPLORE PRODUCT GUIDES
Release Notes
DISCOVER THE LATEST PRODUCT UPDATES
Contact Us
TALK TO SALES
RESOURCES
Fundamentals
FOUNDATIONAL SECURITY KNOWLEDGE
Blog
THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE
Resources Library
E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS
Extensions Library
PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY
Partners
RAPID7 PARTNER ECOSYSTEM
Webcasts & Events
UPCOMING OPPORTUNITIES TO CONNECT WITH US
Vulnerability & Exploit Database
SEARCH THE LATEST SECURITY RESEARCH
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
RESEARCH
Sign In
Documentation
InsightIDR
AppSpider
Insight Agent
InsightAppSec
InsightCloudSec
InsightConnect
Insight Platform
InsightIDR
Insight Network Sensor
InsightOps
InsightVM
Metasploit
Nexpose
tCell
Managed Services
Products
Insight Platform Solutions
XDR & SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
Vulnerability Management
INSIGHTVM
Dynamic Application Security Testing
INSIGHTAPPSEC
Orchestration & Automation (SOAR)
INSIGHTCONNECT
Cloud Security
INSIGHTCLOUDSEC
More Solutions
Penetration Testing
METASPLOIT
On-Prem Vulnerability Management
NEXPOSE
Digital Forensics and Incident Response (DFIR)
Velociraptor
Explore Offer
Explore offer
Services
MANAGED SERVICES
Detection and Response
24/7 MONITORING & REMEDIATION FROM MDR EXPERTS
Vulnerability Management
PERFECTLY OPTIMIZED RISK ASSESSMENT
Application Security
SCAN MANAGEMENT & VULNERABILITY VALIDATION
OTHER SERVICES
Security Advisory Services
PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES
Product Consulting
QUICK-START & CONFIGURATION
Training & Certification
SKILLS & ADVANCEMENT
Penetration Services
TEST YOUR DEFENSES IN REAL-TIME
IoT Security Testing
SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD
Premium Support
PRIORITY HELP & FASTER SOLUTIONS
Support & Resources
SUPPORT
Support Portal
CONTACT CUSTOMER SUPPORT
Product Documentation
EXPLORE PRODUCT GUIDES
Release Notes
DISCOVER THE LATEST PRODUCT UPDATES
Contact Us
TALK TO SALES
RESOURCES
Fundamentals
FOUNDATIONAL SECURITY KNOWLEDGE
Blog
THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE
Resources Library
E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS
Extensions Library
PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY
Partners
RAPID7 PARTNER ECOSYSTEM
Webcasts & Events
UPCOMING OPPORTUNITIES TO CONNECT WITH US
Vulnerability & Exploit Database
SEARCH THE LATEST SECURITY RESEARCH
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
RESEARCH
Sign In
Documentation
InsightIDR
AppSpider
Insight Agent
InsightAppSec
InsightCloudSec
InsightConnect
Insight Platform
InsightIDR
Insight Network Sensor
InsightOps
InsightVM
Metasploit
Nexpose
tCell
Managed Services
Release Notes
Docs Menu
Getting Started with InsightIDR
InsightIDR Overview
Essential | Quick Start Guide
Advanced | Quick Start Guide
Ultimate | Quick Start Guide
Setup and Deployment
System Requirements
Setting Up a Service Account
Network and Environment Audit
Core Event Sources
Log Data Collection and Storage
Data Archiving
Non-Admin Domain Controller Account
Read-Only Domain Controllers
Ports Used by InsightIDR
Collector Overview
Collector Requirements
Collector Installation and Deployment
Collector Troubleshooting
Collector Proxy Configuration
Insight Agent
Configure the Insight Agent to Send Additional Logs
Microsoft Windows Defender Antivirus
Endpoint Scan
FIM Recommendations
Other Deployment Options
Automation
Get Started with ABA Automation
Get Started with UBA and Custom Alert Automation
Alert Triggers for UBA detection rules and Custom Alerts
Insight Orchestrator Overview
Configure Connections For Automation
Automation Workflow Templates
Automation Workflows
Kill a Process
Suspend or Disable a User
Quarantine an Asset
Create a ServiceNow or JIRA Ticket
Automated Enrichment Workflows
Enrich Alert Data with Open Source Plugins
Automation Troubleshooting
Send InsightConnect Events to InsightIDR
How To
Manage Credentials
Search Your Logs
Transform Logs to Universal Event Format
Delete and Reinstall a Collector
Deploy Deception Technology
Integrate Other Rapid7 Products
Integrate Metasploit
Integrate InsightVM
Manage Event Sources
Edit Event Sources
Copy Event Sources to a New Collector
Export Data
Access AWS Resources with EC2 IAM Roles
Monitor Your Security Operations Activities
Concepts and Usage
Rapid7 Resource Names
Detection Rules
Modify ABA Detection Rules
Modify UBA Detection Rules
Detection Library
Alerts
Create and Manage Custom Alerts
Custom Alert Details
Custom Alerts and InsightConnect
Investigations
Create an investigation
Analyze an investigation
Schedule forensic jobs
Close an investigation
Multi-Customer Investigations
Investigate Threat Command Alerts
Assets on Your Domain
Mark an Asset as Restricted or Allow an Asset
Manage your Processes and Hashes
Exploitable Vulnerabilities
Lateral Movement
Dashboards and Reports
R7 Managed: Endpoint Visibility Validation Dashboard
Deception Technology
Honeypot
Honey Users
Honey Files
Honey Credentials
Honey Alerts
Troubleshooting Honeypots
AWS Honeypots
File Access Activity Monitoring
File Integrity Monitoring
File Integrity Monitoring for Linux
Search Logs for FIM Events
Log Search
New Log Search
Log Set Guidance
Event Types and Keys
Build a Query
Use a Search Language
Use Variables in Queries
Use Visual Search
Example Queries
Loose Search
Automatic Log Structuring
Custom Parsing Tool
Entry Inspector
Enhanced Endpoint Telemetry
Query Help
Glossary
Network Rules
Network Zones and Policies
Owned and Ignored Domains
Firewall Rules
IP Addresses
Network Traffic Analysis
InsightIDR REST API
Platform Audit Logs API
Threats
Utilize Existing Threats
Add and Manage Threats
Users and Accounts on Your Domain
Admin Accounts
Non-Expiring and Service Accounts
Shared and Linked Accounts
Watchlist and Risky Users
Account Tags
Audit Logging
Quick Actions
Data Storage and Retention FAQs
Detection Library
Overview
ABA: Rules by Threat
Agrius
Antlion
APT Groups
BAHAMUT
Balikbayan Foxes
Bax 026 of Iran
BlackOasis
Blackshadow
BlackTech
Blind Eagle
BRONZE BUTLER
CactusPete APT
Carbanak
Chamelgang
Cloud Service Activity
Cobalt Group
Cosmic Lynx
CrouchingYeti
Current Events
Dark Basin
Dark Caracal
Darkhotel
DarkHydrus
Deep Panda
Desert Falcons
Domestic Kitten
DragonOK
DustSquad
Dust Storm
Elderwood
Elephant Beetle
Energetic Bear
Epic Manchego
Evil Corp
Evilnum
FIN Groups
FunnyDream
Gallmaker
Gamaredon Group
Gaza Hacker Team
GCMAN
GhostEmperor
Gorgon Group
Greenbug
Group 5
Group 72
Hafnium
Harvester
Hexane
Hidden Lynx
Hive Ransomware
Honeybee
Indra
IronHusky
KeyBoy
KilllSomeOne
Kimsuky
Lazarus Group
Leafminer
Lebanese Cedar
Lotus Blossom
Machete
Magnat
Malsmoke
ModifiedElephant
Mofang
Molerats
Moses Staff
Muddywater
Mustang Panda
Mythic Leopard
Naikon
NEODYMIUM
Network Traffic Analysis
Night Dragon
North Korean State-Sponsored Actor
OldGremlin
Orangeworm
Patchwork
PLATINUM
Poseidon Group
Promethium
Pyxie
Rancor
RedCurl
Roaming Mantis
Rocke
RTM
Rocket Kitten
Sandworm Team
SCADAfence
Scarlet Mimic
SideCopy
Silence
Silent Librarian
SilverTerrier
Soft Cell
Sowbug
Spring Dragon APT
Stealth Falcon
Stolen Pencil
Strider
StrongPity
Suckfly
Suspicious Ingress Authentications
Suspicious Network Activity
Suspicious Network Connections
Suspicious Web Requests
SWEED
TA459
TA505
Taidoor
TeamTNT
The Mabna Hackers
The White Company
Threat Command
Threat Group-1314
Thrip
Tropic Tropper
Turbine Panda
Turla
UAC-0056
UNC1151
UNC1945
Velvet Chollima
Whitefly
Windshift
WIRTE
Wizard Spider
XDSpy
Yalishanda
ABA: Rules by Endpoint
Windows Suspicious Process
Windows Suspicious Services
Mac Suspicious Process
Linux Suspicious Process
UBA Detection Rules
Event Source Configuration
InsightIDR Event Sources
Data Collection Methods
Advanced Event Source Settings
Monitor Event Source Health
Event Source Troubleshooting
Auto Configure
Active Directory
Troubleshooting Active Directory
Advanced Malware
FireEye NX
Cloud Services
AWS CloudTrail API
AWS CloudTrail SQS
Auth0
Microsoft Office 365
Box.com
Duo Security
Cloudflare
Google Apps
Google Cloud Platform
Okta
Salesforce
Centrify SSO
Idaptive SSO
OneLogin
Microsoft Azure
Cisco AMP for Endpoints
Mimecast
Palo Alto Cortex Data Lake
Proofpoint TAP
Zoom Pro
Data Exporter
HP ArcSight
ServiceNow
Universal Webhook
Resilient Systems
Microsoft SQL Database Audit Logs
DHCP
Microsoft DHCP
Cisco IOS
Infoblox Trinzic
ISC dhcpd
DHCP Troubleshooting
DNS
Microsoft DNS
Cisco Umbrella
ISC Bind9
DNS Troubleshooting
Email & ActiveSync
OWA/ActiveSync
Firewall
Cisco Meraki
Sophos UTM
SonicWALL Firewall
Cisco ASA
Palo Alto
Check Point
Fortinet Firewall
Cato Networks
Barracuda Firewall
WatchGuard XTM
SilverPeak SD WAN
Sophos XG Firewall
Cisco FirePower Threat Defense
pfSense Firewall
Juniper Networks ScreenOS
Forcepoint Firewall
IDS
McAfee IDS
Security Onion
Snort
Cisco Firepower
Sentinel IPS
F5 Networks BIG-IP Local Traffic Manager
Network Sensor
Ingress Authentication
Zscaler LSS
LDAP
LDAP Troubleshooting
AWS Managed Microsoft AD
Universal Event Sources
Rapid7 Universal DHCP
Rapid7 Universal Antivirus
Rapid7 Universal Ingress Authentication
Rapid7 Universal VPN
Raw Data
Generic Windows Event Log
Custom Logs
InsightCloudSec
AWS SQS
NXLog
Generic Syslog
Syslog Logging
Log Aggregators
LogRhythm
Splunk
IBM QRadar
Third Party Alerts
AWS GuardDuty
Carbon Black EDR
Crowdstrike Falcon
CyberArk Vault
Cybereason
CylancePROTECT Cloud
Darktrace
Microsoft Defender ATP
Netskope
Palo Alto Networks Traps ESM
Palo Alto Networks Cortex XDR Incidents
SCADAfence
Varonis DatAdvantage
Vectra Networks
Virus Scan
MalwareBytes Endpoint Protection
Symantec Endpoint Protection
Sophos Enduser Protection
CylancePROTECT
McAfee ePO
Trend Micro OfficeScan
Sophos Central
Sophos Intercept X
BitDefender
ESET Antivirus
Kaspersky Anti-Virus
SentinelOne Endpoint Detection and Response
Trend Micro Deep Security
Carbon Black Cloud
Trend Micro Apex One
Palo Alto Traps TMS
VPN
NetScaler VPN
Pulse Connect Secure
OpenVPN
Cisco ACS
Cisco ISE
Microsoft IAS (RADIUS)
Microsoft Remote Web Access
Barracuda SSL VPN
Web Proxy
Blue Coat Proxy
Barracuda Web Security Gateway
Sophos Secure Web Gateway
Websense
Zscaler NSS
McAfee Web Gateway
Administration
Monthly Data Usage
Browser Settings
Email Notifications
User Management
Single Sign-On
Release Notes
InsightIDR release notes
Support
Contact the Rapid7 Support team
Share an idea with Rapid7
Getting Started with InsightIDR
InsightIDR Overview
Essential | Quick Start Guide
Advanced | Quick Start Guide
Ultimate | Quick Start Guide
Setup and Deployment
System Requirements
Setting Up a Service Account
Network and Environment Audit
Core Event Sources
Log Data Collection and Storage
Data Archiving
Non-Admin Domain Controller Account
Read-Only Domain Controllers
Ports Used by InsightIDR
Collector Overview
Collector Requirements
Collector Installation and Deployment
Collector Troubleshooting
Collector Proxy Configuration
Insight Agent
Configure the Insight Agent to Send Additional Logs
Microsoft Windows Defender Antivirus
Endpoint Scan
FIM Recommendations
Other Deployment Options
Automation
Get Started with ABA Automation
Get Started with UBA and Custom Alert Automation
Alert Triggers for UBA detection rules and Custom Alerts
Insight Orchestrator Overview
Configure Connections For Automation
Automation Workflow Templates
Automation Workflows
Kill a Process
Suspend or Disable a User
Quarantine an Asset
Create a ServiceNow or JIRA Ticket
Automated Enrichment Workflows
Enrich Alert Data with Open Source Plugins
Automation Troubleshooting
Send InsightConnect Events to InsightIDR
How To
Manage Credentials
Search Your Logs
Transform Logs to Universal Event Format
Delete and Reinstall a Collector
Deploy Deception Technology
Integrate Other Rapid7 Products
Integrate Metasploit
Integrate InsightVM
Manage Event Sources
Edit Event Sources
Copy Event Sources to a New Collector
Export Data
Access AWS Resources with EC2 IAM Roles
Monitor Your Security Operations Activities
Concepts and Usage
Rapid7 Resource Names
Detection Rules
Modify ABA Detection Rules
Modify UBA Detection Rules
Detection Library
Alerts
Create and Manage Custom Alerts
Custom Alert Details
Custom Alerts and InsightConnect
Investigations
Create an investigation
Analyze an investigation
Schedule forensic jobs
Close an investigation
Multi-Customer Investigations
Investigate Threat Command Alerts
Assets on Your Domain
Mark an Asset as Restricted or Allow an Asset
Manage your Processes and Hashes
Exploitable Vulnerabilities
Lateral Movement
Dashboards and Reports
R7 Managed: Endpoint Visibility Validation Dashboard
Deception Technology
Honeypot
Honey Users
Honey Files
Honey Credentials
Honey Alerts
Troubleshooting Honeypots
AWS Honeypots
File Access Activity Monitoring
File Integrity Monitoring
File Integrity Monitoring for Linux
Search Logs for FIM Events
Log Search
New Log Search
Log Set Guidance
Event Types and Keys
Build a Query
Use a Search Language
Use Variables in Queries
Use Visual Search
Example Queries
Loose Search
Automatic Log Structuring
Custom Parsing Tool
Entry Inspector
Enhanced Endpoint Telemetry
Query Help
Glossary
Network Rules
Network Zones and Policies
Owned and Ignored Domains
Firewall Rules
IP Addresses
Network Traffic Analysis
InsightIDR REST API
Platform Audit Logs API
Threats
Utilize Existing Threats
Add and Manage Threats
Users and Accounts on Your Domain
Admin Accounts
Non-Expiring and Service Accounts
Shared and Linked Accounts
Watchlist and Risky Users
Account Tags
Audit Logging
Quick Actions
Data Storage and Retention FAQs
Detection Library
Overview
ABA: Rules by Threat
Agrius
Antlion
APT Groups
BAHAMUT
Balikbayan Foxes
Bax 026 of Iran
BlackOasis
Blackshadow
BlackTech
Blind Eagle
BRONZE BUTLER
CactusPete APT
Carbanak
Chamelgang
Cloud Service Activity
Cobalt Group
Cosmic Lynx
CrouchingYeti
Current Events
Dark Basin
Dark Caracal
Darkhotel
DarkHydrus
Deep Panda
Desert Falcons
Domestic Kitten
DragonOK
DustSquad
Dust Storm
Elderwood
Elephant Beetle
Energetic Bear
Epic Manchego
Evil Corp
Evilnum
FIN Groups
FunnyDream
Gallmaker
Gamaredon Group
Gaza Hacker Team
GCMAN
GhostEmperor
Gorgon Group
Greenbug
Group 5
Group 72
Hafnium
Harvester
Hexane
Hidden Lynx
Hive Ransomware
Honeybee
Indra
IronHusky
KeyBoy
KilllSomeOne
Kimsuky
Lazarus Group
Leafminer
Lebanese Cedar
Lotus Blossom
Machete
Magnat
Malsmoke
ModifiedElephant
Mofang
Molerats
Moses Staff
Muddywater
Mustang Panda
Mythic Leopard
Naikon
NEODYMIUM
Network Traffic Analysis
Night Dragon
North Korean State-Sponsored Actor
OldGremlin
Orangeworm
Patchwork
PLATINUM
Poseidon Group
Promethium
Pyxie
Rancor
RedCurl
Roaming Mantis
Rocke
RTM
Rocket Kitten
Sandworm Team
SCADAfence
Scarlet Mimic
SideCopy
Silence
Silent Librarian
SilverTerrier
Soft Cell
Sowbug
Spring Dragon APT
Stealth Falcon
Stolen Pencil
Strider
StrongPity
Suckfly
Suspicious Ingress Authentications
Suspicious Network Activity
Suspicious Network Connections
Suspicious Web Requests
SWEED
TA459
TA505
Taidoor
TeamTNT
The Mabna Hackers
The White Company
Threat Command
Threat Group-1314
Thrip
Tropic Tropper
Turbine Panda
Turla
UAC-0056
UNC1151
UNC1945
Velvet Chollima
Whitefly
Windshift
WIRTE
Wizard Spider
XDSpy
Yalishanda
ABA: Rules by Endpoint
Windows Suspicious Process
Windows Suspicious Services
Mac Suspicious Process
Linux Suspicious Process
UBA Detection Rules
Event Source Configuration
InsightIDR Event Sources
Data Collection Methods
Advanced Event Source Settings
Monitor Event Source Health
Event Source Troubleshooting
Auto Configure
Active Directory
Troubleshooting Active Directory
Advanced Malware
FireEye NX
Cloud Services
AWS CloudTrail API
AWS CloudTrail SQS
Auth0
Microsoft Office 365
Box.com
Duo Security
Cloudflare
Google Apps
Google Cloud Platform
Okta
Salesforce
Centrify SSO
Idaptive SSO
OneLogin
Microsoft Azure
Cisco AMP for Endpoints
Mimecast
Palo Alto Cortex Data Lake
Proofpoint TAP
Zoom Pro
Data Exporter
HP ArcSight
ServiceNow
Universal Webhook
Resilient Systems
Microsoft SQL Database Audit Logs
DHCP
Microsoft DHCP
Cisco IOS
Infoblox Trinzic
ISC dhcpd
DHCP Troubleshooting
DNS
Microsoft DNS
Cisco Umbrella
ISC Bind9
DNS Troubleshooting
Email & ActiveSync
OWA/ActiveSync
Firewall
Cisco Meraki
Sophos UTM
SonicWALL Firewall
Cisco ASA
Palo Alto
Check Point
Fortinet Firewall
Cato Networks
Barracuda Firewall
WatchGuard XTM
SilverPeak SD WAN
Sophos XG Firewall
Cisco FirePower Threat Defense
pfSense Firewall
Juniper Networks ScreenOS
Forcepoint Firewall
IDS
McAfee IDS
Security Onion
Snort
Cisco Firepower
Sentinel IPS
F5 Networks BIG-IP Local Traffic Manager
Network Sensor
Ingress Authentication
Zscaler LSS
LDAP
LDAP Troubleshooting
AWS Managed Microsoft AD
Universal Event Sources
Rapid7 Universal DHCP
Rapid7 Universal Antivirus
Rapid7 Universal Ingress Authentication
Rapid7 Universal VPN
Raw Data
Generic Windows Event Log
Custom Logs
InsightCloudSec
AWS SQS
NXLog
Generic Syslog
Syslog Logging
Log Aggregators
LogRhythm
Splunk
IBM QRadar
Third Party Alerts
AWS GuardDuty
Carbon Black EDR
Crowdstrike Falcon
CyberArk Vault
Cybereason
CylancePROTECT Cloud
Darktrace
Microsoft Defender ATP
Netskope
Palo Alto Networks Traps ESM
Palo Alto Networks Cortex XDR Incidents
SCADAfence
Varonis DatAdvantage
Vectra Networks
Virus Scan
MalwareBytes Endpoint Protection
Symantec Endpoint Protection
Sophos Enduser Protection
CylancePROTECT
McAfee ePO
Trend Micro OfficeScan
Sophos Central
Sophos Intercept X
BitDefender
ESET Antivirus
Kaspersky Anti-Virus
SentinelOne Endpoint Detection and Response
Trend Micro Deep Security
Carbon Black Cloud
Trend Micro Apex One
Palo Alto Traps TMS
VPN
NetScaler VPN
Pulse Connect Secure
OpenVPN
Cisco ACS
Cisco ISE
Microsoft IAS (RADIUS)
Microsoft Remote Web Access
Barracuda SSL VPN
Web Proxy
Blue Coat Proxy
Barracuda Web Security Gateway
Sophos Secure Web Gateway
Websense
Zscaler NSS
McAfee Web Gateway
Administration
Monthly Data Usage
Browser Settings
Email Notifications
User Management
Single Sign-On
Release Notes
InsightIDR release notes
Support
Contact the Rapid7 Support team
Share an idea with Rapid7
Audit Logs
The Audit API allows you to retrieve Logs. Via our REST API you can perform the following actions:
Retrieve All Logs
Retrieve A Log By Id
Did this page help you?
Yes
No
Concepts and Usage
InsightIDR REST API
Concepts and Usage
Threats