Search Results
Enable SP-Initiated User Login | Threat Command Documentation
IdP-initiated login, through the SSO provider. ... SP-initiated login, through the Threat Command Log In with SSO option. ... To enable either of these login options, you must configure SAML single...
Integrate a LogRhythm SIEM On-Premises Device | Threat Command Documentation
Add the device to the Threat Command virtual appliance. ... Configure the device to pull IOCs from Threat Command. ... The procedure to add the device to Threat Command is different depending on th...
Common Installation Questions | AppSpider Documentation
Can I install AppSpider Pro on a different machine using the same license key? ... How do I fix an invalid license error or reset my license? ... Is there a major difference between using the diffe...
Configure Okta SSO | Threat Command Documentation
In addition, you can enable SP-initiated SSO and user provisioning with the SAML Just In Time (JIT) method. ... User provisioning with JIT enables users to register new users to Threat Command dire...
Integrate a Fortinet FortiSIEM On-Premises Device | Threat Command Documentation
You can create a policy to block those IOCs. ... To integrate the device, perform these steps (described in the following sections): ... Add the device to the Threat Command virtual appliance. ... ...
CVE Details | Threat Command Documentation
CVE details are displayed in the following tabs: ... You can filter to see exploits. ... This tab is shown only if asset collection is enabled in the Qualys or Tenable.io integration. ... Rapid7 en...
Scanning Questions | AppSpider Documentation
What order does AppSpider use to scan my URLs? ... Scanning Questions ... What order does AppSpider use to scan my URLs? ... Any URLs that are on the on the lower part of the crawler restrictions p...
Configure PingOne SSO | Threat Command Documentation
Download the Ping certificate that is needed for the Threat Command. ... Before you begin, ensure that you can access the Ping account as an administrator. ... To download the Ping SSO certificate:
Integrate On-Premises Devices | Threat Command Documentation
Docs Menu ... Integrate On-Premises Devices ... This section describes how to integrate on-premises security devices with the Threat Command virtual appliance and Threat Command. ... ArcSight REST ...
Vulnerability Risk Analyzer | Threat Command Documentation
The Threat Command Vulnerability Risk Analyzer module provides an enriched view of Common Vulnerabilities and Exposures (CVEs) in the Vulnerabilities page. ... Using Threat Command intelligence dat...
Module Configuration File Reference | AppSpider Documentation
The name of the module as it is presented to the user. ... ModuleDescription ... The description of the module that will be shown to the user. ... The location of the module binary code. ... Passiv...
Configure Generic SAML SSO | Threat Command Documentation
If your SSO provider does not have a formal Rapid7 Threat Command app, you can support SAML SSO authentication independently using a custom/local app. ... In addition, you can enable SP-initiated S...
Pull IOCs from the Rapid7 TAXII server | Threat Command Documentation
You can pull enriched IOCs into third-party security devices using the IntSights TAXII server (STIX/TAXII v1.1 and 2.0 are supported). ... The TAXII server is defined in Threat Command as an extern...
View Investigation Map and Overview | Threat Command Documentation
The Investigation Map shows a graphical representation of the searched term. ... This topic describes the Map and the Overview panel. ... The explanation that follows is based on the following exam...
MISP Cloud Device | Threat Command Documentation
IOCs are pulled, together with the following Rapid7 enrichment data: ... You must first add the device to Threat Command and then configure the device to pull IOCs from Threat Command. ... You have...
ServiceNow ITSM Installation | Threat Command Documentation
Describe how to install and configure the external app, ServiceNow ISTM. ... Before you can use the external app with Rapid7 Threat Command you need to add it. ... Add external app ... Before using...
Investigation | Threat Command Documentation
The Investigation module enables you to perform an in-depth investigation into known or suspicious threat actors, malware, CVEs, or indicators of compromise (IOCs). ... The module presents you with...
Integrate a Microsoft Azure Sentinel Cloud Device | Threat Command Documentation
You must first add the device to Threat Command and then configure the device to pull IOCs from Threat Command. ... After the Azure Sentinel device is integrated, you can View dashboards. ... When ...
ServiceNow ITSM App | Threat Command Documentation
ServiceNow ITSM App ... This application populates Alerts in Custom Table and Create or Update Incidents in ServiceNow if criteria are matched. ... Application features ... The main features of the...
Scan Config XML Breakout | AppSpider Documentation
Below is a sample of an XML config. ... This allows a user to granularly set each setting within a config when adding, updating or submitting a config to either the AppSpider Enterprise REST API or...