Exploitable Data Scenario Rule Conditions

This topic describes the conditions that you can use to create rules and the default rules provided for the exploitable data scenarios.

Exploitable data includes the following scenarios:

Each scenario has its own conditions and default rules.

Open ports

Open ports - conditions The following table describes the conditions you can use to create rules for the open ports scenario.

FeatureOperatorValuesDescription
Detection algorithmidentified/did not identifyA company IP address with open portsDid the Rapid7 internal algorithm identify a problematic open port that should be closed?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
IP addressin/not inIP address listWhich IP addresses should be searched for open ports? Some IP addresses are more important than others.
Open port numberin/not inPort list/Port rangeWhich port numbers should be checked for being open?
Protocol namein/not inProtocol listDoes the identified protocol type match a selected protocol?

Open ports - default rule

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Open Ports - Default Detection RuleA problematic open port on a company IP address was detected by the internal detection algorithmEnabled

Email security

Email security - conditions The following table describes the conditions you can use to create rules for the email security scenario.

FeatureOperatorValuesDescription
Detection algorithmidentified/did not identifyA problem in a DMARC/SPF recordDid the Rapid7 internal algorithm identify a problem with email security?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Domainin/not in"Domain name list"Is the problem found on a domain from a configured list of domains?
Failed testsin/not inDropdownDid the domain fail a specific test?

Email security - default rule

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Email Security Validation - Default Detection RuleA server with DMARC/SPF problem was detected by the internal Rapid7 detection algorithm.Enabled

Certificate issues

Certificate issues - conditions The following table describes the conditions you can use to create rules for the certificate issues scenario.

FeatureOperatorValuesDescription
Detection algorithmidentified/did not identifyA problem in an SSL certificateDid the Rapid7 internal algorithm identify a problem with an SSL certificate?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Certificate days until expiration=, !=, >=, <=, >, <Does the certificate expire within a specified time?
Certificate statusin/not indropdownDid the certificate scan fail specified tests? Or is it valid?
Issueris/is not"Named"Was the certificate issued by a specific issuer/self-signed?
Linked domainsin/not in"Domain name"Is the affected domain in a list of domains?
Matched assetin/not inDomainsDoes the threat contain a matched Domain asset?
Matched assetin/not inLogin pages​Does the threat contain a matched Login page asset?

Certificate issue - default rule The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Certificate Issues - Default Detection RuleA company certificate with a problem was detected by the internal Rapid7 detection algorithm.Disabled

SSL issues

SSL issues - conditions The following table describes the conditions you can use to create rules for the SSL issues scenario.

FeatureOperatorValuesDescription
Detection algorithmidentified/did not identifya server with SSL issuesDid the Rapid7 internal algorithm identify a server with SSL issues?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Detected issue typesin/not indropdownDid the domain scan detect specific types of issues?
Detected issuesin/not indropdownDid the domain scan fail specific issues?
IP addressin/not in"IP list"Is the IP address in a list of IP addresses?
Linked domainin/not in"Domain name"Is the domain in a list of domains?
Linked domaincontains/doesn't contain"valid website"Do any of the domains linked to the server host websites?
Matched assetin/not inDomainsDoes the threat contain a matched Domain asset?
Matched assetin/not inLogin pages​Does the threat contain a matched Login page asset?

SSL issues - default rule

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
SSL Issues - Default Detection RuleThe following conditions were all detected  by the internal Rapid7 detection algorithm:- A company server has an SSL problem. - The server IP address was updated in the past 14 days.- In the most recent scan, at least one linked domain hosts a website.Disabled

Exposed services

Exposed services - conditions The following table describes the conditions you can use to create rules for the exposed services scenario.

FeatureOperatorValuesDescription
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Months since page was last updated=, !=, >=, <=, >, <Was the page last updated in a specific month?
Pagecontains/does not contain"Contact support options"Does the page contain words that can indicate an option to contact a support team, such as "chat,", "contact us," etc.? Contact availability usually indicates a public website.
Pagecontains/does not contain"Indication of limited access options"Does the page contain words that can indicate that access to the page is restricted or limited, such as "'authorized users only," "sign in," etc.?
Pagecontains/does not contain"Registration options"Does the page contains words that can indicate registration options such as "subscribe," "sign-up," etc.? The presence of registration options usually indicates a public website.
Pagecontains/does not contain"Login options"Does the page contain words that indicate it has login options, such as "forgot password", etc.?
Pagecontains/does not contain"Promotional content"Does the page contain words that can indicate that the content of the page is promotional, such as "free trial" etc.?
Pagecontains/does not contain"Social media links"Does the page contain links to official social media pages such as Facebook, Twitter, etc.?
Pagecontains/does not contain"Ads"Does the page contain links to advertisements?
Pageis/is not"Monitored by Google Analytics"Is the page monitored by analytic tools, such as Google Analytics?
Pageis/is not"A login page"Does the page have a login form?
Page typein/not in"Choose page type"Does the page type match a selected page type?
Page URLcontains/does not contain"indication of development system/development environment/ internal platform/internal service"Does the page URL contain an indication of a development system/development environment/ internal platform/ internal service, such as Jira, Dev, etc.?
Page URLcontains/does not contain"regex list"Does the page URL contain a specific pattern (can be expressed as a regular expression)?
Years since copyright date=, !=, >=, <=, >, <Is the page copyright from a specific year?

Exposed services - default rule The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Exposed Services - Default Detection RuleAn exposed internal service was detected by the internal Rapid7 detection algorithm.Enabled

Vulnerabilities

Vulnerabilities - conditions The following table describes the conditions you can use to create rules for the Vulnerabilities scenario.

ConditionOperatorsValuesDescription
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
CVE IDin/not inSelect a CVE valueDoes the CVE ID match a selected number?
Use this to follow a specific CVE.
CVSS scorein/not inSelect a CVSS ratingDoes a CVE match the selected CVSS score (Critical, High, Medium, Low, None)?

You can use temporary placeholder to assign a different alert severity than the current CVSS score.
Exploitis/is notSelect Yes (explot is available) or No (no exploit available)Does the CVE have an available exploit?
Rapid7 scorein/not inDoes a CVE match the Rapid7 score (Critical, High, Medium, Low)?
You can use temporary placeholder to assign a different alert severity than the current Rapid7 CVE score.
NVD days since published=, !=, >=, <=, >, <Was the CVE was published on a certain date.
Your VRA probably contains many CVEs, and you may only want to create alerts for new ones. You can set this value to <=1, so only new CVEs will be elevated to alerts.
Productin/not inSelect a productDoes the product of the CVE match the specified products.
For example, only create alerts on products that are most critical to your operations.

Vulnerabilities - default rule The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Vulnerabilities - Default Detection RuleA vulnerability was detected by the internal Rapid7 detection algorithm.Enabled

For more information about using the Alert Profiler for vulnerabilities, see Vulnerability Alerts.