The official Rapid 7 Nexpose Guide seemed unfortunately to be short of a few details (Rapid 7 NeXpose Event Source Configuration Guide ) so I described how I integrated the Windows version of Rapid 7 Nexpose into Security Analytics.
I was using Nexpose 5.17.1 on a Windows 2008 Server.
The screenshots have been taken from Security Analytics 10.6.1
This document assumes that the reader is familiar with installing the SFTP Agent and setting it up.
The parser makes use of the vuln_ref reference key so make sure that in your table-map-custom.xml file you have the line
<mapping envisionName="vuln_ref" nwName="vuln.ref" flags="None" format="Text"/>
If everything is correctly setup then you should see a new rapid7 device type, with Threat Category, Threat Description and also the Vuln Ref key populated with CVE numbers.
Note by default, the Script Nexpose.bat will leave the reports reports.csv.gz in the original directory. If you want them to be deleted after processing then add the line highlighted in bold below to the c:\nexposescripts\nexpose.bat
cscript nexpose-audits.vbs
cscript nexpose-authevents.vbs
cscript nexpose-nscevents.vbs
cd "C:\Program Files\rapid7\nexpose\nsc\htroot\reports"
for /R %%f in (report.csv.gz) do "c:\program files\7-Zip\7z.exe" e -y "%%f"
for /R %%f in (report.csv.gz) do del /q "%%f"
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.