NeXpose Release Feb 5, 2010

Document created by techeditor on Apr 7, 2011
Version 1Show Document
  • View in full screen mode

This Rapid7 NeXpose™ release introduces Exploit Exposure™, which provides greater visibility into your organization’s security threats and enables better prioritization of your remediation efforts. In addition, the file search capability has been improved.


NeXpose Exploit Exposure vulnerability prioritization feature

  • The new NeXpose Exploit Exposure feature in the NeXpose Security Console (NSC) Web interface now gives information about the exposure level that discovered vulnerabilities represent to critical protected business data. Access to Exploit Exposure information improves your ability to manage business risk by showing you whether or not a known exploit exists, and the skill rating needed by a malicious attacker to exploit the exposure. This allows you to focus your remediation resources on the most critical, exploitable security gaps identified in your IT infrastructure. When an exploit exists in the Metasploit exploit database, the M-exploitable™ icon is displayed, along with a link that gives you the option to safely view detailed exploit information.


Enhanced searching to ensure files stored on target systems comply with security and privacy policies

  • The NeXpose file searching process has been enhanced to scan for specific file names on target systems to help you verify compliance with corporate security and privacy policies. NeXpose does not store the file content. Scan times will vary depending on the number of files on target systems. The more files found, the longer the required scan window.