NeXpose Release December 20, 2010

Document created by mburstein Employee on Jun 7, 2011Last modified by mburstein Employee on Nov 1, 2011
Version 2Show Document
  • View in full screen mode

Rapid72010-12-20 product update
   Pre-release announcement


This Rapid7® NeXpose® 4.10 release features dynamic asset groups, new asset search and selection features, the display of temporal risk scores by default on new installations, performance improvements, and bug fixes.


These release notes document what's new in the next NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.


Dynamic asset groups and filtered asset searches

  • NeXpose now provides the ability to create dynamic asset groups with which you can track changes to your live asset inventory and security posture at a glance.  Using the new Asset Filter search feature, you can find assets that meet specific sets of criteria, such as all Windows hosts within an IP address range that have a given vulnerability. Then you can save the search results as a dynamic asset group, which means that only assets that meet your search filter criteria will be listed in that group after each scan. Newly discovered assets that meet the criteria will be added to the group. Assets that no longer meet the criteria will be removed. NeXpose continues to support the creation and management of static asset groups, which contain lists of assets that do not automatically change after each scan. For more information about how to use dynamic and static asset groups to your advantage, see the NeXpose Administrator's Guide, which you can download from the Support page in Help. Asset searches with the Vulnerabilities filter can take additional time if you have a large number of scan results in your database.

More refined asset selection for reports and asset groups

  • The asset selection pages in the report and static asset group configuration wizards no longer automatically lists all assets in your NeXpose database when you open them. Instead, they display a list of filters with which you can search for specific assets, making it easier to find assets for selection. This is especially convenient for environments with very large numbers of assets that could take a long time to be displayed in the selection list.

Temporal risk scoring now the default option

  • NeXpose now displays asset and vulnerability data with temporal risk scores by default in new installations, instead of weight-based scores. This reflects the significance of vulnerability age as a risk factor.  Selected display settings remain unchanged in displays and reports for previous installations. As always, NeXpose administrators can select either scoring option.

JRE performance tuning

  • Tuned settings in the NeXpose Java Runtime Environment (JRE) ensure optimal, uninterrupted performance when NeXpose is operating near its memory threshold. If you have modified the NeXposeEnvironment.env file, you will need to reapply your changes after NeXpose applies this update.

Bug fixes

  • NeXpose now refreshes the data in the Most Vulnerable Asset Groups and Assets by Vulnerability Severity charts accordingly when the vulnerability count is zero.
  • NeXpose now smoothly completes a sequence of numerous updates, making it easier for you to run updates on a periodic basis. Prior to this fix, out-of-memory errors could occur on NeXpose installations that were out of date by several months and attempting to apply multiple updates at once.
  • An issue that caused halted scan jobs to block other scheduled scans from running has been corrected, giving you more flexibility to schedule scans of any time duration.
  • An issue that caused unmodified settings to change in copied or edited reports has been corrected, ensuring that you keep desired report settings.

Frequently asked questions (FAQs)

  • How will I know NeXpose has updated with this specific release?
    All updates are listed in NeXpose under the News tab.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the general Administration page for the NeXpose Security Console. The dates on the News page are official release dates. The dates on the console Administration page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  as frequently as we release new security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start up the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • Where can I get more information about this release?
    Interact with the Rapid7 Community by joining our e-mail list, registering on the Wiki, and joining us on the Rapid7 IRC Channel. For more information, go to
Rapid7: Recipient of Highest Ranking in Vulnerability Management 2010
from Gartner and Forrester: