Complete Beginner's Guide

Rapid7
InsightVM

The vulnerability management platform that finds every weakness in your environment, tells you which ones actually matter, and helps you fix them fast — explained from zero.

Vulnerability Management Active Risk Scoring Remediation Workflows Insight Agent Metasploit Integration Cloud + Container
insightvm — scan results
# Scan completed: 2026-03-04 09:41 UTC
────────────────────────────
assets_scanned: 4,821
vulnerabilities_found: 187,340
────────────────────────────
# Active Risk Score (0–1000)
critical_active_risk: 943
CVE: CVE-2025-32756
exploited_in_wild: TRUE
metasploit_module: available
affected_assets: 12
────────────────────────────
# Remediation project created
assigned_to: it-ops-team
sla_deadline: 2026-03-07
status: ↗ IN PROGRESS
01 — Foundation

What Is InsightVM?

Let's start from absolute zero — no jargon, no assumptions about what you already know.

Imagine you own a huge office building with thousands of rooms, windows, doors, locks, computers, and appliances. Every single day, new security flaws are discovered in the locks, appliances, and computers — some of them allow burglars to walk right in. InsightVM is the automated inspection team that continuously surveys every room in your building, catalogs every broken lock and faulty window, ranks them by how dangerous they are, and hands your maintenance team a precise repair schedule — with the most critical doors to fix first, step-by-step instructions for each fix, and a way to confirm the job was done right.
🔍

What is vulnerability management?

A "vulnerability" is a flaw in software, hardware, or configuration that an attacker can exploit to gain unauthorized access or cause damage. Vulnerability management is the continuous practice of finding these flaws, deciding which are most dangerous, fixing them, and verifying they're gone.

🏢

Who is Rapid7?

Rapid7 is a publicly traded cybersecurity company founded in Boston, with over two decades of experience. They're best known for InsightVM (vulnerability management), InsightIDR (SIEM/XDR), and owning Metasploit — the world's most widely used penetration testing framework.

📦

What does InsightVM replace?

InsightVM evolved from Rapid7's original product, Nexpose. It consolidates what used to require a separate scanner, a risk scoring tool, a remediation ticketing workflow, a reporting system, and a compliance engine — into one unified platform.

Simple definition: InsightVM is Rapid7's cloud-enabled vulnerability management platform. It continuously scans your entire environment — on-premises servers, laptops, cloud infrastructure, containers, remote workers — finds security weaknesses, ranks them by real-world exploitability using AI, and helps your IT team fix the right things in the right order.

02 — Context

The Problem InsightVM
Was Built to Solve

Understanding the pain points makes everything about how InsightVM works click into place.

🌊

Too Many Vulnerabilities

A mid-sized organization typically has tens of thousands of vulnerabilities at any given time. Most are low risk. If you try to fix everything, you'll fix nothing — you'll be overwhelmed before you start. Traditional scanners just dump a list with no real prioritization guidance.

📊

CVSS Scores Are Too Blunt

The industry standard severity score (CVSS) often rates hundreds of vulnerabilities as "Critical 10.0." But a critical vulnerability with no public exploit in a non-internet-facing system is very different from one being actively attacked in the wild. CVSS can't tell the difference.

🔀

Security vs. IT Team Friction

Security teams find vulnerabilities. IT teams fix them. But historically, security would throw a spreadsheet over the fence and IT would say "we don't understand this" or "our ticketing system doesn't connect to yours." The result: slow remediation, SLA breaches, and unpatched systems.

🌥️

Dynamic, Expanding Environments

Modern environments never sit still. Developers spin up cloud instances, employees connect laptops from home, containers are created and destroyed in minutes. Legacy scanners that only run weekly scans miss vast amounts of infrastructure between scan windows.

📸

Point-in-Time Scanning

Traditional scanners take a "photo" of your environment once a week. Between scans, new systems appear, new vulnerabilities are published, and attackers move fast. By the time the next scan runs, you might already be breached.

No Proof of Remediation

How do you know a patch was actually applied and worked? With legacy tools, you wait for the next scheduled scan — sometimes days or weeks. InsightVM's validation scanning lets you confirm a fix worked immediately, without waiting.


03 — Core Mechanics

How InsightVM
Actually Works

The full lifecycle from discovering assets to confirming fixes — step by step.

1

Asset Discovery — Finding Everything

You can't protect what you don't know about. InsightVM uses multiple methods to discover every asset in your environment: network scanning (sending probes across IP ranges to find live systems), the Insight Agent (a lightweight piece of software installed on devices), and cloud integrations (directly querying AWS, Azure, and GCP APIs to discover cloud resources). Adaptive Security automatically detects and scans new devices the moment they appear on the network — no waiting for the next scheduled scan.

2

Authenticated Scanning — Going Deep

There are two types of scans: unauthenticated (like an outsider looking at what's exposed) and authenticated (logging into the system with credentials to see everything from the inside). Authenticated scans find far more vulnerabilities — missing patches, misconfigured services, outdated software installed locally. The Insight Agent always performs authenticated assessments automatically since it runs on the device itself, without needing stored credentials in InsightVM.

3

Vulnerability Identification

InsightVM checks every discovered service, software version, and configuration against its unified vulnerability database — updated every 6 hours and certified compatible with the MITRE CVE index. It looks for known vulnerabilities (CVEs), missing patches, end-of-life software (rated CVSS 10.0 by default since EOL means no more patches will ever come), policy violations (CIS benchmarks, DISA STIGs), and misconfigured cloud services.

4

Active Risk Scoring — Prioritization

Every vulnerability gets an Active Risk Score from 0–1000. This is not just CVSS. It incorporates: Is there a public exploit? Is it in Metasploit? Is it being actively exploited in the wild right now? Is the affected asset critical to your business? Is it internet-facing? This dramatically narrows the list from "everything is critical" to "fix these 15 things today." More detail in the Risk Scoring section.

5

Remediation Projects — Bridging Security & IT

InsightVM creates remediation projects — think of them as structured to-do lists for IT teams. Each project includes the exact fix needed (specific patch, configuration change, or software update), which assets are affected, a due date, and SLA tracking. These projects can be sent directly to ServiceNow, Jira, or other ticketing systems, so IT teams work within their existing tools. Projects can be static (fixed list) or dynamic (automatically pulling in newly discovered vulnerabilities matching a filter).

6

Validation Scanning — Confirming the Fix

Once IT marks a fix as complete, InsightVM can immediately run a targeted validation scan against just that asset for just that vulnerability, using the most recent Scan Engine that assessed it. Within minutes, you get confirmation that the patch actually worked — without waiting for the next full scan cycle. This closes the loop and keeps risk scores current in real time.

7

Reporting & Dashboards

InsightVM's live dashboards show your current risk posture, remediation progress, SLA compliance rates, trend data (is risk going up or down?), and compliance status against frameworks like PCI-DSS, HIPAA, NIST, and CIS benchmarks. Executive summaries are generated automatically each month. Custom SQL queries and the REST API let power users pull any data they need for custom reporting.


04 — The Brain

Risk Scoring:
Why Active Risk Changes Everything

This is InsightVM's most important differentiator. Understanding it is key to understanding the whole product.

Traditional CVSS scores are like rating every car problem as either "red alert" or "not urgent" based purely on how dangerous the problem could theoretically be — without considering whether your car is a race car or a golf cart, whether mechanics actually have tools to fix this problem, or whether this specific defect has already been causing accidents. Active Risk tells you: this flaw is dangerous, there's a publicly available toolkit to exploit it, real attackers are using it right now, and your server is exposed to the internet — fix it today.

Active Risk Score — What Goes Into 0–1000

InsightVM's Active Risk combines six data sources, each contributing to the final 0–1000 score. Here's roughly how much weight each factor carries in determining whether a vulnerability is truly urgent.

CVSS Base Score
Baseline
Exploit in Metasploit
High Weight
Exploited in Wild (CISA KEV)
Critical
EPSS Probability Score
High Weight
Asset Criticality
Context
Internet Exposure
High Weight
Exploit in ExploitDB / Dark Web
Moderate
Emergent Threat Response (ETR)

Rapid7's Zero-Day Alert System

When a major new vulnerability is actively exploited in the wild — like a zero-day in a Fortinet or Ivanti product — Rapid7's ETR program flags it immediately. InsightVM updates its detection content (usually within 24 hours of disclosure), so your next scan will find it. You'll see ETR-flagged vulnerabilities appear at the very top of your prioritization queue with an "Exploited in Wild" badge.

EPSS Score

Probability of Exploitation

InsightVM now incorporates EPSS (Exploit Prediction Scoring System) data — a community-driven probability model that estimates the likelihood a specific CVE will be exploited in the real world within the next 30 days, based on historical patterns. A CVE with a CVSS of 9.8 but an EPSS of 0.1% is very different from one with CVSS 7.5 and EPSS of 85%.

Asset Criticality Rating

Not All Assets Are Equal

You can tag assets in InsightVM with a criticality rating (Very High, High, Medium, Low, Very Low). A critical vulnerability on a domain controller or internet-facing web server scores much higher than the same vulnerability on a test laptop. Asset criticality is factored directly into Active Risk, so your remediation queue reflects business priorities, not just technical severity.

Risk Strategies

Six Ways to Score Risk

InsightVM offers 6 configurable risk strategies: Highest CVSS (traditional), Temporal (adjusts over time), Real Risk Factor, Aggressive Real Risk, NeXpose Default (original scoring), and Active Risk (the newest, AI-enriched model). Most organizations use Active Risk as their primary strategy. Different strategies can be applied to different asset groups for specialized reporting needs.

The practical impact: A large bank using InsightVM reduced their "critical vulnerabilities" queue from over 40,000 items (under CVSS-only scoring) to under 300 genuinely high-priority items (under Active Risk). That's the difference between a team that's paralyzed and a team that knows exactly what to do every morning.

05 — Under the Hood

InsightVM Architecture:
The Building Blocks

InsightVM is made up of several components that work together. Here's what each one does.

🖥️

Security Console

The on-premises brain of InsightVM — a web-based management interface where admins configure scans, view results, manage assets, run reports, and create remediation projects. Stores the vulnerability database and all scan data locally. Communicates with the Insight Platform cloud for real-time dashboards and the Insight Agent.

⚙️

Scan Engines

Separate servers that do the actual scanning work — probing network devices, running exploit checks, and testing configurations. Distributed Scan Engines are deployed strategically across your network (different offices, data centers, cloud regions) so they can reach assets locally without traffic crossing WAN links. Multiple engines can run parallel scans for large environments.

🤖

Insight Agent

A lightweight software agent installed on individual devices — Windows, macOS, Linux. It continuously monitors the device for vulnerability data and sends results to the Insight Platform, even when the device is off the corporate network (like a remote employee's laptop). No credentials needed since it runs on the device itself. Also shared with InsightIDR for SIEM data collection.

🔐

Scan Assistant

A secure service installed on target assets that allows authenticated scanning without storing privileged admin credentials in InsightVM. Uses TLS with elliptic-curve encryption and digital certificates to create a trusted channel between the Scan Engine and the target. Significantly reduces the security risk of credential management and speeds up policy scans.

☁️

Insight Platform (Cloud)

The cloud backbone that powers real-time dashboards, the Remediation Hub, agent management, cloud integrations (AWS, Azure, GCP), and the Command Platform experience. Data flows between your on-premises Security Console and the cloud platform, giving you both local scanning power and cloud-scale analytics and collaboration features.

🗄️

Vulnerability Database

A continuously updated library of over 200,000+ vulnerability definitions, updated every 6 hours. Certified compatible with the MITRE CVE index. Includes exploit information (Metasploit modules, ExploitDB), malware kit associations, patch information with step-by-step remediation guidance, and CVSS scores (both v3.1 and v2 for legacy compliance). Content auto-updates keep it current without admin intervention.

Hybrid architecture: InsightVM is neither purely on-premises nor purely cloud — it's hybrid. The Security Console and Scan Engines live on-premises (giving you control and low-latency local scanning), while the Insight Platform cloud provides real-time dashboards, the Insight Agent backend, and the modern Remediation Hub. This means you get the data residency and network control of on-prem with the accessibility and analytics of cloud.

06 — Capabilities

Key Features Deep Dive

The most important things InsightVM does — beyond just finding vulnerabilities.

Remediation Hub

One Place for All Fixes

Made generally available to all customers in September 2025, the Remediation Hub is a centralized command center for vulnerability remediation. Powered by Active Risk scores, it groups vulnerabilities by the single fix that eliminates the most risk — often one patch addresses hundreds of CVEs. It uses intelligent supersedence logic (if Patch B supersedes Patch A, only show Patch B) to minimize rework. Teams can filter by asset group, business unit, or priority level.

IT-Integrated Remediation Projects

Closing the Security–IT Gap

Security creates a project in InsightVM. IT receives a ticket in ServiceNow, Jira, or their preferred ITSM tool — automatically, with all the context they need: which systems, which vulnerability, exactly how to fix it, and the deadline. When IT completes the ticket, the status syncs back. A validation scan runs automatically to confirm. Full audit trail of who did what and when — critical for compliance.

Cloud Configuration Assessment

Securing AWS, Azure, GCP

InsightVM connects to cloud provider APIs and checks cloud-native resources — S3 buckets, security groups, IAM roles, RDS instances, Kubernetes clusters — against security best practices and compliance frameworks. It flags misconfigurations like publicly exposed storage buckets, overly permissive firewall rules, or missing encryption settings. These are treated as vulnerabilities alongside traditional CVEs.

Container Security

Securing Docker & Kubernetes

InsightVM scans container images for vulnerabilities before they're deployed — integrating with Docker registries and CI/CD pipelines. It also assesses running containers in Kubernetes clusters. Since containers are ephemeral (they're created and destroyed constantly), agent-based assessment ensures even short-lived containers are assessed before they disappear.

Policy Assessment

Compliance Benchmarks

InsightVM checks systems against industry security standards: CIS benchmarks (Center for Internet Security — detailed hardening guides for every OS and application), DISA STIGs (US military security requirements), and PCI-DSS, HIPAA, NIST, and SOX controls. Failed policy checks appear alongside CVEs in the same prioritization queue. Compliance reports are generated automatically for auditors.

Live Monitoring & Adaptive Security

No More Weekly Scan Gaps

Live Monitoring watches your network for changes — new devices appearing, services starting, configurations changing — and updates vulnerability data immediately rather than waiting for the next scheduled scan. Adaptive Security automatically scans new devices the moment they're detected on the network. Together, these features give InsightVM near-real-time visibility rather than point-in-time snapshots.

Goals & SLAs

Accountability at Scale

InsightVM lets you define SLA policies — for example, "all Critical vulnerabilities on internet-facing assets must be remediated within 7 days." The platform tracks compliance with these policies, alerts when deadlines are approaching or breached, and reports SLA compliance rates over time. This creates accountability and gives security managers data to show executives and auditors.

Bulk Export API & BI Integration

Your Data, Your Way

InsightVM exports comprehensive asset and vulnerability data in Parquet format via a high-performance GraphQL API — designed for direct ingestion into Power BI, Snowflake, Databricks, or any modern data platform. SQL-based Advanced Search lets analysts query the vulnerability database directly in the console. 500+ native integrations connect InsightVM to your broader security and IT stack.


07 — The Secret Weapon

The Metasploit Connection:
Why It Matters

Rapid7 owns Metasploit — the world's most used penetration testing framework. This gives InsightVM a unique and powerful advantage.

Imagine you're assessing whether a lock is dangerous to leave unpatched. Most tools check a manufacturer's safety rating. InsightVM checks whether professional burglars already have a ready-made lock-picking kit for that exact lock — and whether they've actually been using it on similar buildings this week. That's what the Metasploit integration does.
What is Metasploit?

The World's Penetration Testing Framework

Metasploit is an open-source framework containing thousands of exploit modules — ready-to-use code that can actually exploit known vulnerabilities. Security teams use it to test their own defenses. Attackers study it. With over 1,000 exploit modules and a massive community, Metasploit is the gold standard reference for "can this vulnerability actually be exploited in practice?"

Exploit Correlation

Real Exploit Availability in Your Risk Score

Because Rapid7 owns Metasploit, InsightVM knows exactly which vulnerabilities have a working Metasploit module. This data is baked directly into the Active Risk score — a vulnerability with a Metasploit module is treated as significantly more dangerous because any attacker with basic skills can exploit it with a single command. It's one of the highest-quality risk indicators available.

Vulnerability Validation

Prove a Vulnerability Is Real

InsightVM can integrate with Metasploit to actively validate discovered vulnerabilities — actually running the exploit against a target in a controlled test to confirm it's genuinely exploitable, not a false positive. This is invaluable when remediation teams push back on scan results. You can say "we didn't just detect this — we confirmed it works." Metasploit is the only exploit framework that InsightVM's validation feature supports.

AttackerKB Intelligence

The Crowdsourced Exploit Knowledge Base

Rapid7 operates AttackerKB — a community platform where security researchers and penetration testers share technical assessments of vulnerabilities. Is it easy to exploit? What's the real-world impact? Is it worth bothering with? This crowdsourced intelligence feeds directly into InsightVM's Active Risk scoring, adding practitioner judgment on top of raw CVE data.

Unique competitive advantage: No other vulnerability management vendor owns a penetration testing framework of Metasploit's scale. This means Rapid7 has a direct, real-time view of which vulnerabilities are practically exploitable — and that intelligence flows directly into InsightVM's prioritization engine. Competitors have to license similar data from third parties.

08 — Know the Difference

InsightVM vs Nexpose:
What's the Difference?

You'll hear both names constantly. Here's how to keep them straight.

Nexpose

  • The original on-premises product, launched in 2003
  • Fully self-contained — no cloud connection required
  • Ideal for air-gapped or highly regulated environments
  • All data stays entirely on-premises
  • Traditional scheduled scan model
  • Security Console + Scan Engines only
  • No Insight Agent, no cloud dashboards
  • Still actively developed and updated (v8.9.1, June 2025)

InsightVM

  • The hybrid cloud-enabled evolution of Nexpose
  • Includes everything Nexpose has, plus cloud features
  • Adds Insight Agent for remote/roaming devices
  • Real-time cloud dashboards via Insight Platform
  • Remediation Hub, Goals, SLAs, live dashboards
  • Active Risk scoring (Nexpose uses earlier strategies)
  • Container and cloud configuration assessment
  • Integrates with Command Platform (Surface Command, Exposure Command)
Bottom line: Nexpose is for organizations that need everything on-premises with zero cloud connectivity. InsightVM is the modern choice for everyone else — it uses the same Security Console and Scan Engine infrastructure as Nexpose, but adds the cloud capabilities that make modern hybrid environments manageable. Most new customers choose InsightVM. Nexpose remains the option for government and defense environments with strict air-gap requirements.

09 — The Bigger Picture

InsightVM in the
Rapid7 Ecosystem

InsightVM is the risk/vulnerability pillar of Rapid7's broader Command Platform. Here's how it connects.

Rapid7 Command Platform

Rapid7 has organized its products around a unified "Command Platform" — a common cloud backend, shared data, and consistent dashboards. InsightVM is the foundation of the Risk pillar, feeding vulnerability data into other products and consuming threat intelligence from them.

InsightVM
Vulnerability management — the risk foundation
InsightIDR
Cloud SIEM + XDR — threat detection & response
InsightCloudSec
Cloud security posture management (CSPM)
Exposure Command
Full exposure management across all Rapid7 products
Surface Command
Attack surface management — 360° asset visibility
InsightAppSec
Dynamic application security testing (DAST)
Vector Command
Continuous red teaming / breach & attack simulation
Metasploit Pro
Penetration testing — validates InsightVM findings
Managed VM
InsightVM + Rapid7 expert team running your program
InsightVM + InsightIDR

Vulnerability + Threat Detection

When InsightIDR detects suspicious activity on a host, it can pull InsightVM data to see what vulnerabilities that host has — helping analysts understand the blast radius of a potential compromise. Conversely, if a new critical CVE is published, InsightVM can show which assets InsightIDR is monitoring that are affected. The Insight Agent is shared across both products, reducing endpoint footprint.

InsightVM + InsightCloudSec

VM + Cloud Security Posture

InsightCloudSec handles cloud-native misconfigurations at cloud scale (thousands of cloud resources). InsightVM handles traditional vulnerability scanning including cloud VMs and containers. Together via Exposure Command, they give a unified risk view across on-premises, hybrid, and cloud-native environments — all in one prioritized dashboard for security and compliance teams.

200k+
vulnerability definitions in the database
500+
native integrations with IT and security tools
$1.93
per asset/month starting price (500 assets)
6hrs
vulnerability database update frequency
20+
years of Rapid7 vulnerability research
1,000+
exploit modules in Metasploit integrated with InsightVM

10 — Evolution

The History of
Rapid7 & InsightVM

From a scrappy vulnerability scanner to a billion-dollar platform — how we got here.

2000

Rapid7 Founded

Rapid7 is founded in Boston with a focus on network security and vulnerability assessment. Their early product, NeXpose (later Nexpose), becomes one of the first commercial vulnerability scanners and earns a reputation for accuracy and depth.

2009

Metasploit Acquisition

Rapid7 acquires HD Moore's Metasploit project — the world's most widely used penetration testing framework. This is the move that distinguishes Rapid7 from every other VM vendor: they now have the world's largest library of working exploits directly integrated into their risk scoring.

2015

Rapid7 Goes Public (NASDAQ: RPD)

Rapid7 completes its IPO. The capital fuels aggressive R&D and the build-out of the broader Insight platform — moving from a single scanner to a multi-product cloud security platform. InsightIDR (SIEM) launches the same year.

2017

InsightVM Launches

InsightVM officially launches as the cloud-enabled successor to Nexpose. It brings real-time dashboards via the Insight Platform, the Insight Agent for roaming devices, and the first version of attacker-aware risk scoring. Nexpose continues as the fully on-premises option.

2019–2022

Platform Expansion

Rapid7 builds out InsightCloudSec (cloud security), InsightAppSec (application security), and tightens platform integration. The Insight Agent becomes the shared data collection layer across InsightVM and InsightIDR — reducing endpoint footprint for customers using multiple products.

2024

Command Platform & Active Risk

Rapid7 rebrands its platform as the "Command Platform," organizing products into Risk (InsightVM, InsightCloudSec), Threat (InsightIDR), and Exposure (Surface Command, Exposure Command, Vector Command) pillars. Active Risk — the new AI-enriched 0–1000 scoring model — launches as the sixth risk strategy, incorporating EPSS, CISA KEV, Metasploit, and AttackerKB data.

2025

Remediation Hub GA + UI Refresh

Remediation Hub becomes generally available to all InsightVM customers (September 2025), bringing AI-powered remediation grouping and supersedence logic. The Security Console UI gets a major visual refresh to align with the Command Platform design language. EPSS scoring integration added. macOS Tahoe (macOS 26) support added to the Insight Agent.


11 — Career Path

Certification & Learning
Path for InsightVM

How to build real expertise and get recognized for it.

🎓 Official Certification

  • Rapid7 offers the Certified Vulnerability Management Specialist certification covering InsightVM
  • Training available through Rapid7's customer training portal and authorized training partners
  • Hands-on labs using actual InsightVM environments are the most effective preparation
  • Ask your Rapid7 account team about training credits included with your InsightVM subscription
  • Rapid7 University provides free on-demand courses for licensed customers at rapid7.com/university

📚 Learning Path — Beginner

  • Understand vulnerability fundamentals: CVE, CVSS, what a patch is, what authenticated vs unauthenticated scanning means
  • Read Rapid7's InsightVM Quick Start Guide (free on docs.rapid7.com/insightvm)
  • Set up a trial environment — Rapid7 offers 30-day free trials of InsightVM
  • Run your first scan against a small network or test lab, view results in the Security Console
  • Study the key concepts: Sites, Asset Groups, Scan Templates, Risk Scores, Remediation Projects

⚙️ Learning Path — Intermediate

  • Deploy and pair Scan Engines to the Security Console and Command Platform
  • Install and manage the Insight Agent across a test fleet of machines
  • Configure authenticated scanning with credentials and Scan Assistant
  • Create asset groups with dynamic filters, configure remediation projects, set SLAs
  • Integrate InsightVM with a ticketing system (Jira or ServiceNow sandbox)
  • Build custom dashboards and run compliance reports (CIS, PCI-DSS)

🔬 Learning Path — Advanced

  • Configure and tune Active Risk scoring for your environment's asset criticality ratings
  • Use the REST API and SQL Advanced Search for custom queries and automation
  • Set up cloud configuration assessment for AWS, Azure, or GCP integrations
  • Configure container security scanning with Docker and Kubernetes
  • Integrate Metasploit for vulnerability validation workflows
  • Build Bulk Export API connections to Power BI or Snowflake for executive reporting
  • Design and present a full vulnerability management program with Goals, SLAs, and KPI dashboards
Career tip: InsightVM skills are highly transferable. The vulnerability management concepts you learn — CVE taxonomy, risk scoring, remediation workflows, compliance frameworks, and scanner architecture — apply across the industry. InsightVM is also commonly found alongside Qualys and Tenable in enterprise environments, so understanding one deeply makes learning the others much faster.

12 — Reference

Glossary of Key Terms

Every important term from this guide, defined in plain English.

InsightVM
Rapid7's hybrid cloud-enabled vulnerability management platform. Finds, prioritizes, and helps remediate vulnerabilities across your entire environment.
Nexpose
Rapid7's original fully on-premises vulnerability management product. The predecessor to InsightVM, still actively developed for air-gapped environments.
CVE
Common Vulnerabilities and Exposures. A standardized identifier (e.g., CVE-2025-32756) for a specific publicly disclosed security flaw. The universal language of vulnerability management.
CVSS
Common Vulnerability Scoring System. A 0–10 score rating the theoretical severity of a vulnerability. Criticized for poor prioritization since it doesn't consider real-world exploitability or your specific environment.
Active Risk Score
InsightVM's 0–1000 threat-aware risk score. Incorporates CVSS, Metasploit exploit availability, CISA KEV status, EPSS probability, asset criticality, and internet exposure to rank vulnerabilities by actual urgency.
EPSS
Exploit Prediction Scoring System. A probability model (0–100%) estimating how likely a CVE is to be exploited in the real world in the next 30 days, based on historical patterns.
CISA KEV
CISA Known Exploited Vulnerabilities catalog. The US Cybersecurity & Infrastructure Security Agency's official list of CVEs actively exploited by real attackers. These always get top priority in InsightVM.
Security Console
InsightVM's on-premises web-based management interface. Where admins configure scans, view results, manage assets, and create remediation projects.
Scan Engine
A separate server that performs the actual vulnerability scanning work. Distributed across your network to reach all assets locally.
Insight Agent
A lightweight software agent installed on individual devices (Windows, macOS, Linux). Continuously assesses the device for vulnerabilities and sends data to the cloud — even when off-network.
Scan Assistant
A secure service on target assets enabling authenticated scanning without storing admin credentials. Uses TLS/ECDSA encryption for a trusted secure channel.
Authenticated Scan
A scan that logs into the target system with credentials to assess it from the inside — finding far more vulnerabilities than an unauthenticated scan, which only sees what's externally visible.
Remediation Hub
InsightVM's centralized command center for managing vulnerability remediation, grouping fixes by impact and using supersedence logic to minimize work. Generally available September 2025.
Remediation Project
A structured task list created in InsightVM and pushed to IT teams via ITSM tools, containing specific vulnerabilities, affected assets, fix instructions, and an SLA deadline.
Validation Scan
A targeted scan run immediately after a fix is applied to confirm the vulnerability was actually remediated — without waiting for the next full scheduled scan.
Asset Criticality
A user-defined rating (Very High to Very Low) assigned to assets in InsightVM reflecting their business importance. High-criticality assets get higher Active Risk scores for the same vulnerability.
Metasploit
The world's most popular penetration testing framework, owned by Rapid7. Contains 1,000+ working exploit modules. Directly integrated into InsightVM's risk scoring and vulnerability validation.
AttackerKB
Rapid7's community knowledge base where security researchers rate the real-world exploitability and impact of CVEs. This practitioner intelligence feeds into Active Risk scoring.
ETR — Emergent Threat Response
Rapid7's program for rapidly releasing vulnerability detection content when major new exploited-in-wild CVEs are disclosed. Usually delivers detection within 24 hours of public disclosure.
Adaptive Security
InsightVM's capability to automatically detect new devices joining the network and scan them immediately — rather than waiting for the next scheduled scan window.
CIS Benchmark
Detailed security hardening guidelines published by the Center for Internet Security for operating systems, cloud platforms, and applications. InsightVM checks assets against these and reports compliance status.
SLA — Service Level Agreement
In InsightVM context, a defined policy requiring certain vulnerability types to be remediated within a set time period. InsightVM tracks and reports SLA compliance automatically.
Insight Platform
Rapid7's cloud backbone connecting InsightVM, InsightIDR, and other products. Provides real-time dashboards, agent management, cloud integrations, and the Command Platform experience.
Exposure Command
Rapid7's premium exposure management product that aggregates risk findings from InsightVM, InsightCloudSec, InsightAppSec, and more into a single unified exposure view across the entire attack surface.