Skip to main content

Integrating with Rapid7 InsightVM – Full Guide

Learn how to integrate Rapid7 InsightVM with Hyver to import assets, findings, and strengthen cyber risk insights.

Updated over 3 months ago

1. Introduction

Rapid7 InsightVM combines the power of Nexpose vulnerability research, Metasploit exploit insights, global attacker intelligence, internet-wide scanning, exposure analytics, and real-time reporting — all in one platform.

By integrating InsightVM with Hyver, you can seamlessly bring in assets and their associated findings, helping you connect vulnerability data directly to business impact and remediation priorities.

Note: This integration is installed on-premises.

How the Integration Works

An on-premises connector is installed in your environment to collect data from Rapid7 InsightVM every 24 hours. Hyver then processes this data and presents findings, assets, and other relevant insights directly in the platform.

Key Term:

  • On-Prem Connector
    A lightweight service installed in your environment that allows Hyver to securely access vulnerability data from Rapid7 InsightVM.


2. Prerequisites

Before setting up the integration, make sure you have the following in place:

  • Rapid7 InsightVM server URL

  • User credentials (username & password) for Rapid7 InsightVM

  • Hyver administrator role

  • A machine available to install the on-prem connector, with access to InsightVM

  • Docker Engine installed on the connector instance

  • Outbound internet access from the connector to the Hyver platform (TCP/443 outbound traffic to AWS API Gateway)

The connector user in Rapid7 InsightVM must have permission to:

  • View Site Asset Data

  • View Group Asset Data

Integration Workflow

Setting up the Rapid7 InsightVM integration in Hyver involves two main steps:

  1. Configure authentication – enter your Rapid7 InsightVM login details and validate credentials.

  2. Install the on-prem connector – a lightweight service that connects Hyver to InsightVM.

Required IP Addresses

For the integration to work smoothly, you may need to allow traffic from Hyver’s servers in your firewall or network configuration. This ensures that Hyver can securely connect to your environment and perform scans without being blocked.

Depending on your region and the type of scan, add the following IP addresses:

  • General IPs:

    • Europe18.198.79.197

    • America52.1.10.176, 35.171.70.87

  • IPs for Azure and AWS Scans:

    • Europe18.158.77.90

    • America34.206.252.13

In most cases, you only need to add the IPs relevant to your region and use case.

Multi-Company Dashboard and Integrations

This section explains how Hyver’s Multi-Company Dashboard works in general, and how integrations behave when used in a Multi-Company setup.

What is the Multi-Company Dashboard?

Hyver’s Multi-Company Dashboard is designed for large enterprises with multiple subsidiaries. It gives you:

  • A centralized view of cybersecurity risk across the entire organization

  • Key metrics like exposure, cost of breach, and maturity scores

  • The ability to switch between subsidiaries and view their individual data

  • Parent admins and power users can view aggregated and subsidiary-level risk, while detailed findings remain visible only to members of the specific subsidiary

  • Data that updates in real time

To enable Multi-Company, contact your CYE Technical Account Manager.

How Integrations Work in Multi-Company

Here’s the important part:

  • Integrations are created only at the subsidiary level

  • Findings from an integration appear only in that subsidiary’s dashboards and reports

  • Parent companies cannot create integrations — they can only view the aggregated results

Best Practices for Combining Integrations with Multi-Company

To get the most out of Multi-Company with integrations, we recommend:

  • Each subsidiary should create its own integration, using credentials that only grant access to data relevant to that subsidiary

  • In some cases, it’s useful to also have a dedicated “General” company, which holds findings that apply to the entire enterprise and cannot be tied to a single subsidiary

  • The parent company then combines these insights and metrics from all subsidiaries and the General company — but remember, integrations cannot be connected directly to the parent company.


3. Configuring on the Rapid7 InsightVM Side

Step 1: Create the Integration

  1. In Hyver, go to Settings > Integrations and select the Rapid7 InsightVM tile.

  2. Click Add.

    • You must be a Hyver administrator.

  3. Enter a name for the integration.

  4. Enter your Rapid7 InsightVM credentials.

  5. Enter the InsightVM server URL.

  6. Click Validate to confirm the details match the expected format:

Then, Before data can be ingested, proceed to install the on-prem connector:

Step 2: Install the On-Prem Connector

The connector is installed on a server in your environment and securely transfers InsightVM data to Hyver every 24 hours.

Installation Requirements

Component

Description

CPU

64-bit kernel, 4 CPU / 8 vCPU, virtualization support

Memory

4 GB minimum

OS

64-bit Ubuntu, Debian, or CentOS

Networking

TCP/443 outbound traffic to AWS API Gateway

Permissions

View Site Asset Data, View Group Asset Data

Install Docker

Choose the installation guide for your OS:

After installation, enable Docker as a system service:

sudo systemctl enable docker

Post-installation steps:

sudo groupadd docker sudo usermod -aG docker $USER

4. Configuring in Hyver

Run the Setup Script

After entering the integration name and Rapid7 login details, and completing the On-Prem Connector installation, continue with steps 2–3 on the integration page: download the configuration file and copy the provided commands into your environment:

  1. Create integration directories:

    mkdir -p /home/$USER/hyver/integrations/
  2. Download the onboarding script from Hyver (valid for 1 hour) and move it to the integrations folder:

    cp cye-integration-agent.sh /home/$USER/hyver/integrations/
  3. Make the script executable:

    sudo chmod +X /home/$USER/hyver/integrations/cye-integration-agent.sh
  4. Run the onboarding script:

    ./home/$USER/hyver/integrations/cye-integration-agent.sh

    Enter credentials and endpoint as prompted.

Validate the Service

Check logs to confirm the connector is running:

cat /home/$USER/hyver/integrations/integration_logs.log

Expected output example:

Using log_level='INFO' log_file='/var/log/integrations.log' [INFO] Verbosity level: Info [INFO] Collection method: All [INFO] Starting data collection...
  • It may take a few seconds, even after the loading bar reaches 100%.

  • If everything worked correctly, you’ll see a green “Running” message:

At this point, the integration is complete. Click Save if prompted.

Health and Status

  • Once configured, Hyver collects data automatically every 24 hours.

  • If the connection is successful, the integration status appears as Active.

  • A periodic health check runs in the background; if it fails, the status will change to Inactive.


5. Viewing Results

Integration Outcome in Hyver

Once the integration is complete, Hyver automatically creates a new technology asset with the following details:

  • Asset type: VM (Vulnerability Management)

  • Technology name: Rapid7

  • Engagement: Integration with external tools

This technology asset is automatically mapped to the NIST Cybersecurity Framework (CSF). In Hyver, technologies are treated as assets (such as security tools) that can strengthen the maturity level of specific NIST subcategories — and they are included in the overall maturity calculation.

Findings in Rapid7

With the Rapid7 InsightVM integration, you can easily work with Rapid7 findings inside Hyver:

  • View all imported findings directly on the Findings page.

  • Use the Sources filter to quickly search for findings coming from Rapid7:

  • Filter by assets on the Assets page to see which findings are linked to each asset.

Collected Endpoints

Collected endpoints are the specific data sources Hyver pulls from Rapid7 InsightVM to bring in relevant assets and findings. These endpoints define what information is synchronized into Hyver and made available for analysis.

For the Rapid7 InsightVM integration, Hyver collects data from the following endpoints:

  • assets – the inventory of all systems and devices tracked in InsightVM.

  • assets vulnerabilities – the list of vulnerabilities identified on those assets.

  • scans – details of vulnerability scans performed in InsightVM, including scope and results.

  • settings – configuration data that provides context about how InsightVM is set up in your environment.

By collecting this data, Hyver can map InsightVM findings to business risk, correlate vulnerabilities with assets, and help prioritize remediation.


6. Types of Fetched Entities

Rapid7 Findings Handled by Hyver

Hyver ingests and processes a wide range of findings from Rapid7 InsightVM, ensuring they can be prioritized and mapped to business risk.
Full list provided here:

  • Insufficient Global Security Update Policy or Mechanism

  • Weak Password Policy

  • Unauthenticated Sensitive Information Disclosure

  • Active Default Administration Account

  • Subdomains are Susceptible to Subdomain Takeover

  • Servers can be Abused for DDoS Amplification Attacks

  • Weak Cryptographic Algorithms

  • Weak Authentication Mechanism

  • Usage of Outdated and Vulnerable Protocols

  • Sensitive Business Information Disclosure

  • Direct Database Access Via SQL Injection

  • Untrusted Server Certificates

  • Usage of Outdated and Vulnerable Technologies

  • No Malicious Code Detection Capabilities

  • Insufficient Access Control Governance and Segregation of Duties

  • Anonymous Access to Sensitive Interfaces

  • Reflected Cross-Site Scripting

  • Local File Inclusion

  • Source Code Disclosure

  • XPath Injection

  • Buffer Overflow

  • Parameter Pollution

  • Persistent Cross-Site Scripting

  • Insecure HTTP Methods are Enabled

  • Sensitive Files Disclosure

  • OS Command Injection

  • Authorization Bypass

  • Privileged Accounts Governance and Hardening Strategy is Lacking


7. Deleting the Integration

Deleting the integration

  • Click Delete Integration and confirm the action.

  • The connection is terminated immediately.

  • No new data will be ingested, but all previously collected data remains available in Hyver.

Editing the integration

  • Go to the Rapid7 InsightVM integration in Hyver.

  • Click Edit Integration, update the details, and click Save.


Wrap-up

In this article, we explored how to integrate Rapid7 InsightVM with Hyver. We reviewed the prerequisites and installation requirements, walked through the setup workflow, and explained how to edit or delete the integration. Finally, we covered how Rapid7 findings are ingested into Hyver and mapped to business risk, enabling smarter prioritization and remediation.

Did this answer your question?