Adding a Rapid7 Nexpose scanner local file import
QRadar® uses local files to import site vulnerability data from your Rapid7 Nexpose scanner.
Before you begin
- Manually copy the certificate to the /opt/qradar/conf/trusted_certificates directory by using SCP or SFTP.
- Use SSH to log in to the Console or managed host and retrieve the certificate by using the following command: /opt/qradar/bin/getcert.sh <IP or Hostname> <optional port - 443 default>. A certificate is then downloaded from the specified host name or IP and placed into /opt/qradar/conf/trusted_certificates directory in the appropriate format.
About this task
Local file imports collect vulnerabilities for a site from a local file that is downloaded. The Rapid7 Nexpose XML file that contains the site and vulnerability information must be copied from your Rapid7 Nexpose appliance to the Console or managed host you specify when the scanner is added to QRadar. The destination directory on the managed host or Console must exist before the Rapid7 Nexpose appliance can copy site reports. The site files can be copied to the managed host or Console by using Secure Copy (SCP) or Secure File Transfer Protocol (SFTP).
The import directory that is created on the managed host or QRadar Console must have the appropriate owner and permission set on it for the VIS user within QRadar. For example, chown -R vis:qradar <import_directory_path> and chmod 755 <import_directory_path> set the owner of the import directory path to VIS user with adequate read-write-execute permissions.
You must use the XML Export or XML Export 2.0 report format for the XML export to QRadar.
XML Export is also known as raw XML. The XML export contains an extensive set of scan data with the smallest amount of structure. The XML export scan data must be parsed so that other systems can use the information.
- Asset Risk
- Exploit Title
- Site Name
- Exploit IDs
- Malware Kit Name(s)
- Site Importance
- Exploit Skill Needed
- PCI Compliance Status
- Vulnerability Risk
- Exploit Source Link
- Scan ID
- Vulnerability Since
- Exploit Type
- Scan Template