Rapid7 Support Resources

Customer Portal

Connect with Support

Need help? We’ve got you covered. Sign in to the Customer Portal for our top recommended help articles, and to connect with our awesome Support Team.
Create and manage your cases with ease and get routed to the right product specialist.

Customer Portal Sign In


Having trouble logging in?

Customer Support Guidebook

Learn how the Rapid7 Customer Support team can support you and your organization

Training & Certifications

Be awesome at everything you do -- get trained by Rapid7 experts and take your security skills to the next level.

Learn more

Consulting Services

Need a hand with your security program? From planning and strategy to full-service support, our Rapid7 experts have you covered.

View all services

Product Documentation

Find help using and administering Rapid7 products

InsightAppSec InsightIDR AppSpider Metasploit InsightConnect InsightOps InsightVM Komand Nexpose
View all docs

Read What’s New on the Rapid7 Blog

Metasploit Wrap-Up 05/30/2025
The internet is a series of Tube [SOCKS] Metasploit has supported SOCKS proxies for years now, being able to both act as both a client (by setting the Proxies datastore option) and a server (by running the auxiliary/server/socks_proxy module). While Metasploit has supported both SOCKS versions 4a and 5, there became some ambiguity in regards to how Domain Name System (DNS) requests are made by Metasploit through these versions. Both versions 4a and 5 notably enable clients to make connections to
Spencer McIntyre
May 30, 2025
Read More
Seeing Is Securing: How Surface Command Expands MDR Visibility and Impact
To maximize the effectiveness of security operations, MDR must continually evolve. Today at Rapid7, that means integrating Surface Command — not as a dashboard or tool to manage, but as a behind-the-scenes capability that strengthens the service our customers rely on.
Conner Goldstein
May 30, 2025
Read More
CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)
Over a penetration testing engagement, Rapid7 discovered 3 vulnerabilities in MICI Network Co., Ltd’s NetFax server allowing for an authenticated attack chain resulting in Remote Code Execution (RCE) against the device as the root user.
Anna Katarina Quinn
May 29, 2025
Read More
More recent blog posts

Visit the Customer Portal

File a case, view your open cases, get in touch.