Configure Exposure Command

Exposure Command helps you identify, prioritize, and remediate risk across your attack surface by bringing together asset context, vulnerability data, and risk insights in the Command Platform.

Use this guide to prepare your Command Platform organization for deployment, configure the modules you plan to use, and verify that data is flowing into your dashboards.

Phase 1: Prepare for Configuration

In this phase, you’ll confirm access to the Command Platform, assign the roles you need, and complete any required network and platform setup. You may also deploy Rapid7 Agents to improve asset visibility and data collection.

Phase 2: Configure modules

After completing platform preparation, configure the modules included with Exposure Command.

Exposure Command modules by license

Exposure Command is available in multiple license tiers, each including a different set of modules. Use this table to determine which modules you need to configure based on your license.

Only complete the sections for the modules included in your subscription.

Modules to Configure Essentials Advanced Ultimate
Attack Surface Management
Vulnerability Management
Automation
Cloud Security Not included
Application Security Not included Not included

Configure Attack Surface Management

Attack Surface Management unifies asset data across hybrid environments to break down silos and deliver a comprehensive, real-time view of your attack surface.

To set up Attack Surface Management, configure core connectors and add seeds to discover your public-facing assets.

Configure Vulnerability Management

Vulnerability Management discovers assets and assesses them for vulnerabilities and misconfigurations. When connected to Exposure Command, vulnerability findings are correlated with asset and identity context for improved prioritization.

To configure Vulnerability Management, complete the tasks in this section.

Configure Automation

Set up Automation to start building automated workflows that handle security operations tasks. For more information on Automation, refer to Get Started with Automation and then return to this guide.

Configure Cloud Security (Advanced & Ultimate)

Cloud Security provides visibility into misconfigurations, policy violations, and runtime risks across your cloud environments.

To configure Cloud Security, set up your user roles and access, review. harvesting strategies, and configure your integrations.

Configure Application Security (Ultimate)

Application Security provides dynamic application security testing (DAST) to identify vulnerabilities in web applications and APIs. Exposure Command brings application-layer findings into your unified exposure view, helping you prioritize and remediate risk across your attack surface.

To set up Application Security, deploy any required internal scan engines, configure scan targets and authentication methods, and create scan configurations.

After configuring your selected modules, proceed to Phase 3 to validate data ingestion and confirm your exposure insights are complete and accurate.

Phase 3: Validate and explore

Now that you're properly set up, use your dashboards to monitor security operations and validate that your environment is functioning as expected. If your dashboards are empty, it means no data is coming in. Refer back to Phase 2: Configure modules.

Next steps

After validating and reviewing your data:

  • Schedule recurring scans and harvesting cycles.

  • Confirm role-based access for stakeholders.

  • Configure reports or executive dashboards as needed.

  • Monitor remediation progress over time.

Your deployment is now operational. Continue refining scan coverage, connector configuration, and automation workflows to improve visibility and reduce risk.