When
you initiate a vulnerability scan from the IoT Security portal,
it sends a command through Cortex XSOAR to either a Rapid7 management
system in the cloud or on premises, depending on how it’s deployed.
The management system then relays the scan command to a Rapid7 scanner,
and after the scan is complete, it returns the results in a PDF
report through XSOAR to IoT Security. The two flows are illustrated
step-by-step below.