@@ -45,163 +45,210 @@ Good option if you are not using a Security Engine and want your CDN or WAF to b
4545
4646---
4747
48- ## Reduce Resource Consumption
48+ ## Reduce Noise to save Resources address alert fatigue
4949
50- ** What this solves: ** Eliminate automated noise, 404 probes, and malicious traffic to reduce server load and log volumes.
50+ Eliminate automated noise from unwanted probes, spam and malicious traffic to reduce server load and log volumes by up to 80% .
5151
52- ### Implementation Options
52+ ** Is it for me?**
53+ Ideal if you're experiencing high server load from automated traffic or want to reduce infrastructure costs.
54+ Good option if you need to optimize server performance and reduce log storage requirements.
55+
56+ ** How it works:**
57+ - Use CrowdSec blocklists to preemptively block crowd validated noise.
58+ - Go further by deploying CrowdSec Security Engine to detect malicious patterns in your traffic.
59+ - Use an AppSec enabled Remediation Component to use CrowdSec WAF.
60+ - Track quantified savings through metrics and performance monitoring.
5361
54- * Use any of the edge blocking methods described above
55- * [ Enable monitoring dashboards] ( /docs/next/cscli/cscli_dashboard ) to measure impact
56- * Track metrics with [ cscli metrics] ( /docs/next/cscli/cscli_metrics ) to quantify resource savings
62+ ** References**
63+ - [ Blocklist Catalog doc] ( /u/console/blocklists/catalog )
64+ - [ Blocklist Catalog ↗️] ( https://app.crowdsec.net/blocklists/search )
65+ - [ Security Engine installation] ( /u/getting_started/intro )
66+ - [ CrowdSec WAF] ( /appsec/intro )
67+ - [ Remediation Metrics] ( /u/console/remediation_metrics )
5768
5869---
5970
6071## Multi-Tenant Protection
6172
62- ** What this solves: ** Apply different security policies per customer, application, or environment without policy conflicts.
73+ Apply different security policies per customer, application, or environment without policy conflicts using flexible context management.
6374
64- ### Implementation Approaches
75+ ** Is it for me?**
76+ Ideal if you're managing multiple customers, applications, or environments with different security requirements.
77+ Good option if you need granular policy control and want to avoid cross-tenant security policy interference.
6578
66- * ** Custom Lists per Tenant**
67- * [ Configure centralized allowlists] ( /docs/next/local_api/centralized_allowlists )
68- * [ Filter decisions by origin or scenario] ( /docs/next/cscli/cscli_decisions_delete )
69- * Use separate integration URLs for different tenant policies
79+ ** How it works:**
80+ - Configure separate contexts for each tenant using cscli context management.
81+ - Set up centralized allowlists with tenant-specific filtering rules.
82+ - Create distinct integration endpoints for different tenant policies.
83+ - Deploy separate AppSec rule sets tailored to each tenant's requirements.
7084
71- * ** Environment Isolation**
72- * [ Manage contexts with cscli] ( /docs/next/cscli/cscli_contexts )
73- * [ Configure collections per environment] ( /docs/next/cscli/cscli_collections )
74- * Separate AppSec rule sets by tenant requirements
85+ ** References**
86+ - [ Context management with cscli] ( /docs/next/cscli/cscli_contexts )
87+ - [ Centralized allowlists configuration] ( /docs/next/local_api/centralized_allowlists )
88+ - [ Decision filtering by origin] ( /docs/next/cscli/cscli_decisions_delete )
89+ - [ Collections per environment] ( /docs/next/cscli/cscli_collections )
90+ - [ AppSec configuration guide] ( /docs/next/appsec/configuration )
7591
7692---
7793
7894## SIEM/SOAR Integration
7995
80- ** What this solves:** Enrich existing security tools with CrowdSec's threat intelligence and IOC streams.
81-
82- ### IOC Management
96+ Enrich existing security tools with CrowdSec's real-time threat intelligence and IOC streams from 70,000+ global contributors.
8397
84- * ** Import Custom IOCs**
85- * [ Import decisions from CSV/JSON] ( /docs/next/cscli/cscli_decisions_import )
86- * Support for ban, captcha, and throttle actions
87- * Tag with custom origins for tracking
98+ ** Is it for me?**
99+ Ideal if you're using SIEM/SOAR tools and want to enhance them with fresh, crowd-sourced threat intelligence.
100+ Good option if you need automated IOC management and want to reduce false positives in security alerts.
88101
89- * ** Alert Enrichment**
90- * [ Use CTI helpers in notification templates] ( /docs/next/notification_plugins/template_helpers )
91- * Automatically enrich alerts with threat intelligence
92- * [ Configure notification plugins] ( /docs/next/notification_plugins/intro )
102+ ** How it works:**
103+ - Import custom IOCs from your existing tools using CSV / JSON format .
104+ - Configure notification plugins to automatically enrich alerts with contextual threat data.
105+ - Use CTI helpers in templates to add global intelligence context to security events.
106+ - Set up bidirectional data exchange with platforms like MISP for comprehensive threat sharing.
93107
94- * ** MISP Integration** (Coming Soon)
95- * Bidirectional IOC exchange with MISP platforms
96- * Automated threat intelligence sharing
108+ ** References**
109+ - [ Import decisions from CSV/JSON] ( /docs/next/cscli/cscli_decisions_import )
110+ - [ Notification plugins configuration] ( /docs/next/notification_plugins/intro )
111+ - [ CTI helpers in templates] ( /docs/next/notification_plugins/template_helpers )
112+ - [ Console enrollment for CTI access] ( /docs/next/cscli/cscli_console_enroll )
113+ - 🏅 [ MISP Integration documentation] ( /docs/next/integrations/misp ) (Coming Soon)
97114
98115---
99116
100117## Web Application Protection
101118
102- ** What this solves: ** Quickly protect applications from OWASP Top-10 attacks and vulnerability probing.
119+ Quickly protect web applications from OWASP Top-10 attacks and zero-day vulnerability probing with behavior-driven detection.
103120
104- ### AppSec Deployment
121+ ** Is it for me?**
122+ Ideal if you need immediate protection for web applications against common attack patterns.
123+ Good option if you want virtual patching capabilities and real-time threat blocking without modifying application code.
105124
106- * ** Reverse Proxy WAF**
107- * [ Complete WAF setup guide] ( /u/user_guides/waf_rp_howto )
108- * [ AppSec configuration guide] ( /docs/next/appsec/configuration )
109- * [ Virtual patching with AppSec rules] ( /docs/next/appsec/configuration )
125+ ** How it works:**
126+ - Deploy CrowdSec Security Engine with AppSec module on your reverse proxy or web server.
127+ - Enable pre-built AppSec collections targeting OWASP Top-10 attack patterns.
128+ - Configure bouncers for real-time blocking of detected threats.
129+ - Implement virtual patching rules to protect against specific vulnerabilities.
110130
111- * ** Quick Deployment**
112- * Install Security Engine on your reverse proxy
113- * Enable AppSec collections for common attack patterns
114- * Configure bouncer for real-time blocking
131+ ** References**
132+ - [ Complete WAF setup guide] ( /u/user_guides/waf_rp_howto )
133+ - [ AppSec configuration guide] ( /docs/next/appsec/configuration )
134+ - [ Virtual patching with AppSec rules] ( /docs/next/appsec/configuration )
135+ - [ Bouncer configuration] ( /docs/next/cscli/cscli_bouncers )
136+ - [ Security Engine installation] ( /u/getting_started/installation/linux )
115137
116138---
117139
118140## Bot and Scraper Management
119141
120- ** What this solves: ** Control aggressive crawlers and scraping tools while preserving legitimate user access.
142+ Control aggressive crawlers and scraping tools while preserving legitimate user access using graduated response strategies.
121143
122- ### Management Strategies
144+ ** Is it for me?**
145+ Ideal if you're dealing with aggressive bots or scrapers that impact your site performance.
146+ Good option if you need granular control over automated traffic without blocking legitimate users or search engines.
123147
124- * ** Rate Limiting**
125- * [ Import throttle decisions] ( /docs/next/cscli/cscli_decisions_import )
126- * Use ` throttle ` action type for rate limiting
127- * Configure graduated responses (throttle → ban)
148+ ** How it works:**
149+ - Configure behavioral detection scenarios to identify suspicious crawling patterns.
150+ - Implement graduated responses starting with throttling, escalating to temporary bans.
151+ - Use specialized AI Crawlers Blocklist to block known malicious crawling IPs.
152+ - Deploy edge blocking through firewall or CDN integration for immediate protection.
128153
129- * ** Blocking Approaches**
130- * Edge blocking via firewall or WAF integration
131- * Behavioral detection with custom scenarios
132- * IP reputation-based filtering
154+ ** References**
155+ - [ Import throttle decisions] ( /docs/next/cscli/cscli_decisions_import )
156+ - [ Custom scenario creation] ( /docs/next/scenarios/create )
157+ - [ AI Crawlers Blocklist subscription] ( /u/console/blocklists/subscription/ )
158+ - [ Edge integration options] ( /u/integrations/intro )
159+ - [ Behavioral detection configuration] ( /docs/next/scenarios/introduction )
133160
134161---
135162
136163## Legacy Application Protection
137164
138- ** What this solves: ** Add modern security controls to applications that cannot be modified directly.
165+ Add modern security controls to legacy applications that cannot be modified directly using transparent proxy protection.
139166
140- ### Protection Strategies
167+ ** Is it for me?**
168+ Ideal if you're running legacy applications that lack built-in security features.
169+ Good option if you need immediate protection without the risk of modifying critical legacy code.
141170
142- * ** Transparent Proxy Protection**
143- * [ Deploy WAF at reverse proxy level] ( /u/user_guides/waf_rp_howto )
144- * [ Configure virtual patching rules] ( /docs/next/appsec/configuration )
145- * Block exploits without application changes
171+ ** How it works:**
172+ - Deploy CrowdSec WAF at the reverse proxy level in front of your legacy application.
173+ - Configure virtual patching rules to block known exploits targeting your application stack.
174+ - Create custom AppSec rules adapted to your legacy application's specific patterns.
175+ - Test protection rules in simulation mode before enabling blocking to ensure application functionality.
146176
147- * ** Custom Rule Development**
148- * Adapt AppSec rules for legacy application patterns
149- * Create custom scenarios for specific vulnerabilities
150- * Test thoroughly to avoid breaking application functionality
177+ ** References**
178+ - [ Complete WAF setup guide] ( /u/user_guides/waf_rp_howto )
179+ - [ AppSec configuration guide] ( /docs/next/appsec/configuration )
180+ - [ Virtual patching rules] ( /docs/next/appsec/configuration )
181+ - [ Custom scenario creation] ( /docs/next/scenarios/create )
182+ - [ Testing with explain mode] ( /docs/next/cscli/cscli_explain )
151183
152184---
153185
154186## Custom Behavior Protection
155187
156- ** What this solves: ** Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks.
188+ Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks using custom detection rules.
157189
158- ### Custom Detection Development
190+ ** Is it for me?**
191+ Ideal if you're facing unique attack patterns not covered by standard security solutions.
192+ Good option if you need highly specific protection tailored to your application's business logic and user patterns.
159193
160- * ** Scenario Customization**
161- * [ Manage scenarios with cscli] ( /docs/next/cscli/cscli_scenarios_install )
162- * [ Create custom scenarios] ( /docs/next/scenarios/create )
163- * [ Test scenarios with explain mode] ( /docs/next/cscli/cscli_explain )
194+ ** How it works:**
195+ - Analyze your specific abuse patterns to understand attacker behavior.
196+ - Create custom scenarios using CrowdSec's scenario framework for behavioral detection.
197+ - Develop AppSec rules for pattern-matching specific malicious requests.
198+ - Test custom rules thoroughly using explain mode and simulation before production deployment.
164199
165- * ** AppSec Rule Development**
166- * [ Configure custom AppSec rules] ( /docs/next/appsec/configuration )
167- * Create pattern-matching rules for specific behaviors
168- * Test rules in simulation mode before deployment
200+ ** References**
201+ - [ Custom scenario creation] ( /docs/next/scenarios/create )
202+ - [ Scenario management with cscli] ( /docs/next/cscli/cscli_scenarios_install )
203+ - [ Testing scenarios with explain mode] ( /docs/next/cscli/cscli_explain )
204+ - [ Custom AppSec rules configuration] ( /docs/next/appsec/configuration )
205+ - [ Scenario testing and validation] ( /docs/next/scenarios/intro )
169206
170207---
171208
172209## Alert Enhancement and Triage
173210
174- ** What this solves: ** Accelerate incident response with contextual threat intelligence and automated routing.
211+ Accelerate incident response with contextual threat intelligence and automated routing to reduce alert volume by up to 80%.
175212
176- ### Enhancement Options
213+ ** Is it for me?**
214+ Ideal if your SOC team is overwhelmed with security alerts and needs better context for prioritization.
215+ Good option if you want to automate alert enrichment and reduce time-to-response for security incidents.
177216
178- * ** Notification Enrichment**
179- * [ Configure notification plugins] ( /docs/next/notification_plugins/intro )
180- * [ Use CTI helpers in templates] ( /docs/next/notification_plugins/template_helpers )
181- * Send enriched alerts to Slack, email, or SIEM
217+ ** How it works:**
218+ - Configure notification plugins to automatically enrich alerts with global threat intelligence context.
219+ - Set up CTI helpers in templates to add reputation data, attack patterns, and geographic context.
220+ - Deploy operational dashboards for SOC teams to visualize threats and track security metrics.
221+ - Integrate with existing SIEM/SOAR tools to enhance existing alert workflows.
182222
183- * ** Operational Dashboards**
184- * [ Set up monitoring dashboards] ( /docs/next/cscli/cscli_dashboard )
185- * [ Track metrics with cscli] ( /docs/next/cscli/cscli_metrics )
186- * Provide SOC teams with actionable context
223+ ** References**
224+ - [ Notification plugins configuration] ( /docs/next/notification_plugins/intro )
225+ - [ CTI helpers in templates] ( /docs/next/notification_plugins/template_helpers )
226+ - [ Monitoring dashboards setup] ( /docs/next/cscli/cscli_dashboard )
227+ - [ Metrics tracking with cscli] ( /docs/next/cscli/cscli_metrics )
228+ - [ Console enrollment for CTI access] ( /docs/next/cscli/cscli_console_enroll )
187229
188230---
189231
190232## Threat Hunting and Intelligence
191233
192- ** What this solves: ** Enable proactive threat hunting with global intelligence correlation and local threat mirroring.
234+ Enable proactive threat hunting with access to global intelligence from 190+ countries, often 7-60 days ahead of other vendors.
193235
194- ### Hunting Capabilities
236+ ** Is it for me?**
237+ Ideal if you have a threat hunting team that needs fresh, contextual intelligence for proactive security investigations.
238+ Good option if you want to correlate local events with global attack patterns and emerging threats.
195239
196- * ** Console Integration**
197- * [ Enroll in CrowdSec Console] ( /docs/next/cscli/cscli_console_enroll )
198- * Access global CTI and CVE correlation data
199- * Use web interface for threat investigation
240+ ** How it works:**
241+ - Enroll your Security Engine in CrowdSec Console to access global CTI and CVE correlation data.
242+ - Use the web interface to investigate threat patterns and analyze attack trends.
243+ - Correlate your local security events with global crowd-sourced intelligence.
244+ - Export enriched threat data for integration with your existing threat hunting tools and workflows .
200245
201- * ** Intelligence Integration**
202- * Correlate local events with global threat patterns
203- * Export threat data for integration with hunting tools
204- * Track emerging threats and vulnerabilities
246+ ** References**
247+ - [ Console enrollment guide] ( /docs/next/cscli/cscli_console_enroll )
248+ - [ CTI integration documentation] ( /u/console/blocklists/subscription/ )
249+ - [ Global threat intelligence access] ( /u/integrations/intro )
250+ - [ VulnTracking Reports] ( https://www.crowdsec.net/blog ) (Monthly CVE analysis)
251+ - [ Threat investigation workflows] ( /docs/next/cscli/cscli_decisions )
205252
206253---
207254
0 commit comments