Skip to content

Commit 182aba3

Browse files
author
jdv
committed
format change, section 1+2 hand modified, rest is claude suggestions (to change)
1 parent 7bd59c3 commit 182aba3

File tree

1 file changed

+137
-90
lines changed

1 file changed

+137
-90
lines changed

crowdsec-docs/unversioned/troubleshooting/usecases.mdx

Lines changed: 137 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -45,163 +45,210 @@ Good option if you are not using a Security Engine and want your CDN or WAF to b
4545

4646
---
4747

48-
## Reduce Resource Consumption
48+
## Reduce Noise to save Resources address alert fatigue
4949

50-
**What this solves:** Eliminate automated noise, 404 probes, and malicious traffic to reduce server load and log volumes.
50+
Eliminate automated noise from unwanted probes, spam and malicious traffic to reduce server load and log volumes by up to 80%.
5151

52-
### Implementation Options
52+
**Is it for me?**
53+
Ideal if you're experiencing high server load from automated traffic or want to reduce infrastructure costs.
54+
Good option if you need to optimize server performance and reduce log storage requirements.
55+
56+
**How it works:**
57+
- Use CrowdSec blocklists to preemptively block crowd validated noise.
58+
- Go further by deploying CrowdSec Security Engine to detect malicious patterns in your traffic.
59+
- Use an AppSec enabled Remediation Component to use CrowdSec WAF.
60+
- Track quantified savings through metrics and performance monitoring.
5361

54-
* Use any of the edge blocking methods described above
55-
* [Enable monitoring dashboards](/docs/next/cscli/cscli_dashboard) to measure impact
56-
* Track metrics with [cscli metrics](/docs/next/cscli/cscli_metrics) to quantify resource savings
62+
**References**
63+
- [Blocklist Catalog doc](/u/console/blocklists/catalog)
64+
- [Blocklist Catalog ↗️](https://app.crowdsec.net/blocklists/search)
65+
- [Security Engine installation](/u/getting_started/intro)
66+
- [CrowdSec WAF](/appsec/intro)
67+
- [Remediation Metrics](/u/console/remediation_metrics)
5768

5869
---
5970

6071
## Multi-Tenant Protection
6172

62-
**What this solves:** Apply different security policies per customer, application, or environment without policy conflicts.
73+
Apply different security policies per customer, application, or environment without policy conflicts using flexible context management.
6374

64-
### Implementation Approaches
75+
**Is it for me?**
76+
Ideal if you're managing multiple customers, applications, or environments with different security requirements.
77+
Good option if you need granular policy control and want to avoid cross-tenant security policy interference.
6578

66-
* **Custom Lists per Tenant**
67-
* [Configure centralized allowlists](/docs/next/local_api/centralized_allowlists)
68-
* [Filter decisions by origin or scenario](/docs/next/cscli/cscli_decisions_delete)
69-
* Use separate integration URLs for different tenant policies
79+
**How it works:**
80+
- Configure separate contexts for each tenant using cscli context management.
81+
- Set up centralized allowlists with tenant-specific filtering rules.
82+
- Create distinct integration endpoints for different tenant policies.
83+
- Deploy separate AppSec rule sets tailored to each tenant's requirements.
7084

71-
* **Environment Isolation**
72-
* [Manage contexts with cscli](/docs/next/cscli/cscli_contexts)
73-
* [Configure collections per environment](/docs/next/cscli/cscli_collections)
74-
* Separate AppSec rule sets by tenant requirements
85+
**References**
86+
- [Context management with cscli](/docs/next/cscli/cscli_contexts)
87+
- [Centralized allowlists configuration](/docs/next/local_api/centralized_allowlists)
88+
- [Decision filtering by origin](/docs/next/cscli/cscli_decisions_delete)
89+
- [Collections per environment](/docs/next/cscli/cscli_collections)
90+
- [AppSec configuration guide](/docs/next/appsec/configuration)
7591

7692
---
7793

7894
## SIEM/SOAR Integration
7995

80-
**What this solves:** Enrich existing security tools with CrowdSec's threat intelligence and IOC streams.
81-
82-
### IOC Management
96+
Enrich existing security tools with CrowdSec's real-time threat intelligence and IOC streams from 70,000+ global contributors.
8397

84-
* **Import Custom IOCs**
85-
* [Import decisions from CSV/JSON](/docs/next/cscli/cscli_decisions_import)
86-
* Support for ban, captcha, and throttle actions
87-
* Tag with custom origins for tracking
98+
**Is it for me?**
99+
Ideal if you're using SIEM/SOAR tools and want to enhance them with fresh, crowd-sourced threat intelligence.
100+
Good option if you need automated IOC management and want to reduce false positives in security alerts.
88101

89-
* **Alert Enrichment**
90-
* [Use CTI helpers in notification templates](/docs/next/notification_plugins/template_helpers)
91-
* Automatically enrich alerts with threat intelligence
92-
* [Configure notification plugins](/docs/next/notification_plugins/intro)
102+
**How it works:**
103+
- Import custom IOCs from your existing tools using CSV/JSON format.
104+
- Configure notification plugins to automatically enrich alerts with contextual threat data.
105+
- Use CTI helpers in templates to add global intelligence context to security events.
106+
- Set up bidirectional data exchange with platforms like MISP for comprehensive threat sharing.
93107

94-
* **MISP Integration** (Coming Soon)
95-
* Bidirectional IOC exchange with MISP platforms
96-
* Automated threat intelligence sharing
108+
**References**
109+
- [Import decisions from CSV/JSON](/docs/next/cscli/cscli_decisions_import)
110+
- [Notification plugins configuration](/docs/next/notification_plugins/intro)
111+
- [CTI helpers in templates](/docs/next/notification_plugins/template_helpers)
112+
- [Console enrollment for CTI access](/docs/next/cscli/cscli_console_enroll)
113+
- 🏅 [MISP Integration documentation](/docs/next/integrations/misp) (Coming Soon)
97114

98115
---
99116

100117
## Web Application Protection
101118

102-
**What this solves:** Quickly protect applications from OWASP Top-10 attacks and vulnerability probing.
119+
Quickly protect web applications from OWASP Top-10 attacks and zero-day vulnerability probing with behavior-driven detection.
103120

104-
### AppSec Deployment
121+
**Is it for me?**
122+
Ideal if you need immediate protection for web applications against common attack patterns.
123+
Good option if you want virtual patching capabilities and real-time threat blocking without modifying application code.
105124

106-
* **Reverse Proxy WAF**
107-
* [Complete WAF setup guide](/u/user_guides/waf_rp_howto)
108-
* [AppSec configuration guide](/docs/next/appsec/configuration)
109-
* [Virtual patching with AppSec rules](/docs/next/appsec/configuration)
125+
**How it works:**
126+
- Deploy CrowdSec Security Engine with AppSec module on your reverse proxy or web server.
127+
- Enable pre-built AppSec collections targeting OWASP Top-10 attack patterns.
128+
- Configure bouncers for real-time blocking of detected threats.
129+
- Implement virtual patching rules to protect against specific vulnerabilities.
110130

111-
* **Quick Deployment**
112-
* Install Security Engine on your reverse proxy
113-
* Enable AppSec collections for common attack patterns
114-
* Configure bouncer for real-time blocking
131+
**References**
132+
- [Complete WAF setup guide](/u/user_guides/waf_rp_howto)
133+
- [AppSec configuration guide](/docs/next/appsec/configuration)
134+
- [Virtual patching with AppSec rules](/docs/next/appsec/configuration)
135+
- [Bouncer configuration](/docs/next/cscli/cscli_bouncers)
136+
- [Security Engine installation](/u/getting_started/installation/linux)
115137

116138
---
117139

118140
## Bot and Scraper Management
119141

120-
**What this solves:** Control aggressive crawlers and scraping tools while preserving legitimate user access.
142+
Control aggressive crawlers and scraping tools while preserving legitimate user access using graduated response strategies.
121143

122-
### Management Strategies
144+
**Is it for me?**
145+
Ideal if you're dealing with aggressive bots or scrapers that impact your site performance.
146+
Good option if you need granular control over automated traffic without blocking legitimate users or search engines.
123147

124-
* **Rate Limiting**
125-
* [Import throttle decisions](/docs/next/cscli/cscli_decisions_import)
126-
* Use `throttle` action type for rate limiting
127-
* Configure graduated responses (throttle → ban)
148+
**How it works:**
149+
- Configure behavioral detection scenarios to identify suspicious crawling patterns.
150+
- Implement graduated responses starting with throttling, escalating to temporary bans.
151+
- Use specialized AI Crawlers Blocklist to block known malicious crawling IPs.
152+
- Deploy edge blocking through firewall or CDN integration for immediate protection.
128153

129-
* **Blocking Approaches**
130-
* Edge blocking via firewall or WAF integration
131-
* Behavioral detection with custom scenarios
132-
* IP reputation-based filtering
154+
**References**
155+
- [Import throttle decisions](/docs/next/cscli/cscli_decisions_import)
156+
- [Custom scenario creation](/docs/next/scenarios/create)
157+
- [AI Crawlers Blocklist subscription](/u/console/blocklists/subscription/)
158+
- [Edge integration options](/u/integrations/intro)
159+
- [Behavioral detection configuration](/docs/next/scenarios/introduction)
133160

134161
---
135162

136163
## Legacy Application Protection
137164

138-
**What this solves:** Add modern security controls to applications that cannot be modified directly.
165+
Add modern security controls to legacy applications that cannot be modified directly using transparent proxy protection.
139166

140-
### Protection Strategies
167+
**Is it for me?**
168+
Ideal if you're running legacy applications that lack built-in security features.
169+
Good option if you need immediate protection without the risk of modifying critical legacy code.
141170

142-
* **Transparent Proxy Protection**
143-
* [Deploy WAF at reverse proxy level](/u/user_guides/waf_rp_howto)
144-
* [Configure virtual patching rules](/docs/next/appsec/configuration)
145-
* Block exploits without application changes
171+
**How it works:**
172+
- Deploy CrowdSec WAF at the reverse proxy level in front of your legacy application.
173+
- Configure virtual patching rules to block known exploits targeting your application stack.
174+
- Create custom AppSec rules adapted to your legacy application's specific patterns.
175+
- Test protection rules in simulation mode before enabling blocking to ensure application functionality.
146176

147-
* **Custom Rule Development**
148-
* Adapt AppSec rules for legacy application patterns
149-
* Create custom scenarios for specific vulnerabilities
150-
* Test thoroughly to avoid breaking application functionality
177+
**References**
178+
- [Complete WAF setup guide](/u/user_guides/waf_rp_howto)
179+
- [AppSec configuration guide](/docs/next/appsec/configuration)
180+
- [Virtual patching rules](/docs/next/appsec/configuration)
181+
- [Custom scenario creation](/docs/next/scenarios/create)
182+
- [Testing with explain mode](/docs/next/cscli/cscli_explain)
151183

152184
---
153185

154186
## Custom Behavior Protection
155187

156-
**What this solves:** Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks.
188+
Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks using custom detection rules.
157189

158-
### Custom Detection Development
190+
**Is it for me?**
191+
Ideal if you're facing unique attack patterns not covered by standard security solutions.
192+
Good option if you need highly specific protection tailored to your application's business logic and user patterns.
159193

160-
* **Scenario Customization**
161-
* [Manage scenarios with cscli](/docs/next/cscli/cscli_scenarios_install)
162-
* [Create custom scenarios](/docs/next/scenarios/create)
163-
* [Test scenarios with explain mode](/docs/next/cscli/cscli_explain)
194+
**How it works:**
195+
- Analyze your specific abuse patterns to understand attacker behavior.
196+
- Create custom scenarios using CrowdSec's scenario framework for behavioral detection.
197+
- Develop AppSec rules for pattern-matching specific malicious requests.
198+
- Test custom rules thoroughly using explain mode and simulation before production deployment.
164199

165-
* **AppSec Rule Development**
166-
* [Configure custom AppSec rules](/docs/next/appsec/configuration)
167-
* Create pattern-matching rules for specific behaviors
168-
* Test rules in simulation mode before deployment
200+
**References**
201+
- [Custom scenario creation](/docs/next/scenarios/create)
202+
- [Scenario management with cscli](/docs/next/cscli/cscli_scenarios_install)
203+
- [Testing scenarios with explain mode](/docs/next/cscli/cscli_explain)
204+
- [Custom AppSec rules configuration](/docs/next/appsec/configuration)
205+
- [Scenario testing and validation](/docs/next/scenarios/intro)
169206

170207
---
171208

172209
## Alert Enhancement and Triage
173210

174-
**What this solves:** Accelerate incident response with contextual threat intelligence and automated routing.
211+
Accelerate incident response with contextual threat intelligence and automated routing to reduce alert volume by up to 80%.
175212

176-
### Enhancement Options
213+
**Is it for me?**
214+
Ideal if your SOC team is overwhelmed with security alerts and needs better context for prioritization.
215+
Good option if you want to automate alert enrichment and reduce time-to-response for security incidents.
177216

178-
* **Notification Enrichment**
179-
* [Configure notification plugins](/docs/next/notification_plugins/intro)
180-
* [Use CTI helpers in templates](/docs/next/notification_plugins/template_helpers)
181-
* Send enriched alerts to Slack, email, or SIEM
217+
**How it works:**
218+
- Configure notification plugins to automatically enrich alerts with global threat intelligence context.
219+
- Set up CTI helpers in templates to add reputation data, attack patterns, and geographic context.
220+
- Deploy operational dashboards for SOC teams to visualize threats and track security metrics.
221+
- Integrate with existing SIEM/SOAR tools to enhance existing alert workflows.
182222

183-
* **Operational Dashboards**
184-
* [Set up monitoring dashboards](/docs/next/cscli/cscli_dashboard)
185-
* [Track metrics with cscli](/docs/next/cscli/cscli_metrics)
186-
* Provide SOC teams with actionable context
223+
**References**
224+
- [Notification plugins configuration](/docs/next/notification_plugins/intro)
225+
- [CTI helpers in templates](/docs/next/notification_plugins/template_helpers)
226+
- [Monitoring dashboards setup](/docs/next/cscli/cscli_dashboard)
227+
- [Metrics tracking with cscli](/docs/next/cscli/cscli_metrics)
228+
- [Console enrollment for CTI access](/docs/next/cscli/cscli_console_enroll)
187229

188230
---
189231

190232
## Threat Hunting and Intelligence
191233

192-
**What this solves:** Enable proactive threat hunting with global intelligence correlation and local threat mirroring.
234+
Enable proactive threat hunting with access to global intelligence from 190+ countries, often 7-60 days ahead of other vendors.
193235

194-
### Hunting Capabilities
236+
**Is it for me?**
237+
Ideal if you have a threat hunting team that needs fresh, contextual intelligence for proactive security investigations.
238+
Good option if you want to correlate local events with global attack patterns and emerging threats.
195239

196-
* **Console Integration**
197-
* [Enroll in CrowdSec Console](/docs/next/cscli/cscli_console_enroll)
198-
* Access global CTI and CVE correlation data
199-
* Use web interface for threat investigation
240+
**How it works:**
241+
- Enroll your Security Engine in CrowdSec Console to access global CTI and CVE correlation data.
242+
- Use the web interface to investigate threat patterns and analyze attack trends.
243+
- Correlate your local security events with global crowd-sourced intelligence.
244+
- Export enriched threat data for integration with your existing threat hunting tools and workflows.
200245

201-
* **Intelligence Integration**
202-
* Correlate local events with global threat patterns
203-
* Export threat data for integration with hunting tools
204-
* Track emerging threats and vulnerabilities
246+
**References**
247+
- [Console enrollment guide](/docs/next/cscli/cscli_console_enroll)
248+
- [CTI integration documentation](/u/console/blocklists/subscription/)
249+
- [Global threat intelligence access](/u/integrations/intro)
250+
- [VulnTracking Reports](https://www.crowdsec.net/blog) (Monthly CVE analysis)
251+
- [Threat investigation workflows](/docs/next/cscli/cscli_decisions)
205252

206253
---
207254

0 commit comments

Comments
 (0)