Skip to content

Commit 3d74b2b

Browse files
author
jdv
committed
usecase page WIP
1 parent 3737a0c commit 3d74b2b

File tree

1 file changed

+226
-0
lines changed

1 file changed

+226
-0
lines changed
Lines changed: 226 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,226 @@
1+
---
2+
title: Use Cases and Quick Solutions
3+
id: usecases
4+
---
5+
6+
# Use Cases and Quick Solutions
7+
8+
This page provides quick recommendations for common CrowdSec implementation scenarios. Each use case includes practical implementation paths with links to relevant documentation.
9+
10+
:::tip
11+
New to CrowdSec? Start with our [installation guide](/u/getting_started/installation/linux) and [health check guide](/u/getting_started/health_check).
12+
:::
13+
14+
import FormattedTabs from '@site/src/components/formatted-tabs';
15+
16+
## Block Known-Bad IPs at the Edge
17+
18+
**What this solves:** Stop commodity scanners, botnets and repeat offenders at the network edge before they reach your services.
19+
20+
### Firewall Integration
21+
22+
* **Appliance Integration**
23+
* [OPNsense plugin setup](/docs/next/getting_started/install_crowdsec_opnsense)
24+
* [FreeBSD/pfSense installation](/docs/next/getting_started/install_crowdsec_freebsd)
25+
* [Managing bouncers with cscli](/docs/next/cscli/cscli_bouncers)
26+
27+
* **OS Firewall Integration**
28+
* Configure your system firewall to consume CrowdSec decisions
29+
* Use blocklist integrations for automated IP blocking
30+
31+
### Reverse Proxy/WAF Integration
32+
33+
* **NGINX Reverse Proxy**
34+
* [WAF reverse proxy setup guide](/u/user_guides/waf_rp_howto)
35+
* [AppSec configuration](/docs/next/appsec/configuration)
36+
* [NGINX bouncer documentation](/u/bouncers/nginx)
37+
38+
* **CDN/WAF Integration**
39+
* Configure your CDN or WAF to consume CrowdSec blocklists
40+
* Use bouncer components for real-time blocking
41+
42+
### Security Engine Integration
43+
44+
* **Blocklist Subscriptions**
45+
* [Monitor with cscli metrics](/docs/next/cscli/cscli_metrics)
46+
* [Manage decisions](/docs/next/cscli/cscli_decisions_list)
47+
* [Dashboard setup](/docs/next/cscli/cscli_dashboard)
48+
* Evaluate blocklist impact before full deployment
49+
50+
---
51+
52+
## Reduce Resource Consumption
53+
54+
**What this solves:** Eliminate automated noise, 404 probes, and malicious traffic to reduce server load and log volumes.
55+
56+
### Implementation Options
57+
58+
* Use any of the edge blocking methods described above
59+
* [Enable monitoring dashboards](/docs/next/cscli/cscli_dashboard) to measure impact
60+
* Track metrics with [cscli metrics](/docs/next/cscli/cscli_metrics) to quantify resource savings
61+
62+
---
63+
64+
## Multi-Tenant Protection
65+
66+
**What this solves:** Apply different security policies per customer, application, or environment without policy conflicts.
67+
68+
### Implementation Approaches
69+
70+
* **Custom Lists per Tenant**
71+
* [Configure centralized allowlists](/docs/next/local_api/centralized_allowlists)
72+
* [Filter decisions by origin or scenario](/docs/next/cscli/cscli_decisions_delete)
73+
* Use separate integration URLs for different tenant policies
74+
75+
* **Environment Isolation**
76+
* [Manage contexts with cscli](/docs/next/cscli/cscli_contexts)
77+
* [Configure collections per environment](/docs/next/cscli/cscli_collections)
78+
* Separate AppSec rule sets by tenant requirements
79+
80+
---
81+
82+
## SIEM/SOAR Integration
83+
84+
**What this solves:** Enrich existing security tools with CrowdSec's threat intelligence and IOC streams.
85+
86+
### IOC Management
87+
88+
* **Import Custom IOCs**
89+
* [Import decisions from CSV/JSON](/docs/next/cscli/cscli_decisions_import)
90+
* Support for ban, captcha, and throttle actions
91+
* Tag with custom origins for tracking
92+
93+
* **Alert Enrichment**
94+
* [Use CTI helpers in notification templates](/docs/next/notification_plugins/template_helpers)
95+
* Automatically enrich alerts with threat intelligence
96+
* [Configure notification plugins](/docs/next/notification_plugins/intro)
97+
98+
* **MISP Integration** (Coming Soon)
99+
* Bidirectional IOC exchange with MISP platforms
100+
* Automated threat intelligence sharing
101+
102+
---
103+
104+
## Web Application Protection
105+
106+
**What this solves:** Quickly protect applications from OWASP Top-10 attacks and vulnerability probing.
107+
108+
### AppSec Deployment
109+
110+
* **Reverse Proxy WAF**
111+
* [Complete WAF setup guide](/u/user_guides/waf_rp_howto)
112+
* [AppSec configuration guide](/docs/next/appsec/configuration)
113+
* [Virtual patching with AppSec rules](/docs/next/appsec/configuration)
114+
115+
* **Quick Deployment**
116+
* Install Security Engine on your reverse proxy
117+
* Enable AppSec collections for common attack patterns
118+
* Configure bouncer for real-time blocking
119+
120+
---
121+
122+
## Bot and Scraper Management
123+
124+
**What this solves:** Control aggressive crawlers and scraping tools while preserving legitimate user access.
125+
126+
### Management Strategies
127+
128+
* **Rate Limiting**
129+
* [Import throttle decisions](/docs/next/cscli/cscli_decisions_import)
130+
* Use `throttle` action type for rate limiting
131+
* Configure graduated responses (throttle → ban)
132+
133+
* **Blocking Approaches**
134+
* Edge blocking via firewall or WAF integration
135+
* Behavioral detection with custom scenarios
136+
* IP reputation-based filtering
137+
138+
---
139+
140+
## Legacy Application Protection
141+
142+
**What this solves:** Add modern security controls to applications that cannot be modified directly.
143+
144+
### Protection Strategies
145+
146+
* **Transparent Proxy Protection**
147+
* [Deploy WAF at reverse proxy level](/u/user_guides/waf_rp_howto)
148+
* [Configure virtual patching rules](/docs/next/appsec/configuration)
149+
* Block exploits without application changes
150+
151+
* **Custom Rule Development**
152+
* Adapt AppSec rules for legacy application patterns
153+
* Create custom scenarios for specific vulnerabilities
154+
* Test thoroughly to avoid breaking application functionality
155+
156+
---
157+
158+
## Custom Behavior Protection
159+
160+
**What this solves:** Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks.
161+
162+
### Custom Detection Development
163+
164+
* **Scenario Customization**
165+
* [Manage scenarios with cscli](/docs/next/cscli/cscli_scenarios_install)
166+
* [Create custom scenarios](/docs/next/scenarios/create)
167+
* [Test scenarios with explain mode](/docs/next/cscli/cscli_explain)
168+
169+
* **AppSec Rule Development**
170+
* [Configure custom AppSec rules](/docs/next/appsec/configuration)
171+
* Create pattern-matching rules for specific behaviors
172+
* Test rules in simulation mode before deployment
173+
174+
---
175+
176+
## Alert Enhancement and Triage
177+
178+
**What this solves:** Accelerate incident response with contextual threat intelligence and automated routing.
179+
180+
### Enhancement Options
181+
182+
* **Notification Enrichment**
183+
* [Configure notification plugins](/docs/next/notification_plugins/intro)
184+
* [Use CTI helpers in templates](/docs/next/notification_plugins/template_helpers)
185+
* Send enriched alerts to Slack, email, or SIEM
186+
187+
* **Operational Dashboards**
188+
* [Set up monitoring dashboards](/docs/next/cscli/cscli_dashboard)
189+
* [Track metrics with cscli](/docs/next/cscli/cscli_metrics)
190+
* Provide SOC teams with actionable context
191+
192+
---
193+
194+
## Threat Hunting and Intelligence
195+
196+
**What this solves:** Enable proactive threat hunting with global intelligence correlation and local threat mirroring.
197+
198+
### Hunting Capabilities
199+
200+
* **Console Integration**
201+
* [Enroll in CrowdSec Console](/docs/next/cscli/cscli_console_enroll)
202+
* Access global CTI and CVE correlation data
203+
* Use web interface for threat investigation
204+
205+
* **Intelligence Integration**
206+
* Correlate local events with global threat patterns
207+
* Export threat data for integration with hunting tools
208+
* Track emerging threats and vulnerabilities
209+
210+
---
211+
212+
## Getting Started Resources
213+
214+
If you're new to CrowdSec, start with these foundational guides:
215+
216+
* [Install CrowdSec Security Engine](/u/getting_started/installation/linux)
217+
* [Configure log data sources](/docs/next/data_sources/file)
218+
* [Understand bouncers and remediation](/docs/next/cscli/cscli_bouncers)
219+
* [Set up Local API](/docs/next/local_api/intro)
220+
* [Complete health check guide](/u/getting_started/health_check)
221+
222+
## Related Documentation
223+
224+
* [Security Engine Troubleshooting](./security_engine)
225+
* [Remediation Components Troubleshooting](./remediation_components)
226+
* [CTI Integration Guide](./cti)

0 commit comments

Comments
 (0)