|
| 1 | +--- |
| 2 | +title: Use Cases and Quick Solutions |
| 3 | +id: usecases |
| 4 | +--- |
| 5 | + |
| 6 | +# Use Cases and Quick Solutions |
| 7 | + |
| 8 | +This page provides quick recommendations for common CrowdSec implementation scenarios. Each use case includes practical implementation paths with links to relevant documentation. |
| 9 | + |
| 10 | +:::tip |
| 11 | +New to CrowdSec? Start with our [installation guide](/u/getting_started/installation/linux) and [health check guide](/u/getting_started/health_check). |
| 12 | +::: |
| 13 | + |
| 14 | +import FormattedTabs from '@site/src/components/formatted-tabs'; |
| 15 | + |
| 16 | +## Block Known-Bad IPs at the Edge |
| 17 | + |
| 18 | +**What this solves:** Stop commodity scanners, botnets and repeat offenders at the network edge before they reach your services. |
| 19 | + |
| 20 | +### Firewall Integration |
| 21 | + |
| 22 | +* **Appliance Integration** |
| 23 | + * [OPNsense plugin setup](/docs/next/getting_started/install_crowdsec_opnsense) |
| 24 | + * [FreeBSD/pfSense installation](/docs/next/getting_started/install_crowdsec_freebsd) |
| 25 | + * [Managing bouncers with cscli](/docs/next/cscli/cscli_bouncers) |
| 26 | + |
| 27 | +* **OS Firewall Integration** |
| 28 | + * Configure your system firewall to consume CrowdSec decisions |
| 29 | + * Use blocklist integrations for automated IP blocking |
| 30 | + |
| 31 | +### Reverse Proxy/WAF Integration |
| 32 | + |
| 33 | +* **NGINX Reverse Proxy** |
| 34 | + * [WAF reverse proxy setup guide](/u/user_guides/waf_rp_howto) |
| 35 | + * [AppSec configuration](/docs/next/appsec/configuration) |
| 36 | + * [NGINX bouncer documentation](/u/bouncers/nginx) |
| 37 | + |
| 38 | +* **CDN/WAF Integration** |
| 39 | + * Configure your CDN or WAF to consume CrowdSec blocklists |
| 40 | + * Use bouncer components for real-time blocking |
| 41 | + |
| 42 | +### Security Engine Integration |
| 43 | + |
| 44 | +* **Blocklist Subscriptions** |
| 45 | + * [Monitor with cscli metrics](/docs/next/cscli/cscli_metrics) |
| 46 | + * [Manage decisions](/docs/next/cscli/cscli_decisions_list) |
| 47 | + * [Dashboard setup](/docs/next/cscli/cscli_dashboard) |
| 48 | + * Evaluate blocklist impact before full deployment |
| 49 | + |
| 50 | +--- |
| 51 | + |
| 52 | +## Reduce Resource Consumption |
| 53 | + |
| 54 | +**What this solves:** Eliminate automated noise, 404 probes, and malicious traffic to reduce server load and log volumes. |
| 55 | + |
| 56 | +### Implementation Options |
| 57 | + |
| 58 | +* Use any of the edge blocking methods described above |
| 59 | +* [Enable monitoring dashboards](/docs/next/cscli/cscli_dashboard) to measure impact |
| 60 | +* Track metrics with [cscli metrics](/docs/next/cscli/cscli_metrics) to quantify resource savings |
| 61 | + |
| 62 | +--- |
| 63 | + |
| 64 | +## Multi-Tenant Protection |
| 65 | + |
| 66 | +**What this solves:** Apply different security policies per customer, application, or environment without policy conflicts. |
| 67 | + |
| 68 | +### Implementation Approaches |
| 69 | + |
| 70 | +* **Custom Lists per Tenant** |
| 71 | + * [Configure centralized allowlists](/docs/next/local_api/centralized_allowlists) |
| 72 | + * [Filter decisions by origin or scenario](/docs/next/cscli/cscli_decisions_delete) |
| 73 | + * Use separate integration URLs for different tenant policies |
| 74 | + |
| 75 | +* **Environment Isolation** |
| 76 | + * [Manage contexts with cscli](/docs/next/cscli/cscli_contexts) |
| 77 | + * [Configure collections per environment](/docs/next/cscli/cscli_collections) |
| 78 | + * Separate AppSec rule sets by tenant requirements |
| 79 | + |
| 80 | +--- |
| 81 | + |
| 82 | +## SIEM/SOAR Integration |
| 83 | + |
| 84 | +**What this solves:** Enrich existing security tools with CrowdSec's threat intelligence and IOC streams. |
| 85 | + |
| 86 | +### IOC Management |
| 87 | + |
| 88 | +* **Import Custom IOCs** |
| 89 | + * [Import decisions from CSV/JSON](/docs/next/cscli/cscli_decisions_import) |
| 90 | + * Support for ban, captcha, and throttle actions |
| 91 | + * Tag with custom origins for tracking |
| 92 | + |
| 93 | +* **Alert Enrichment** |
| 94 | + * [Use CTI helpers in notification templates](/docs/next/notification_plugins/template_helpers) |
| 95 | + * Automatically enrich alerts with threat intelligence |
| 96 | + * [Configure notification plugins](/docs/next/notification_plugins/intro) |
| 97 | + |
| 98 | +* **MISP Integration** (Coming Soon) |
| 99 | + * Bidirectional IOC exchange with MISP platforms |
| 100 | + * Automated threat intelligence sharing |
| 101 | + |
| 102 | +--- |
| 103 | + |
| 104 | +## Web Application Protection |
| 105 | + |
| 106 | +**What this solves:** Quickly protect applications from OWASP Top-10 attacks and vulnerability probing. |
| 107 | + |
| 108 | +### AppSec Deployment |
| 109 | + |
| 110 | +* **Reverse Proxy WAF** |
| 111 | + * [Complete WAF setup guide](/u/user_guides/waf_rp_howto) |
| 112 | + * [AppSec configuration guide](/docs/next/appsec/configuration) |
| 113 | + * [Virtual patching with AppSec rules](/docs/next/appsec/configuration) |
| 114 | + |
| 115 | +* **Quick Deployment** |
| 116 | + * Install Security Engine on your reverse proxy |
| 117 | + * Enable AppSec collections for common attack patterns |
| 118 | + * Configure bouncer for real-time blocking |
| 119 | + |
| 120 | +--- |
| 121 | + |
| 122 | +## Bot and Scraper Management |
| 123 | + |
| 124 | +**What this solves:** Control aggressive crawlers and scraping tools while preserving legitimate user access. |
| 125 | + |
| 126 | +### Management Strategies |
| 127 | + |
| 128 | +* **Rate Limiting** |
| 129 | + * [Import throttle decisions](/docs/next/cscli/cscli_decisions_import) |
| 130 | + * Use `throttle` action type for rate limiting |
| 131 | + * Configure graduated responses (throttle → ban) |
| 132 | + |
| 133 | +* **Blocking Approaches** |
| 134 | + * Edge blocking via firewall or WAF integration |
| 135 | + * Behavioral detection with custom scenarios |
| 136 | + * IP reputation-based filtering |
| 137 | + |
| 138 | +--- |
| 139 | + |
| 140 | +## Legacy Application Protection |
| 141 | + |
| 142 | +**What this solves:** Add modern security controls to applications that cannot be modified directly. |
| 143 | + |
| 144 | +### Protection Strategies |
| 145 | + |
| 146 | +* **Transparent Proxy Protection** |
| 147 | + * [Deploy WAF at reverse proxy level](/u/user_guides/waf_rp_howto) |
| 148 | + * [Configure virtual patching rules](/docs/next/appsec/configuration) |
| 149 | + * Block exploits without application changes |
| 150 | + |
| 151 | +* **Custom Rule Development** |
| 152 | + * Adapt AppSec rules for legacy application patterns |
| 153 | + * Create custom scenarios for specific vulnerabilities |
| 154 | + * Test thoroughly to avoid breaking application functionality |
| 155 | + |
| 156 | +--- |
| 157 | + |
| 158 | +## Custom Behavior Protection |
| 159 | + |
| 160 | +**What this solves:** Create targeted protections for specific abuse patterns like spam, credential stuffing, or scalping attacks. |
| 161 | + |
| 162 | +### Custom Detection Development |
| 163 | + |
| 164 | +* **Scenario Customization** |
| 165 | + * [Manage scenarios with cscli](/docs/next/cscli/cscli_scenarios_install) |
| 166 | + * [Create custom scenarios](/docs/next/scenarios/create) |
| 167 | + * [Test scenarios with explain mode](/docs/next/cscli/cscli_explain) |
| 168 | + |
| 169 | +* **AppSec Rule Development** |
| 170 | + * [Configure custom AppSec rules](/docs/next/appsec/configuration) |
| 171 | + * Create pattern-matching rules for specific behaviors |
| 172 | + * Test rules in simulation mode before deployment |
| 173 | + |
| 174 | +--- |
| 175 | + |
| 176 | +## Alert Enhancement and Triage |
| 177 | + |
| 178 | +**What this solves:** Accelerate incident response with contextual threat intelligence and automated routing. |
| 179 | + |
| 180 | +### Enhancement Options |
| 181 | + |
| 182 | +* **Notification Enrichment** |
| 183 | + * [Configure notification plugins](/docs/next/notification_plugins/intro) |
| 184 | + * [Use CTI helpers in templates](/docs/next/notification_plugins/template_helpers) |
| 185 | + * Send enriched alerts to Slack, email, or SIEM |
| 186 | + |
| 187 | +* **Operational Dashboards** |
| 188 | + * [Set up monitoring dashboards](/docs/next/cscli/cscli_dashboard) |
| 189 | + * [Track metrics with cscli](/docs/next/cscli/cscli_metrics) |
| 190 | + * Provide SOC teams with actionable context |
| 191 | + |
| 192 | +--- |
| 193 | + |
| 194 | +## Threat Hunting and Intelligence |
| 195 | + |
| 196 | +**What this solves:** Enable proactive threat hunting with global intelligence correlation and local threat mirroring. |
| 197 | + |
| 198 | +### Hunting Capabilities |
| 199 | + |
| 200 | +* **Console Integration** |
| 201 | + * [Enroll in CrowdSec Console](/docs/next/cscli/cscli_console_enroll) |
| 202 | + * Access global CTI and CVE correlation data |
| 203 | + * Use web interface for threat investigation |
| 204 | + |
| 205 | +* **Intelligence Integration** |
| 206 | + * Correlate local events with global threat patterns |
| 207 | + * Export threat data for integration with hunting tools |
| 208 | + * Track emerging threats and vulnerabilities |
| 209 | + |
| 210 | +--- |
| 211 | + |
| 212 | +## Getting Started Resources |
| 213 | + |
| 214 | +If you're new to CrowdSec, start with these foundational guides: |
| 215 | + |
| 216 | +* [Install CrowdSec Security Engine](/u/getting_started/installation/linux) |
| 217 | +* [Configure log data sources](/docs/next/data_sources/file) |
| 218 | +* [Understand bouncers and remediation](/docs/next/cscli/cscli_bouncers) |
| 219 | +* [Set up Local API](/docs/next/local_api/intro) |
| 220 | +* [Complete health check guide](/u/getting_started/health_check) |
| 221 | + |
| 222 | +## Related Documentation |
| 223 | + |
| 224 | +* [Security Engine Troubleshooting](./security_engine) |
| 225 | +* [Remediation Components Troubleshooting](./remediation_components) |
| 226 | +* [CTI Integration Guide](./cti) |
0 commit comments