You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/troubleshooting/usecases.mdx
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,7 @@ New to CrowdSec? Start with our [installation guide](/u/getting_started/installa
17
17
Pull up-to-date IP lists from CrowdSec **Blocklist as a Service** endpoints into your edge protection.
18
18
19
19
**Is it for me?**
20
+
20
21
Ideal if you want direct integration into your firewalls.
21
22
Good option if you are not using a Security Engine and want your CDN or WAF to benefit from CrowdSec's blocklists.
22
23
@@ -44,6 +45,7 @@ Good option if you are not using a Security Engine and want your CDN or WAF to b
44
45
Eliminate automated noise from unwanted probes, spam and malicious traffic to reduce server load and log volumes by up to 80%.
45
46
46
47
**Is it for me?**
48
+
47
49
Ideal if you're experiencing high server load from automated traffic or want to reduce infrastructure costs.
48
50
Good option if you need to optimize server performance and reduce log storage requirements.
49
51
@@ -67,6 +69,7 @@ Good option if you need to optimize server performance and reduce log storage re
67
69
Apply different security policies per customer, application, tier, [...] retrieving contextualized IP Lists.
68
70
69
71
**Is it for me?**
72
+
70
73
Ideal if you're managing multiple customers, applications, or environments with different security requirements.
71
74
Good option if you need granular policy control and want to avoid cross-tenant security policy interference.
72
75
@@ -88,6 +91,7 @@ Good option if you need granular policy control and want to avoid cross-tenant s
88
91
Add qualified IOCs from CrowdSec's real-time IP reputation.
89
92
90
93
**Is it for me?**
94
+
91
95
Ideal if you want to complement your IOC insights with exclusive CrowdSec IP reputation data.
92
96
Quickly choose among qualified malicious actors regrouped by industry, behaviors...
93
97
@@ -113,6 +117,7 @@ Quickly choose among qualified malicious actors regrouped by industry, behaviors
113
117
Control aggressive crawlers and scraping tools while preserving legitimate user access using graduated response strategies.
114
118
115
119
**Is it for me?**
120
+
116
121
Ideal if you're dealing with aggressive bots or scrapers that impact your site performance.
117
122
Good option if you want to prevent illegitimate AI crawlers from visiting your site.
118
123
@@ -134,6 +139,7 @@ Good option if you want to prevent illegitimate AI crawlers from visiting your s
134
139
Quickly protect web applications from the latest CVEs and generic vulnerability exploits using CrowdSec WAF.
135
140
136
141
**Is it for me?**
142
+
137
143
Ideal if you want a modern OpenSource WAF solution.
138
144
Benefit from CrowdSec's Virtual patching catalog while being able to use your existing ModSecurity rules as is.
139
145
@@ -158,6 +164,7 @@ Benefit from CrowdSec's Virtual patching catalog while being able to use your ex
158
164
Add modern security controls to legacy applications that cannot be modified directly using transparent proxy protection.
159
165
160
166
**Is it for me?**
167
+
161
168
Ideal if you're running legacy applications that lack built-in security features.
162
169
Good option if you need immediate protection without the risk of modifying critical legacy code.
163
170
@@ -179,6 +186,7 @@ Good option if you need immediate protection without the risk of modifying criti
179
186
Create targeted protections for specific abuse patterns like **spam**, **credential stuffing**, or **scalping attacks**, [...] using custom detection rules or scenarios.
180
187
181
188
**Is it for me?**
189
+
182
190
Ideal if you're facing unique attack patterns not covered by standard security solutions.
183
191
Good option if you need highly specific protection tailored to your application's business logic and user patterns.
184
192
@@ -202,6 +210,7 @@ Good option if you need highly specific protection tailored to your application'
202
210
Accelerate incident response with contextual threat intelligence and automated routing to reduce alert volume by up to 80%.
203
211
204
212
**Is it for me?**
213
+
205
214
Ideal if your SOC team is overwhelmed with security alerts and needs better context for prioritization.
206
215
Add exclusive context to your alerts and automate incident response with up to 30+ IP reputation enrichment dimensions.
207
216
@@ -225,6 +234,7 @@ Add exclusive context to your alerts and automate incident response with up to 3
225
234
Enable proactive threat hunting with access to global intelligence from 190+ countries, often 7-60 days ahead of other vendors.
226
235
227
236
**Is it for me?**
237
+
228
238
Ideal if you have a threat hunting team that needs fresh, contextual intelligence for proactive security investigations.
229
239
Good option if you want to correlate local events with global attack patterns and emerging threats.
0 commit comments