Skip to content

Commit 8bca7d0

Browse files
author
jdv
committed
manual changes to WAF section
1 parent 8cb51b7 commit 8bca7d0

File tree

1 file changed

+23
-24
lines changed

1 file changed

+23
-24
lines changed

crowdsec-docs/unversioned/troubleshooting/usecases.mdx

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -83,49 +83,48 @@ Good option if you need granular policy control and want to avoid cross-tenant s
8383

8484
---
8585

86-
## SIEM/SOAR Integration
86+
## Looking for complementary IOC streams
8787

88-
Enrich existing security tools with CrowdSec's real-time threat intelligence and IOC streams from 70,000+ global contributors.
88+
Add qualified IOCs from CrowdSec's real-time IP reputation.
8989

9090
**Is it for me?**
91-
Ideal if you're using SIEM/SOAR tools and want to enhance them with fresh, crowd-sourced threat intelligence.
92-
Good option if you need automated IOC management and want to reduce false positives in security alerts.
91+
Ideal if you want to complement your IOC insights with exclusive CrowdSec IP reputation data.
92+
Quickly choose among qualified malicious actors regrouped by industry, behaviors...
9393

9494
**How it works:**
95-
- Import custom IOCs from your existing tools using CSV/JSON format.
96-
- Configure notification plugins to automatically enrich alerts with contextual threat data.
97-
- Use CTI helpers in templates to add global intelligence context to security events.
98-
- Set up bidirectional data exchange with platforms like MISP for comprehensive threat sharing.
95+
- Stream CrowdSec IP Lists into your security tools.
96+
- Integrate directly in your security tools thanks to our integrations or easy to use CTI API.
97+
- 🏅 Get custom IOC streams made for your needs.([contact us ↗️](https://www.crowdsec.net/business-requests?interest=CTI%20subscription))
98+
- Next step: Enrich IPs via CrowdSec CTI API.
99+
99100

100101
**References**
101-
- [Import decisions from CSV/JSON](/docs/next/cscli/cscli_decisions_import)
102-
- [Notification plugins configuration](/docs/next/notification_plugins/intro)
103-
- [CTI helpers in templates](/docs/next/notification_plugins/template_helpers)
104-
- [Console enrollment for CTI access](/docs/next/cscli/cscli_console_enroll)
105-
- 🏅 [MISP Integration documentation](/docs/next/integrations/misp) (Coming Soon)
102+
- [IP reputation lists / Blocklists Catalog doc ↗️](https://app.crowdsec.net/blocklists/search)
103+
- [Retrieving merged lists via HTTPS endpoints](/u/integrations/intro)
104+
- [Retrieving Blocklists via API](/u/console/service_api/quickstart/blocklists#download-blocklist-content)
105+
- [MISP Feed from Security Engine's alerts](https://doc.crowdsec.net/u/bouncers/misp-feed-generator)
106+
- [Upcoming CrowdSec MISP Feeds ↗️](https://roadmap.crowdsec.net/c/48-misp-feed)
106107

107108
---
108109

109110
## Web Application Protection
110111

111-
Quickly protect web applications from OWASP Top-10 attacks and zero-day vulnerability probing with behavior-driven detection.
112+
Quickly protect web applications from the latest CVEs and generic vulnerability exploits using CrowdSec WAF.
112113

113114
**Is it for me?**
114-
Ideal if you need immediate protection for web applications against common attack patterns.
115-
Good option if you want virtual patching capabilities and real-time threat blocking without modifying application code.
115+
Ideal if you want a modern OpenSource WAF solution.
116+
Benefit from CrowdSec's Virtual patching catalog while being able to use your existing ModSecurity rules as is.
116117

117118
**How it works:**
118119
- Deploy CrowdSec Security Engine with AppSec module on your reverse proxy or web server.
119-
- Enable pre-built AppSec collections targeting OWASP Top-10 attack patterns.
120-
- Configure bouncers for real-time blocking of detected threats.
121-
- Implement virtual patching rules to protect against specific vulnerabilities.
120+
- Get CrowdSec Virtual patching collection.
121+
- Easily scale and identify behaviors accross multiple servers over time.
122+
- Go further by using your existing appsec rules.
123+
- Even test CRS rules out of band on your production traffic to easily adapt them to you needs.
124+
122125

123126
**References**
124-
- [Complete WAF setup guide](/u/user_guides/waf_rp_howto)
125-
- [AppSec configuration guide](/docs/next/appsec/configuration)
126-
- [Virtual patching with AppSec rules](/docs/next/appsec/configuration)
127-
- [Bouncer configuration](/docs/next/cscli/cscli_bouncers)
128-
- [Security Engine installation](/u/getting_started/installation/linux)
127+
- ...
129128

130129
---
131130

0 commit comments

Comments
 (0)