You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/troubleshooting/usecases.mdx
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ New to CrowdSec? Start with our [installation guide](/u/getting_started/installa
16
16
17
17
Pull up-to-date IP lists from CrowdSec **Blocklist as a Service** endpoints into your edge protection.
18
18
19
-
**Is it for me?**
19
+
**Is it for me?**
20
20
Ideal if you want direct integration into your firewalls.
21
21
Good option if you are not using a Security Engine and want your CDN or WAF to benefit from CrowdSec's blocklists.
22
22
@@ -43,7 +43,7 @@ Good option if you are not using a Security Engine and want your CDN or WAF to b
43
43
44
44
Eliminate automated noise from unwanted probes, spam and malicious traffic to reduce server load and log volumes by up to 80%.
45
45
46
-
**Is it for me?**
46
+
**Is it for me?**
47
47
Ideal if you're experiencing high server load from automated traffic or want to reduce infrastructure costs.
48
48
Good option if you need to optimize server performance and reduce log storage requirements.
49
49
@@ -66,7 +66,7 @@ Good option if you need to optimize server performance and reduce log storage re
66
66
67
67
Apply different security policies per customer, application, tier, [...] retrieving contextualized IP Lists.
68
68
69
-
**Is it for me?**
69
+
**Is it for me?**
70
70
Ideal if you're managing multiple customers, applications, or environments with different security requirements.
71
71
Good option if you need granular policy control and want to avoid cross-tenant security policy interference.
72
72
@@ -87,7 +87,7 @@ Good option if you need granular policy control and want to avoid cross-tenant s
87
87
88
88
Add qualified IOCs from CrowdSec's real-time IP reputation.
89
89
90
-
**Is it for me?**
90
+
**Is it for me?**
91
91
Ideal if you want to complement your IOC insights with exclusive CrowdSec IP reputation data.
92
92
Quickly choose among qualified malicious actors regrouped by industry, behaviors...
93
93
@@ -112,7 +112,7 @@ Quickly choose among qualified malicious actors regrouped by industry, behaviors
112
112
113
113
Control aggressive crawlers and scraping tools while preserving legitimate user access using graduated response strategies.
114
114
115
-
**Is it for me?**
115
+
**Is it for me?**
116
116
Ideal if you're dealing with aggressive bots or scrapers that impact your site performance.
117
117
Good option if you want to prevent illegitimate AI crawlers from visiting your site.
118
118
@@ -133,7 +133,7 @@ Good option if you want to prevent illegitimate AI crawlers from visiting your s
133
133
134
134
Quickly protect web applications from the latest CVEs and generic vulnerability exploits using CrowdSec WAF.
135
135
136
-
**Is it for me?**
136
+
**Is it for me?**
137
137
Ideal if you want a modern OpenSource WAF solution.
138
138
Benefit from CrowdSec's Virtual patching catalog while being able to use your existing ModSecurity rules as is.
139
139
@@ -157,7 +157,7 @@ Benefit from CrowdSec's Virtual patching catalog while being able to use your ex
157
157
158
158
Add modern security controls to legacy applications that cannot be modified directly using transparent proxy protection.
159
159
160
-
**Is it for me?**
160
+
**Is it for me?**
161
161
Ideal if you're running legacy applications that lack built-in security features.
162
162
Good option if you need immediate protection without the risk of modifying critical legacy code.
163
163
@@ -178,7 +178,7 @@ Good option if you need immediate protection without the risk of modifying criti
178
178
179
179
Create targeted protections for specific abuse patterns like **spam**, **credential stuffing**, or **scalping attacks**, [...] using custom detection rules or scenarios.
180
180
181
-
**Is it for me?**
181
+
**Is it for me?**
182
182
Ideal if you're facing unique attack patterns not covered by standard security solutions.
183
183
Good option if you need highly specific protection tailored to your application's business logic and user patterns.
184
184
@@ -201,7 +201,7 @@ Good option if you need highly specific protection tailored to your application'
201
201
202
202
Accelerate incident response with contextual threat intelligence and automated routing to reduce alert volume by up to 80%.
203
203
204
-
**Is it for me?**
204
+
**Is it for me?**
205
205
Ideal if your SOC team is overwhelmed with security alerts and needs better context for prioritization.
206
206
Add exclusive context to your alerts and automate incident response with up to 30+ IP reputation enrichment dimensions.
207
207
@@ -224,7 +224,7 @@ Add exclusive context to your alerts and automate incident response with up to 3
224
224
225
225
Enable proactive threat hunting with access to global intelligence from 190+ countries, often 7-60 days ahead of other vendors.
226
226
227
-
**Is it for me?**
227
+
**Is it for me?**
228
228
Ideal if you have a threat hunting team that needs fresh, contextual intelligence for proactive security investigations.
229
229
Good option if you want to correlate local events with global attack patterns and emerging threats.
230
230
@@ -243,4 +243,4 @@ Good option if you want to correlate local events with global attack patterns an
243
243
244
244
## Useful Links
245
245
-[CrowdSec Public Roadmap ↗️](https://roadmap.crowdsec.net/tabs/3-planned)
0 commit comments