Implementing the CrowdSec WAF for Advanced Web Application Security
Transform your Security Engine into a WAF with this get-started guide and learn how to integrate and configure the AppSec Component with NGINX on Debian 12.
Tutorial
How to Waste Attacker Resources and Protect Your Applications in One Go
Discover the power of SpiderTrap Sinkholes combined with CrowdSec in this step-by-step guide to protect your applications and exhaust attackers’ resources.
Tutorial
Enhance Kubernetes Security with the CrowdSec WAF
Learn how to enhance the security of your Kubernetes applications with the CrowdSec WAF, using custom rules to block specific attack vectors.
Tutorial
Protect Your Applications with AWS WAF and CrowdSec: Part I
Learn how to configure the AWS WAF Remediation Component to protect applications running behind an ALB that can block both IPs and countries.
Tutorial
Protect Your Serverless Applications with AWS WAF and CrowdSec: Part II
Learn how to protect your serverless applications hosted behind CloudFront or Application Load Balancer with CrowdSec and the AWS WAF.
Tutorial
Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS
In part II of this series, you learn about the three different ways to achieve secure TLS communications between your CrowdSec Security Engines in a multi-server setup.
Tutorial
Setting up A Multi-Server CrowdSec Security Engine Installation
In part I of this series, you learn how to deploy multiple Security Engines in a multi-server setup with one of the servers configured to store and share the collected signals.
Tutorial
Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy
Learn how to secure a TCP/UDP port and protect your services against DDoS attacks using CrowdSec and Traefik Proxy.
Tutorial
Monitoring CrowdSec with Prometheus and Grafana
Monitor CrowdSec with Prometheus & Grafana to ensure optimal performance of your Security Engines and protection for your online infrastructure.
Tutorial
Enhance Docker Compose Security with CrowdSec and Traefik Proxy
How have you been managing your Docker security without analyzing data? Learn how to enhance your Docker Compose security in this tutorial.
Integrations
Detect and Block Port Scanning on pfSense with CrowdSec
Learn how to install a CrowdSec package in a pfSense firewall to block incoming packets before they enter your internal network.
Tutorial
Detect and Block Post-Exploitation Attempts
Learn how you can detect and block an attacker running a backdoor after exploiting a vulnerability in a web application.
Tutorial
Protect Your Websites with CrowdSec and Nginx Proxy Manager
Follow this tutorial and learn how to add an extra layer of protection to your websites with Nginx Proxy Manager and CrowdSec.
Tutorial
Monitoring Suspicious Behavior on Shared Hosting Platforms
There are many risks associated with running a shared hosting service. Learn how to monitor and proactively mitigate some of these risks using CrowdSec.
Tutorial
Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers
Direct access to the CrowdSec CTI through the Security Engine helps you reduce alert fatigue, optimize triage, and make better and faster decisions.
Tutorial
A Guide to Continuous Deployment for the Overly Suspicious
Explore a comprehensive guide to Continuous Deployment strategies and tools for enhanced security integration.
Tutorial
How to Secure Ingress Traffic for a Fleet of Servers
Follow this walkthrough and learn how to levarage real-ime Decision Management and manage ingress traffic for a fleet of servers.
Tutorial
Monitor Audit Logs to Safeguard Your Kubernetes Infrastructure
Safeguard your Kubernetes infrastructure against potential threats by monitoring Kubernetes audit logs using the CrowdSec Security Engine.
Tutorial
Exploring the CrowdSec Security Engine & open-appsec Open Source WAF Integration
Learn how to use the combined strength of community-driven threat intelligence and innovative machine learning threat prevention to analyze attack behaviors.
Tutorial
Detecting Suspicious IP Behavior and Impossible Travel
Learn how to detect impossible travel and other suspicious IP behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.
Tutorial
Detect Security Incidents with AWS CloudTrail & CrowdSec Security Engine
Learn how to detect brute force and other security incidents on the AWS Console using AWS CloudTrail and the CrowdSec Security Engine.