Tutorial

Protect Your Applications with AWS WAF and CrowdSec: Part I
Tutorial

Protect Your Applications with AWS WAF and CrowdSec: Part I

Learn how to configure the AWS WAF Remediation Component to protect applications running behind an ALB that can block both IPs and countries.

Protect Your Serverless Applications with AWS WAF and CrowdSec: Part II
Tutorial

Protect Your Serverless Applications with AWS WAF and CrowdSec: Part II

Learn how to protect your serverless applications hosted behind CloudFront or Application Load Balancer with CrowdSec and the AWS WAF.

Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS
Tutorial

Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS

In part II of this series, you learn about the three different ways to achieve secure TLS communications between your CrowdSec Security Engines in a multi-server setup.

Setting up A Multi-Server CrowdSec Security Engine Installation
Tutorial

Setting up A Multi-Server CrowdSec Security Engine Installation

In part I of this series, you learn how to deploy multiple Security Engines in a multi-server setup with one of the servers configured to store and share the collected signals.

Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy
Tutorial

Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy

Learn how to secure a TCP/UDP port and protect your services against DDoS attacks using CrowdSec and Traefik Proxy.

Monitoring CrowdSec with Prometheus and Grafana
Tutorial

Monitoring CrowdSec with Prometheus and Grafana

Monitor CrowdSec with Prometheus & Grafana to ensure optimal performance of your Security Engines and protection for your online infrastructure.

Enhance Docker Compose Security with CrowdSec and Traefik Proxy
Tutorial

Enhance Docker Compose Security with CrowdSec and Traefik Proxy

How have you been managing your Docker security without analyzing data? Learn how to enhance your Docker Compose security in this tutorial.

Detect and Block Port Scanning on pfSense with CrowdSec
Tutorial

Detect and Block Port Scanning on pfSense with CrowdSec

Learn how to install a CrowdSec package in a pfSense firewall to block incoming packets before they enter your internal network.

Detect and Block Post-Exploitation Attempts
Tutorial

Detect and Block Post-Exploitation Attempts

Learn how you can detect and block an attacker running a backdoor after exploiting a vulnerability in a web application.

Protect Your Websites with CrowdSec and Nginx Proxy Manager
Tutorial

Protect Your Websites with CrowdSec and Nginx Proxy Manager

Follow this tutorial and learn how to add an extra layer of protection to your websites with Nginx Proxy Manager and CrowdSec.

Monitoring Suspicious Behavior on Shared Hosting Platforms
Tutorial

Monitoring Suspicious Behavior on Shared Hosting Platforms

There are many risks associated with running a shared hosting service. Learn how to monitor and proactively mitigate some of these risks using CrowdSec.

Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers
Tutorial

Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers

Direct access to the CrowdSec CTI through the Security Engine helps you reduce alert fatigue, optimize triage, and make better and faster decisions.

Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System
Tutorial

Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System

Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.

A Guide to Continuous Deployment for the Overly Suspicious
Tutorial

A Guide to Continuous Deployment for the Overly Suspicious

Follow our journey and learn how to address the security aspects of Continuous Deployment while minimizing the risk of compromise.

How to Secure Ingress Traffic for a Fleet of Servers
Tutorial

How to Secure Ingress Traffic for a Fleet of Servers

Follow this walkthrough and learn how to levarage real-ime Decision Management and manage ingress traffic for a fleet of servers.

Monitor Audit Logs to Safeguard Your Kubernetes Infrastructure
Tutorial

Monitor Audit Logs to Safeguard Your Kubernetes Infrastructure

Safeguard your Kubernetes infrastructure against potential threats by monitoring Kubernetes audit logs using the CrowdSec Security Engine.

Exploring the CrowdSec Security Engine & open-appsec Open Source WAF Integration
Tutorial

Exploring the CrowdSec Security Engine & open-appsec Open Source WAF Integration

Learn how to use the combined strength of community-driven threat intelligence and innovative machine learning threat prevention to analyze attack behaviors.

Detecting Suspicious IP Behavior and Impossible Travel
Tutorial

Detecting Suspicious IP Behavior and Impossible Travel

Learn how to detect impossible travel and other suspicious IP behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.

Detect Security Incidents with AWS CloudTrail & CrowdSec Security Engine
Tutorial

Detect Security Incidents with AWS CloudTrail & CrowdSec Security Engine

Learn how to detect brute force and other security incidents on the AWS Console using AWS CloudTrail and the CrowdSec Security Engine.

Detecting Successful SSH Brute Force
Tutorial

Detecting Successful SSH Brute Force

Learn how to detect successful SSH brute force attacks and other advanced behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.

Hardening self-hosted Supabase with CrowdSec
Tutorial

Hardening self-hosted Supabase with CrowdSec

Follow this guide to learn how to secure your self-hosted Supabase deployment via docker-compose using CrowdSec for enhanced protection, detection of sophisticated attacks and capabilities to integrate in cloud-native workflows.