Protect Your Applications with AWS WAF and CrowdSec: Part I
Learn how to configure the AWS WAF Remediation Component to protect applications running behind an ALB that can block both IPs and countries.
Tutorial
Protect Your Serverless Applications with AWS WAF and CrowdSec: Part II
Learn how to protect your serverless applications hosted behind CloudFront or Application Load Balancer with CrowdSec and the AWS WAF.
Tutorial
Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS
In part II of this series, you learn about the three different ways to achieve secure TLS communications between your CrowdSec Security Engines in a multi-server setup.
Tutorial
Setting up A Multi-Server CrowdSec Security Engine Installation
In part I of this series, you learn how to deploy multiple Security Engines in a multi-server setup with one of the servers configured to store and share the collected signals.
Tutorial
Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy
Learn how to secure a TCP/UDP port and protect your services against DDoS attacks using CrowdSec and Traefik Proxy.
Tutorial
Monitoring CrowdSec with Prometheus and Grafana
Monitor CrowdSec with Prometheus & Grafana to ensure optimal performance of your Security Engines and protection for your online infrastructure.
Tutorial
Enhance Docker Compose Security with CrowdSec and Traefik Proxy
How have you been managing your Docker security without analyzing data? Learn how to enhance your Docker Compose security in this tutorial.
Tutorial
Detect and Block Port Scanning on pfSense with CrowdSec
Learn how to install a CrowdSec package in a pfSense firewall to block incoming packets before they enter your internal network.
Tutorial
Detect and Block Post-Exploitation Attempts
Learn how you can detect and block an attacker running a backdoor after exploiting a vulnerability in a web application.
Tutorial
Protect Your Websites with CrowdSec and Nginx Proxy Manager
Follow this tutorial and learn how to add an extra layer of protection to your websites with Nginx Proxy Manager and CrowdSec.
Tutorial
Monitoring Suspicious Behavior on Shared Hosting Platforms
There are many risks associated with running a shared hosting service. Learn how to monitor and proactively mitigate some of these risks using CrowdSec.
Tutorial
Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers
Direct access to the CrowdSec CTI through the Security Engine helps you reduce alert fatigue, optimize triage, and make better and faster decisions.
Tutorial
Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System
Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.
Tutorial
A Guide to Continuous Deployment for the Overly Suspicious
Follow our journey and learn how to address the security aspects of Continuous Deployment while minimizing the risk of compromise.
Tutorial
How to Secure Ingress Traffic for a Fleet of Servers
Follow this walkthrough and learn how to levarage real-ime Decision Management and manage ingress traffic for a fleet of servers.
Tutorial
Monitor Audit Logs to Safeguard Your Kubernetes Infrastructure
Safeguard your Kubernetes infrastructure against potential threats by monitoring Kubernetes audit logs using the CrowdSec Security Engine.
Tutorial
Exploring the CrowdSec Security Engine & open-appsec Open Source WAF Integration
Learn how to use the combined strength of community-driven threat intelligence and innovative machine learning threat prevention to analyze attack behaviors.
Tutorial
Detecting Suspicious IP Behavior and Impossible Travel
Learn how to detect impossible travel and other suspicious IP behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.
Tutorial
Detect Security Incidents with AWS CloudTrail & CrowdSec Security Engine
Learn how to detect brute force and other security incidents on the AWS Console using AWS CloudTrail and the CrowdSec Security Engine.
Tutorial
Detecting Successful SSH Brute Force
Learn how to detect successful SSH brute force attacks and other advanced behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.
Tutorial
Hardening self-hosted Supabase with CrowdSec
Follow this guide to learn how to secure your self-hosted Supabase deployment via docker-compose using CrowdSec for enhanced protection, detection of sophisticated attacks and capabilities to integrate in cloud-native workflows.