You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/api_cves.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -315,6 +315,10 @@ curl -X 'GET' \
315
315
316
316
You can subscribe and unsubscribe firewall integrations to specific CVEs via the API. See [Integrations & Blocklists](./api_integrations) for full details on creating and managing integrations.
317
317
318
+
:::tip
319
+
For broader coverage, consider subscribing to a **vendor** instead of individual CVEs. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendor Subscriptions](./api_lookups#subscribe-an-integration-to-a-vendor).
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/api_fingerprints.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -204,6 +204,10 @@ curl -X 'GET' \
204
204
205
205
## Manage Fingerprint Integration Subscriptions
206
206
207
+
:::tip
208
+
For broader coverage, consider subscribing to a **vendor** instead of individual fingerprint rules. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendor Subscriptions](./api_lookups#subscribe-an-integration-to-a-vendor).
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/api_integrations.mdx
+20-6Lines changed: 20 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,11 @@ title: Integrations & Blocklists
6
6
importTabsfrom"@theme/Tabs";
7
7
importTabItemfrom"@theme/TabItem";
8
8
9
-
Integrations are the bridge between CrowdSec's threat intelligence and your security infrastructure. An integration generates a blocklist of attacker IPs that your firewall can consume. You subscribe integrations to specific CVEs or fingerprint rules, and the blocklist automatically updates as new attacker IPs are observed.
9
+
Integrations are the bridge between CrowdSec's threat intelligence and your security infrastructure. An integration generates a blocklist of attacker IPs that your firewall can consume. You subscribe integrations to specific CVEs, fingerprint rules, or entire vendors, and the blocklist automatically updates as new attacker IPs are observed.
10
+
11
+
:::tip Vendor Subscriptions
12
+
Instead of subscribing to CVEs and fingerprint rules one by one, you can subscribe an integration to a **vendor**. This automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendors, Products & Tags](./api_lookups#subscribe-an-integration-to-a-vendor) for details.
13
+
:::
10
14
11
15
## Supported Output Formats
12
16
@@ -114,6 +118,7 @@ The integration credentials (API key or username/password depending on type) are
114
118
|`output_format`| string | Blocklist format (see table above) |
115
119
|`cves`| array | CVE subscriptions (each with `id`) |
|`vendors`| array | Vendor subscriptions (each with `id`). Subscribing to a vendor automatically covers all current and future CVEs and reconnaissance rules for that vendor. |
117
122
|`blocklists`| array | Blocklist subscriptions |
118
123
|`endpoint`| string | URL for fetching the integration's blocklist content |
119
124
|`stats`| object | Statistics including `count` (number of IPs in the blocklist) |
@@ -291,7 +296,7 @@ except HTTPStatusError as e:
291
296
</TabItem>
292
297
</Tabs>
293
298
294
-
Use the `force=true` query parameter to delete an integration even if it has active CVEor fingerprint subscriptions.
299
+
Use the `force=true` query parameter to delete an integration even if it has active CVE, fingerprint, or vendor subscriptions.
295
300
296
301
## Get Integration Content (Blocklist)
297
302
@@ -323,29 +328,38 @@ This is compatible with CrowdSec's remediation component protocol.
323
328
324
329
## End-to-End Workflow
325
330
326
-
Here's a complete example: create an integration, subscribe it to a CVE and a fingerprint rule, and verify the blocklist.
331
+
Here's a complete example: create an integration, subscribe it to a vendor, a CVE, and a fingerprint rule, and verify the blocklist.
Vendor subscriptions are the simplest way to get broad coverage. Subscribe to the vendors in your technology stack, then add individual CVE or fingerprint subscriptions only for threats outside those vendors.
361
+
:::
362
+
349
363
## Next Steps
350
364
351
365
Once your integration is created and subscribed, configure your firewall to fetch the blocklist URL at regular intervals. See the [CrowdSec Integrations documentation](https://docs.crowdsec.net/u/integrations/intro) for vendor-specific setup guides.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/api_lookups.mdx
+80-1Lines changed: 80 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,6 +116,85 @@ curl -X 'GET' \
116
116
-H 'x-api-key: ${KEY}'
117
117
```
118
118
119
+
### Subscribe an Integration to a Vendor
120
+
121
+
Subscribing an integration to a vendor automatically covers **all current and future CVEs and reconnaissance rules** for that vendor's products. When a new CVE or reconnaissance rule is added for the vendor, the integration's blocklist is updated automatically — no action needed on your part.
Vendor subscriptions are the simplest way to get broad coverage for your technology stack. Subscribe to the vendors you rely on, and you'll automatically be protected against all tracked threats for their products — including new ones added in the future.
Products are specific software applications (e.g., Exchange Server, BIG-IP, WordPress).
@@ -155,4 +234,4 @@ These lookup endpoints are particularly useful for:
155
234
-**Asset-based monitoring**: "Show me all tracked threats for the products in my technology stack."
156
235
-**Coverage assessment**: "How many vulnerabilities affecting WordPress does CrowdSec track?"
157
236
-**Reporting**: "What's the overall threat landscape for enterprise software this month?"
158
-
-**Automation**: Build scripts that automatically subscribe integrations to all new CVEs for your vendor ecosystem.
237
+
-**Vendor subscriptions**: Subscribe an integration to your vendors and automatically receive blocklist coverage for all their current and future CVEs and reconnaissance rules — no scripting required.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/guide_proactive.mdx
+28-9Lines changed: 28 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,16 +48,35 @@ curl -X 'GET' \
48
48
-H 'x-api-key: ${KEY}'
49
49
```
50
50
51
-
## Step 3: Set Up Fingerprint Monitoring
51
+
## Step 3: Subscribe to Your Vendors
52
52
53
-
[Fingerprint rules](./fingerprints_vs_cves) give you broadcoverage for product families. Even if a new CVE drops tomorrow for Exchange, the "Microsoft Exchange Probing" fingerprint rule already captures reconnaissance activity.
53
+
The simplest way to get broad, ongoing coverage is to subscribe your integration to the **vendors** in your technology stack. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products — when a new threat is added, your blocklist is updated without any action on your part.
54
54
55
-
1. Identify fingerprint rules matching your products
56
-
2. Create a firewall integration (if you don't have one)
57
-
3. Subscribe the integration to relevant fingerprint rules
55
+
1. Create a firewall integration (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
56
+
2. Subscribe the integration to each vendor you rely on
58
57
59
58
```bash
60
-
# Subscribe to Microsoft Exchange probing detection
Check the tracker regularly (or automate it) for new CVEs affecting your stack:
90
+
If you've subscribed to your vendors (Step 3), new CVEs are automatically covered in your blocklist. However, you'll still want to monitor the threat landscape for situational awareness and to inform patching priorities:
72
91
73
92
```bash
74
93
# Get the latest detection rules, sorted by release date
@@ -88,7 +107,7 @@ For each new CVE that affects your products:
88
107
89
108
1. Check the **CrowdSec Score** and **Exploitation Phase**
90
109
2. Read the **CrowdSec Analysis** for exploitation context
91
-
3.Subscribe your integration if the threat warrants immediate blocklist protection
110
+
3.If the CVE is from a vendor you've subscribed to, your blocklist is already protecting you. If not, subscribe the integration to the CVE directly.
92
111
4. Open a patching ticket with the appropriate priority
93
112
94
113
## Step 5: Build a Monitoring Script
@@ -137,6 +156,6 @@ for alert in sorted(alerts, key=lambda x: x["score"], reverse=True):
137
156
The Live Exploit Tracker API can feed data into:
138
157
139
158
-**SIEM**: Enrich alerts with CrowdSec Scores and exploitation context. When your SIEM fires an alert for a CVE, automatically look up the CrowdSec intelligence to assign priority.
140
-
-**SOAR**: Build playbooks that automatically create blocklist subscriptions when a new high-severity CVE is detected for your products.
159
+
-**SOAR**: Build playbooks that react to new high-severity CVEs. If you're using vendor subscriptions, the blocklist is already covered — your playbook can focus on escalation, ticket creation, and patching workflows.
141
160
-**Vulnerability Management**: Correlate your vulnerability scanner findings with real-world exploitation data to reorder your patch queue.
142
161
-**Reporting Dashboards**: Pull scores and phase data into your security dashboard to give leadership a real-time view of the threat landscape.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/guide_triage.mdx
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,9 +87,10 @@ Based on what you've found:
87
87
88
88
If the situation calls for immediate mitigation:
89
89
90
-
1.**Create a firewall integration** (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
91
-
2.**Subscribe it to the CVE** — either via the web interface or API
92
-
3. Your firewall will start blocking known attacker IPs automatically
90
+
1.**Check your vendor subscriptions first** — if you've already subscribed an integration to this CVE's vendor, your blocklist is already covering this threat automatically.
91
+
2. If not, **create a firewall integration** (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
92
+
3.**Subscribe it to the CVE** (or to the vendor for broader coverage) — either via the web interface or API
93
+
4. Your firewall will start blocking known attacker IPs automatically
93
94
94
95
This buys you time while you schedule and deploy the patch.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/overview.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Each tracked CVE also includes a **CrowdSec Analysis** — a human-readable inte
38
38
Once you've identified a threat, the tracker lets you act on it:
39
39
40
40
-**IP Intelligence**: View every IP address observed exploiting a specific CVE or probing a specific product, enriched with CTI data including reputation, geolocation, known classifications, and behavioral history.
41
-
-**Firewall Integrations**: Create blocklists that automatically feed malicious IPs into your firewalls (Palo Alto, FortiGate, Cisco, pfSense, OPNsense, and more). Subscribe an integration to one or more CVEs, and the blocklist stays current as new attacker IPs are observed.
41
+
-**Firewall Integrations**: Create blocklists that automatically feed malicious IPs into your firewalls (Palo Alto, FortiGate, Cisco, pfSense, OPNsense, and more). Subscribe an integration to entire vendors, specific CVEs, or reconnaissance rules, and the blocklist stays current as new attacker IPs are observed. Vendor subscriptions automatically cover all current and future threats for that vendor's products.
Copy file name to clipboardExpand all lines: crowdsec-docs/unversioned/tracker_api/web_interface.mdx
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,7 +189,7 @@ Each vendor card displays:
189
189
190
190
Use the **search bar** to find a specific vendor and the **Sort by** dropdown to order by Most IPs, Most CVEs, or alphabetically.
191
191
192
-
Clicking a vendor card shows all CVEs and Reconnaissance rules affecting their products.
192
+
Clicking a vendor card shows all CVEs and Reconnaissance rules affecting their products. From the vendor detail page, you can **subscribe a firewall integration to the vendor**, which automatically covers all current and future CVEs and reconnaissance rules for that vendor's products.
193
193
194
194

195
195
@@ -211,15 +211,17 @@ Each integration card shows:
211
211
2. Choose a name and select the output format matching your firewall vendor
212
212
3. Save the integration and **securely store the generated credentials** — they are only shown once
213
213
214
-
### Subscribing to CVEs and Reconnaissance Rules
214
+
### Subscribing to Vendors, CVEs, and Reconnaissance Rules
215
215
216
-
There are two ways to subscribe:
216
+
There are several ways to subscribe an integration:
217
+
218
+
**Subscribe to a vendor** (recommended for broad coverage): From a vendor's detail page, click the **SUBSCRIBE TO FIREWALL** button. This subscribes the integration to **all current and future** CVEs and reconnaissance rules for that vendor's products. When a new threat is added for the vendor, your blocklist is updated automatically.
217
219
218
220
**From the CVE/Recon detail page**: Click the **SUBSCRIBE TO FIREWALL** button in the top right of any CVE or Reconnaissance rule detail page, then select the integration to subscribe.
219
221
220
222
**From the Remediation & Protection section**: Scroll to the bottom of a CVE detail page and click **Subscribe** under the Firewall Integration card.
221
223
222
-
The integration's blocklist will now include all IPs observed exploiting that CVE or matching that Reconnaissance rule. As new IPs are observed, they are automatically added.
224
+
The integration's blocklist will now include all IPs observed exploiting the subscribed CVEs, matching the subscribed Reconnaissance rules, or targeting the subscribed vendors' products. As new IPs are observed, they are automatically added.
0 commit comments