Skip to content

Commit a7cc0e6

Browse files
committed
update LET docs, vendors
1 parent 4c8822f commit a7cc0e6

9 files changed

Lines changed: 148 additions & 25 deletions

File tree

crowdsec-docs/unversioned/tracker_api/api_cves.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,10 @@ curl -X 'GET' \
315315

316316
You can subscribe and unsubscribe firewall integrations to specific CVEs via the API. See [Integrations & Blocklists](./api_integrations) for full details on creating and managing integrations.
317317

318+
:::tip
319+
For broader coverage, consider subscribing to a **vendor** instead of individual CVEs. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendor Subscriptions](./api_lookups#subscribe-an-integration-to-a-vendor).
320+
:::
321+
318322
### Subscribe an Integration to a CVE
319323

320324
```

crowdsec-docs/unversioned/tracker_api/api_fingerprints.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,6 +204,10 @@ curl -X 'GET' \
204204

205205
## Manage Fingerprint Integration Subscriptions
206206

207+
:::tip
208+
For broader coverage, consider subscribing to a **vendor** instead of individual fingerprint rules. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendor Subscriptions](./api_lookups#subscribe-an-integration-to-a-vendor).
209+
:::
210+
207211
### Subscribe an Integration
208212

209213
```

crowdsec-docs/unversioned/tracker_api/api_integrations.mdx

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,11 @@ title: Integrations & Blocklists
66
import Tabs from "@theme/Tabs";
77
import TabItem from "@theme/TabItem";
88

9-
Integrations are the bridge between CrowdSec's threat intelligence and your security infrastructure. An integration generates a blocklist of attacker IPs that your firewall can consume. You subscribe integrations to specific CVEs or fingerprint rules, and the blocklist automatically updates as new attacker IPs are observed.
9+
Integrations are the bridge between CrowdSec's threat intelligence and your security infrastructure. An integration generates a blocklist of attacker IPs that your firewall can consume. You subscribe integrations to specific CVEs, fingerprint rules, or entire vendors, and the blocklist automatically updates as new attacker IPs are observed.
10+
11+
:::tip Vendor Subscriptions
12+
Instead of subscribing to CVEs and fingerprint rules one by one, you can subscribe an integration to a **vendor**. This automatically covers all current and future CVEs and reconnaissance rules for that vendor's products. See [Vendors, Products & Tags](./api_lookups#subscribe-an-integration-to-a-vendor) for details.
13+
:::
1014

1115
## Supported Output Formats
1216

@@ -114,6 +118,7 @@ The integration credentials (API key or username/password depending on type) are
114118
| `output_format` | string | Blocklist format (see table above) |
115119
| `cves` | array | CVE subscriptions (each with `id`) |
116120
| `fingerprints` | array | Fingerprint rule subscriptions |
121+
| `vendors` | array | Vendor subscriptions (each with `id`). Subscribing to a vendor automatically covers all current and future CVEs and reconnaissance rules for that vendor. |
117122
| `blocklists` | array | Blocklist subscriptions |
118123
| `endpoint` | string | URL for fetching the integration's blocklist content |
119124
| `stats` | object | Statistics including `count` (number of IPs in the blocklist) |
@@ -291,7 +296,7 @@ except HTTPStatusError as e:
291296
</TabItem>
292297
</Tabs>
293298

294-
Use the `force=true` query parameter to delete an integration even if it has active CVE or fingerprint subscriptions.
299+
Use the `force=true` query parameter to delete an integration even if it has active CVE, fingerprint, or vendor subscriptions.
295300

296301
## Get Integration Content (Blocklist)
297302

@@ -323,29 +328,38 @@ This is compatible with CrowdSec's remediation component protocol.
323328

324329
## End-to-End Workflow
325330

326-
Here's a complete example: create an integration, subscribe it to a CVE and a fingerprint rule, and verify the blocklist.
331+
Here's a complete example: create an integration, subscribe it to a vendor, a CVE, and a fingerprint rule, and verify the blocklist.
327332

328333
```bash
329334
# 1. Create a plain text integration
330335
curl -X 'POST' 'https://admin.api.crowdsec.net/v1/integrations' \
331336
-H 'x-api-key: ${KEY}' -H 'Content-Type: application/json' \
332337
-d '{"name": "demo_blocklist", "description": "Demo", "entity_type": "firewall_integration", "output_format": "plain_text"}'
333338

334-
# 2. Subscribe to a CVE
339+
# 2. Subscribe to a vendor (covers all current and future CVEs + recon rules for that vendor)
340+
curl -X 'POST' 'https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations' \
341+
-H 'x-api-key: ${KEY}' -H 'Content-Type: application/json' \
342+
-d '{"name": "demo_blocklist"}'
343+
344+
# 3. Subscribe to an additional individual CVE (for a vendor you haven't subscribed to)
335345
curl -X 'POST' 'https://admin.api.crowdsec.net/v1/cves/CVE-2024-25600/integrations' \
336346
-H 'x-api-key: ${KEY}' -H 'Content-Type: application/json' \
337347
-d '{"name": "demo_blocklist"}'
338348

339-
# 3. Subscribe to a fingerprint rule
349+
# 4. Subscribe to an additional fingerprint rule
340350
curl -X 'POST' 'https://admin.api.crowdsec.net/v1/fingerprints/microsoft-exchange/integrations' \
341351
-H 'x-api-key: ${KEY}' -H 'Content-Type: application/json' \
342352
-d '{"name": "demo_blocklist"}'
343353

344-
# 4. Fetch the blocklist (using integration credentials)
354+
# 5. Fetch the blocklist (using integration credentials)
345355
curl 'https://admin.api.crowdsec.net/v1/integrations/INTEGRATION_ID/content' \
346356
-H 'x-api-key: INTEGRATION_API_KEY'
347357
```
348358

359+
:::tip
360+
Vendor subscriptions are the simplest way to get broad coverage. Subscribe to the vendors in your technology stack, then add individual CVE or fingerprint subscriptions only for threats outside those vendors.
361+
:::
362+
349363
## Next Steps
350364

351365
Once your integration is created and subscribed, configure your firewall to fetch the blocklist URL at regular intervals. See the [CrowdSec Integrations documentation](https://docs.crowdsec.net/u/integrations/intro) for vendor-specific setup guides.

crowdsec-docs/unversioned/tracker_api/api_lookups.mdx

Lines changed: 80 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,85 @@ curl -X 'GET' \
116116
-H 'x-api-key: ${KEY}'
117117
```
118118

119+
### Subscribe an Integration to a Vendor
120+
121+
Subscribing an integration to a vendor automatically covers **all current and future CVEs and reconnaissance rules** for that vendor's products. When a new CVE or reconnaissance rule is added for the vendor, the integration's blocklist is updated automatically — no action needed on your part.
122+
123+
```
124+
POST /v1/vendors/{vendor}/integrations
125+
```
126+
127+
<Tabs
128+
defaultValue="curl"
129+
groupId="tracker-api-lookups-selection"
130+
values={[
131+
{ label: 'cURL', value: 'curl' },
132+
{ label: 'Python', value: 'python' },
133+
]
134+
}>
135+
<TabItem value="curl">
136+
137+
```bash
138+
curl -X 'POST' \
139+
'https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations' \
140+
-H 'accept: application/json' \
141+
-H 'x-api-key: ${KEY}' \
142+
-H 'Content-Type: application/json' \
143+
-d '{"name": "production_firewall"}'
144+
```
145+
146+
</TabItem>
147+
<TabItem value="python">
148+
149+
```python
150+
import os
151+
import httpx
152+
153+
KEY = os.getenv("CROWDSEC_TRACKER_API_KEY")
154+
headers = {"x-api-key": KEY, "accept": "application/json", "Content-Type": "application/json"}
155+
156+
response = httpx.post(
157+
"https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations",
158+
headers=headers,
159+
json={"name": "production_firewall"},
160+
)
161+
response.raise_for_status()
162+
print("Subscribed to Microsoft")
163+
```
164+
165+
</TabItem>
166+
</Tabs>
167+
168+
:::tip
169+
Vendor subscriptions are the simplest way to get broad coverage for your technology stack. Subscribe to the vendors you rely on, and you'll automatically be protected against all tracked threats for their products — including new ones added in the future.
170+
:::
171+
172+
### List Subscribed Integrations for a Vendor
173+
174+
```
175+
GET /v1/vendors/{vendor}/integrations
176+
```
177+
178+
```bash
179+
curl -X 'GET' \
180+
'https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations' \
181+
-H 'accept: application/json' \
182+
-H 'x-api-key: ${KEY}'
183+
```
184+
185+
### Unsubscribe an Integration from a Vendor
186+
187+
```
188+
DELETE /v1/vendors/{vendor}/integrations/{integration_name}
189+
```
190+
191+
```bash
192+
curl -X 'DELETE' \
193+
'https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations/production_firewall' \
194+
-H 'accept: application/json' \
195+
-H 'x-api-key: ${KEY}'
196+
```
197+
119198
## Products
120199

121200
Products are specific software applications (e.g., Exchange Server, BIG-IP, WordPress).
@@ -155,4 +234,4 @@ These lookup endpoints are particularly useful for:
155234
- **Asset-based monitoring**: "Show me all tracked threats for the products in my technology stack."
156235
- **Coverage assessment**: "How many vulnerabilities affecting WordPress does CrowdSec track?"
157236
- **Reporting**: "What's the overall threat landscape for enterprise software this month?"
158-
- **Automation**: Build scripts that automatically subscribe integrations to all new CVEs for your vendor ecosystem.
237+
- **Vendor subscriptions**: Subscribe an integration to your vendors and automatically receive blocklist coverage for all their current and future CVEs and reconnaissance rules — no scripting required.

crowdsec-docs/unversioned/tracker_api/fingerprints_vs_cves.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Fingerprint rules fill a critical gap:
6565
| Firewall integration subscriptions |||
6666
| CVSS score |||
6767
| CWE classification |||
68-
| CrowdSec Analysis narrative || |
68+
| CrowdSec Analysis narrative || |
6969
| CVE events timeline |||
7070

7171
## Using Them Together

crowdsec-docs/unversioned/tracker_api/guide_proactive.mdx

Lines changed: 28 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,16 +48,35 @@ curl -X 'GET' \
4848
-H 'x-api-key: ${KEY}'
4949
```
5050

51-
## Step 3: Set Up Fingerprint Monitoring
51+
## Step 3: Subscribe to Your Vendors
5252

53-
[Fingerprint rules](./fingerprints_vs_cves) give you broad coverage for product families. Even if a new CVE drops tomorrow for Exchange, the "Microsoft Exchange Probing" fingerprint rule already captures reconnaissance activity.
53+
The simplest way to get broad, ongoing coverage is to subscribe your integration to the **vendors** in your technology stack. A vendor subscription automatically covers all current and future CVEs and reconnaissance rules for that vendor's products — when a new threat is added, your blocklist is updated without any action on your part.
5454

55-
1. Identify fingerprint rules matching your products
56-
2. Create a firewall integration (if you don't have one)
57-
3. Subscribe the integration to relevant fingerprint rules
55+
1. Create a firewall integration (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
56+
2. Subscribe the integration to each vendor you rely on
5857

5958
```bash
60-
# Subscribe to Microsoft Exchange probing detection
59+
# Subscribe to all Microsoft threats
60+
curl -X 'POST' \
61+
'https://admin.api.crowdsec.net/v1/vendors/Microsoft/integrations' \
62+
-H 'accept: application/json' \
63+
-H 'x-api-key: ${KEY}' \
64+
-H 'Content-Type: application/json' \
65+
-d '{"name": "production_firewall"}'
66+
67+
# Subscribe to all Citrix threats
68+
curl -X 'POST' \
69+
'https://admin.api.crowdsec.net/v1/vendors/Citrix/integrations' \
70+
-H 'accept: application/json' \
71+
-H 'x-api-key: ${KEY}' \
72+
-H 'Content-Type: application/json' \
73+
-d '{"name": "production_firewall"}'
74+
```
75+
76+
For threats outside your subscribed vendors, you can also subscribe to individual [fingerprint rules](./fingerprints_vs_cves) or CVEs:
77+
78+
```bash
79+
# Subscribe to a specific reconnaissance rule
6180
curl -X 'POST' \
6281
'https://admin.api.crowdsec.net/v1/fingerprints/microsoft-exchange/integrations' \
6382
-H 'accept: application/json' \
@@ -68,7 +87,7 @@ curl -X 'POST' \
6887

6988
## Step 4: Monitor New and Trending CVEs
7089

71-
Check the tracker regularly (or automate it) for new CVEs affecting your stack:
90+
If you've subscribed to your vendors (Step 3), new CVEs are automatically covered in your blocklist. However, you'll still want to monitor the threat landscape for situational awareness and to inform patching priorities:
7291

7392
```bash
7493
# Get the latest detection rules, sorted by release date
@@ -88,7 +107,7 @@ For each new CVE that affects your products:
88107

89108
1. Check the **CrowdSec Score** and **Exploitation Phase**
90109
2. Read the **CrowdSec Analysis** for exploitation context
91-
3. Subscribe your integration if the threat warrants immediate blocklist protection
110+
3. If the CVE is from a vendor you've subscribed to, your blocklist is already protecting you. If not, subscribe the integration to the CVE directly.
92111
4. Open a patching ticket with the appropriate priority
93112

94113
## Step 5: Build a Monitoring Script
@@ -137,6 +156,6 @@ for alert in sorted(alerts, key=lambda x: x["score"], reverse=True):
137156
The Live Exploit Tracker API can feed data into:
138157

139158
- **SIEM**: Enrich alerts with CrowdSec Scores and exploitation context. When your SIEM fires an alert for a CVE, automatically look up the CrowdSec intelligence to assign priority.
140-
- **SOAR**: Build playbooks that automatically create blocklist subscriptions when a new high-severity CVE is detected for your products.
159+
- **SOAR**: Build playbooks that react to new high-severity CVEs. If you're using vendor subscriptions, the blocklist is already covered — your playbook can focus on escalation, ticket creation, and patching workflows.
141160
- **Vulnerability Management**: Correlate your vulnerability scanner findings with real-world exploitation data to reorder your patch queue.
142161
- **Reporting Dashboards**: Pull scores and phase data into your security dashboard to give leadership a real-time view of the threat landscape.

crowdsec-docs/unversioned/tracker_api/guide_triage.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,10 @@ Based on what you've found:
8787

8888
If the situation calls for immediate mitigation:
8989

90-
1. **Create a firewall integration** (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
91-
2. **Subscribe it to the CVE** — either via the web interface or API
92-
3. Your firewall will start blocking known attacker IPs automatically
90+
1. **Check your vendor subscriptions first** — if you've already subscribed an integration to this CVE's vendor, your blocklist is already covering this threat automatically.
91+
2. If not, **create a firewall integration** (if you don't have one) — see [Integrations & Blocklists](./api_integrations)
92+
3. **Subscribe it to the CVE** (or to the vendor for broader coverage) — either via the web interface or API
93+
4. Your firewall will start blocking known attacker IPs automatically
9394

9495
This buys you time while you schedule and deploy the patch.
9596

crowdsec-docs/unversioned/tracker_api/overview.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Each tracked CVE also includes a **CrowdSec Analysis** — a human-readable inte
3838
Once you've identified a threat, the tracker lets you act on it:
3939

4040
- **IP Intelligence**: View every IP address observed exploiting a specific CVE or probing a specific product, enriched with CTI data including reputation, geolocation, known classifications, and behavioral history.
41-
- **Firewall Integrations**: Create blocklists that automatically feed malicious IPs into your firewalls (Palo Alto, FortiGate, Cisco, pfSense, OPNsense, and more). Subscribe an integration to one or more CVEs, and the blocklist stays current as new attacker IPs are observed.
41+
- **Firewall Integrations**: Create blocklists that automatically feed malicious IPs into your firewalls (Palo Alto, FortiGate, Cisco, pfSense, OPNsense, and more). Subscribe an integration to entire vendors, specific CVEs, or reconnaissance rules, and the blocklist stays current as new attacker IPs are observed. Vendor subscriptions automatically cover all current and future threats for that vendor's products.
4242

4343
### Beyond CVEs: Reconnaissance Rules
4444

crowdsec-docs/unversioned/tracker_api/web_interface.mdx

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Each vendor card displays:
189189

190190
Use the **search bar** to find a specific vendor and the **Sort by** dropdown to order by Most IPs, Most CVEs, or alphabetically.
191191

192-
Clicking a vendor card shows all CVEs and Reconnaissance rules affecting their products.
192+
Clicking a vendor card shows all CVEs and Reconnaissance rules affecting their products. From the vendor detail page, you can **subscribe a firewall integration to the vendor**, which automatically covers all current and future CVEs and reconnaissance rules for that vendor's products.
193193

194194
![Vendors Page](/img/exploit-tracker/vendors.png)
195195

@@ -211,15 +211,17 @@ Each integration card shows:
211211
2. Choose a name and select the output format matching your firewall vendor
212212
3. Save the integration and **securely store the generated credentials** — they are only shown once
213213

214-
### Subscribing to CVEs and Reconnaissance Rules
214+
### Subscribing to Vendors, CVEs, and Reconnaissance Rules
215215

216-
There are two ways to subscribe:
216+
There are several ways to subscribe an integration:
217+
218+
**Subscribe to a vendor** (recommended for broad coverage): From a vendor's detail page, click the **SUBSCRIBE TO FIREWALL** button. This subscribes the integration to **all current and future** CVEs and reconnaissance rules for that vendor's products. When a new threat is added for the vendor, your blocklist is updated automatically.
217219

218220
**From the CVE/Recon detail page**: Click the **SUBSCRIBE TO FIREWALL** button in the top right of any CVE or Reconnaissance rule detail page, then select the integration to subscribe.
219221

220222
**From the Remediation & Protection section**: Scroll to the bottom of a CVE detail page and click **Subscribe** under the Firewall Integration card.
221223

222-
The integration's blocklist will now include all IPs observed exploiting that CVE or matching that Reconnaissance rule. As new IPs are observed, they are automatically added.
224+
The integration's blocklist will now include all IPs observed exploiting the subscribed CVEs, matching the subscribed Reconnaissance rules, or targeting the subscribed vendors' products. As new IPs are observed, they are automatically added.
223225

224226
### Consuming the Blocklist
225227

0 commit comments

Comments
 (0)