From 6aa30056c7093e4956d9cf0f9086d62afb09c876 Mon Sep 17 00:00:00 2001 From: jdv Date: Tue, 20 Jan 2026 15:36:51 +0100 Subject: [PATCH 1/3] Addition of a small mention of vendor specific name for external lists --- crowdsec-docs/unversioned/integrations/checkpoint.mdx | 2 ++ crowdsec-docs/unversioned/integrations/cisco.mdx | 2 ++ crowdsec-docs/unversioned/integrations/f5.mdx | 2 ++ crowdsec-docs/unversioned/integrations/fortinet.mdx | 2 ++ crowdsec-docs/unversioned/integrations/juniper.mdx | 2 ++ crowdsec-docs/unversioned/integrations/opnsense.mdx | 2 ++ crowdsec-docs/unversioned/integrations/paloalto.mdx | 2 ++ crowdsec-docs/unversioned/integrations/pfsense.mdx | 2 ++ crowdsec-docs/unversioned/integrations/sophos.mdx | 2 ++ 9 files changed, 18 insertions(+) diff --git a/crowdsec-docs/unversioned/integrations/checkpoint.mdx b/crowdsec-docs/unversioned/integrations/checkpoint.mdx index c8e0a647d..e413d6def 100644 --- a/crowdsec-docs/unversioned/integrations/checkpoint.mdx +++ b/crowdsec-docs/unversioned/integrations/checkpoint.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Checkpoint integration allows you to block malicious IPs in your Checkpoint firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Checkpoint firewall. +Check Point refers to this feature as **Custom Intelligence (IoC) Feeds**, which provide the ability to add custom cyber intelligence feeds into the Threat Prevention engine. + ### Prerequisites Before you begin, please ensure your Checkpoint device supports ingesting blocklists. If you are unsure, please refer to the Checkpoint documentation or contact Checkpoint support. diff --git a/crowdsec-docs/unversioned/integrations/cisco.mdx b/crowdsec-docs/unversioned/integrations/cisco.mdx index 60e593e55..509e8eaa9 100644 --- a/crowdsec-docs/unversioned/integrations/cisco.mdx +++ b/crowdsec-docs/unversioned/integrations/cisco.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Cisco integration allows you to block malicious IPs in your Cisco firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Cisco firewall. +Cisco refers to this feature as **Security Intelligence feeds**, which provide dynamic threat intelligence that can be used in your firewall policies. + ### Prerequisites Before you begin, please ensure your Cisco device supports ingesting blocklists. If you are unsure, please refer to the Cisco documentation or contact Cisco support. diff --git a/crowdsec-docs/unversioned/integrations/f5.mdx b/crowdsec-docs/unversioned/integrations/f5.mdx index 3e48e6967..aa9fe23a9 100644 --- a/crowdsec-docs/unversioned/integrations/f5.mdx +++ b/crowdsec-docs/unversioned/integrations/f5.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec F5 integration allows you to block malicious IPs in your F5 firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your F5 firewall. +F5 BIG-IP AFM refers to this feature as **IP Intelligence feed lists**, which allow you to import external threat intelligence to block or allow traffic based on IP reputation. + ### Prerequisites Before you begin, please ensure your F5 device supports ingesting blocklists. If you are unsure, please refer to the F5 documentation or contact F5 support. diff --git a/crowdsec-docs/unversioned/integrations/fortinet.mdx b/crowdsec-docs/unversioned/integrations/fortinet.mdx index a5acd470b..3f3474379 100644 --- a/crowdsec-docs/unversioned/integrations/fortinet.mdx +++ b/crowdsec-docs/unversioned/integrations/fortinet.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Fortinet integration allows you to block malicious IPs in your Fortinet firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Fortinet firewall. +Fortinet refers to this feature as **Threat Feeds**, which enable you to integrate external threat intelligence sources into your firewall policies. + ### Prerequisites Before you begin, please ensure your Fortinet device supports ingesting blocklists. If you are unsure, please refer to the Fortinet documentation or contact Fortinet support. diff --git a/crowdsec-docs/unversioned/integrations/juniper.mdx b/crowdsec-docs/unversioned/integrations/juniper.mdx index 791edb98e..d3481c99f 100644 --- a/crowdsec-docs/unversioned/integrations/juniper.mdx +++ b/crowdsec-docs/unversioned/integrations/juniper.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Juniper integration allows you to block malicious IPs in your Juniper firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Juniper router. +Juniper refers to this feature as **Security Dynamic Address feeds**, which allow you to import and automatically update IP address lists from external feed servers. + ### Prerequisites Before you begin, please ensure your Juniper device supports ingesting blocklists. If you are unsure, please refer to the Juniper documentation or contact Juniper support. diff --git a/crowdsec-docs/unversioned/integrations/opnsense.mdx b/crowdsec-docs/unversioned/integrations/opnsense.mdx index 374dbcef3..fc8e8a029 100644 --- a/crowdsec-docs/unversioned/integrations/opnsense.mdx +++ b/crowdsec-docs/unversioned/integrations/opnsense.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec OPNsense integration allows you to block malicious IPs in your OPNsense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your OPNsense firewall. +OPNsense refers to this feature as **URL Table (IPs) aliases**, which allow you to create dynamic firewall aliases that automatically update from external URL sources. + ### Prerequisites Before you begin, please ensure your OPNsense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the OPNsense documentation or contact OPNsense support. diff --git a/crowdsec-docs/unversioned/integrations/paloalto.mdx b/crowdsec-docs/unversioned/integrations/paloalto.mdx index 9ed380ec3..035b942c4 100644 --- a/crowdsec-docs/unversioned/integrations/paloalto.mdx +++ b/crowdsec-docs/unversioned/integrations/paloalto.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl" The CrowdSec Palo Alto integration allows you to block malicious IPs in your Palo Alto firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Palo Alto firewall. +Palo Alto refers to this feature as **External Dynamic Lists (EDL)**, which allow you to import and automatically update blocklists from external sources. + ### Prerequisites Before you begin, please ensure your Palo Alto device supports ingesting blocklists. If you are unsure, please refer to the Palo Alto documentation or contact Palo Alto support. diff --git a/crowdsec-docs/unversioned/integrations/pfsense.mdx b/crowdsec-docs/unversioned/integrations/pfsense.mdx index cd5a5ae74..b4970092b 100644 --- a/crowdsec-docs/unversioned/integrations/pfsense.mdx +++ b/crowdsec-docs/unversioned/integrations/pfsense.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec pfSense integration allows you to block malicious IPs in your pfSense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your pfSense firewall. +pfSense refers to this feature as **URL Table (IPs) aliases**, which are file-based aliases that periodically download and update IP lists from external URLs. + ### Prerequisites Before you begin, please ensure your pfSense software version supports ingesting blocklists (URL aliases). If you are unsure, please refer to the pfSense documentation or contact pfSense support. diff --git a/crowdsec-docs/unversioned/integrations/sophos.mdx b/crowdsec-docs/unversioned/integrations/sophos.mdx index 3a88a0473..b538ede3a 100644 --- a/crowdsec-docs/unversioned/integrations/sophos.mdx +++ b/crowdsec-docs/unversioned/integrations/sophos.mdx @@ -8,6 +8,8 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Sophos integration allows you to block malicious IPs in your Sophos firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Sophos firewall. +Sophos refers to this feature as **Third-Party Threat Feeds**, which enable you to integrate external sources of IP addresses, domains, and URLs involved in threat activity. + ### Prerequisites Before you begin, please ensure your Sophos device supports ingesting blocklists. If you are unsure, please refer to the Sophos documentation or contact Sophos support. From 2e1de4e7d5149b5e059789e45336767536edf239 Mon Sep 17 00:00:00 2001 From: jdv Date: Tue, 20 Jan 2026 16:15:25 +0100 Subject: [PATCH 2/3] fixed some links and added anchor on the name in intro --- crowdsec-docs/docs/appsec/quickstart/traefik.mdx | 2 +- crowdsec-docs/package-lock.json | 6 +++--- crowdsec-docs/unversioned/integrations/checkpoint.mdx | 2 +- crowdsec-docs/unversioned/integrations/cisco.mdx | 2 +- crowdsec-docs/unversioned/integrations/f5.mdx | 4 ++-- crowdsec-docs/unversioned/integrations/fortinet.mdx | 2 +- crowdsec-docs/unversioned/integrations/juniper.mdx | 4 ++-- crowdsec-docs/unversioned/integrations/opnsense.mdx | 2 +- crowdsec-docs/unversioned/integrations/paloalto.mdx | 4 ++-- crowdsec-docs/unversioned/integrations/pfsense.mdx | 2 +- crowdsec-docs/unversioned/integrations/sophos.mdx | 2 +- 11 files changed, 16 insertions(+), 16 deletions(-) diff --git a/crowdsec-docs/docs/appsec/quickstart/traefik.mdx b/crowdsec-docs/docs/appsec/quickstart/traefik.mdx index d504e930e..a8d1ead25 100644 --- a/crowdsec-docs/docs/appsec/quickstart/traefik.mdx +++ b/crowdsec-docs/docs/appsec/quickstart/traefik.mdx @@ -372,7 +372,7 @@ spec: ``` You can still add some route configuration through -[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/?utm_source=chatgpt.com) +[IngressRoute](https://doc.traefik.io/traefik/reference/routing-configuration/kubernetes/crd/http/ingressroute/) and attach the middleware to those routes. diff --git a/crowdsec-docs/package-lock.json b/crowdsec-docs/package-lock.json index 90e1f8f8d..676e973a0 100644 --- a/crowdsec-docs/package-lock.json +++ b/crowdsec-docs/package-lock.json @@ -17717,9 +17717,9 @@ } }, "node_modules/qs": { - "version": "6.14.0", - "resolved": "https://registry.npmjs.org/qs/-/qs-6.14.0.tgz", - "integrity": "sha512-YWWTjgABSKcvs/nWBi9PycY/JiPJqOD4JA6o9Sej2AtvSGarXxKC3OQSk4pAarbdQlKAh5D4FCQkJNkW+GAn3w==", + "version": "6.14.1", + "resolved": "https://registry.npmjs.org/qs/-/qs-6.14.1.tgz", + "integrity": "sha512-4EK3+xJl8Ts67nLYNwqw/dsFVnCf+qR7RgXSK9jEEm9unao3njwMDdmsdvoKBKHzxd7tCYz5e5M+SnMjdtXGQQ==", "dependencies": { "side-channel": "^1.1.0" }, diff --git a/crowdsec-docs/unversioned/integrations/checkpoint.mdx b/crowdsec-docs/unversioned/integrations/checkpoint.mdx index e413d6def..8d3dee93b 100644 --- a/crowdsec-docs/unversioned/integrations/checkpoint.mdx +++ b/crowdsec-docs/unversioned/integrations/checkpoint.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Checkpoint integration allows you to block malicious IPs in your Checkpoint firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Checkpoint firewall. -Check Point refers to this feature as **Custom Intelligence (IoC) Feeds**, which provide the ability to add custom cyber intelligence feeds into the Threat Prevention engine. +Check Point refers to this feature as [**Custom Intelligence (IoC) Feeds**](https://support.checkpoint.com/results/sk/sk132193), which provide the ability to add custom cyber intelligence feeds into the Threat Prevention engine. ### Prerequisites diff --git a/crowdsec-docs/unversioned/integrations/cisco.mdx b/crowdsec-docs/unversioned/integrations/cisco.mdx index 509e8eaa9..139c35d76 100644 --- a/crowdsec-docs/unversioned/integrations/cisco.mdx +++ b/crowdsec-docs/unversioned/integrations/cisco.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Cisco integration allows you to block malicious IPs in your Cisco firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Cisco firewall. -Cisco refers to this feature as **Security Intelligence feeds**, which provide dynamic threat intelligence that can be used in your firewall policies. +Cisco refers to this feature as [**Security Intelligence feeds**](https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/objects-object-mgmt.html#ID-2243-00000291), which provide dynamic threat intelligence that can be used in your firewall policies. ### Prerequisites diff --git a/crowdsec-docs/unversioned/integrations/f5.mdx b/crowdsec-docs/unversioned/integrations/f5.mdx index aa9fe23a9..c74f90df8 100644 --- a/crowdsec-docs/unversioned/integrations/f5.mdx +++ b/crowdsec-docs/unversioned/integrations/f5.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec F5 integration allows you to block malicious IPs in your F5 firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your F5 firewall. -F5 BIG-IP AFM refers to this feature as **IP Intelligence feed lists**, which allow you to import external threat intelligence to block or allow traffic based on IP reputation. +F5 BIG-IP AFM refers to this feature as [**External IP blocklist**](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector/creating-http-connector-request-external-IP-blocklist.html) or [**Feed lists**](https://techdocs.f5.com/kb/en-us/products/big-ip-afm/manuals/product/big-ip-afm-getting-started-14-1-0/04.html), which allow you to import external threat intelligence to block or allow traffic based on IP reputation. ### Prerequisites @@ -54,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree }} /> -[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html?utm_source=chatgpt.com) +[F5 Documentation](https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-access-policy-manager-per-request-policies/using-http-connector.html) ## Format example diff --git a/crowdsec-docs/unversioned/integrations/fortinet.mdx b/crowdsec-docs/unversioned/integrations/fortinet.mdx index 3f3474379..c924e02b7 100644 --- a/crowdsec-docs/unversioned/integrations/fortinet.mdx +++ b/crowdsec-docs/unversioned/integrations/fortinet.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Fortinet integration allows you to block malicious IPs in your Fortinet firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Fortinet firewall. -Fortinet refers to this feature as **Threat Feeds**, which enable you to integrate external threat intelligence sources into your firewall policies. +Fortinet refers to this feature as [**IP address Threat Feeds**](https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/891236/external-blocklist-policy), which enable you to integrate external threat intelligence sources into your firewall policies. ### Prerequisites diff --git a/crowdsec-docs/unversioned/integrations/juniper.mdx b/crowdsec-docs/unversioned/integrations/juniper.mdx index d3481c99f..bfc8ab972 100644 --- a/crowdsec-docs/unversioned/integrations/juniper.mdx +++ b/crowdsec-docs/unversioned/integrations/juniper.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Juniper integration allows you to block malicious IPs in your Juniper firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Juniper router. -Juniper refers to this feature as **Security Dynamic Address feeds**, which allow you to import and automatically update IP address lists from external feed servers. +Juniper refers to this feature as [**Security Dynamic Address feeds**](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html), which allow you to import and automatically update IP address lists from external feed servers. ### Prerequisites @@ -54,7 +54,7 @@ Once the integration is generated you will be presented with a credentials scree }} /> -[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/edit-security-dynamic-address.html) +[Juniper Documentation JunOS](https://www.juniper.net/documentation/us/en/software/nm-apps23.1/policy-enforcer-user-guide/topics/task/dynamic-example.html) ## Configuration Example diff --git a/crowdsec-docs/unversioned/integrations/opnsense.mdx b/crowdsec-docs/unversioned/integrations/opnsense.mdx index fc8e8a029..6d9cc5e8b 100644 --- a/crowdsec-docs/unversioned/integrations/opnsense.mdx +++ b/crowdsec-docs/unversioned/integrations/opnsense.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec OPNsense integration allows you to block malicious IPs in your OPNsense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your OPNsense firewall. -OPNsense refers to this feature as **URL Table (IPs) aliases**, which allow you to create dynamic firewall aliases that automatically update from external URL sources. +In OPNsense you'll use **URL Table (IPs) aliases** to create dynamic firewall aliases that automatically update from external URL sources. ### Prerequisites diff --git a/crowdsec-docs/unversioned/integrations/paloalto.mdx b/crowdsec-docs/unversioned/integrations/paloalto.mdx index 035b942c4..657823c34 100644 --- a/crowdsec-docs/unversioned/integrations/paloalto.mdx +++ b/crowdsec-docs/unversioned/integrations/paloalto.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl" The CrowdSec Palo Alto integration allows you to block malicious IPs in your Palo Alto firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Palo Alto firewall. -Palo Alto refers to this feature as **External Dynamic Lists (EDL)**, which allow you to import and automatically update blocklists from external sources. +Palo Alto refers to this feature as [**External Dynamic Lists (EDL)**](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list), which allow you to import and automatically update blocklists from external sources. ### Prerequisites @@ -101,7 +101,7 @@ You should have your policy created, don't forget to click on ‘commit‘. ![](/img/paloalto_step7.png) -[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list#idf36cb80a-77f1-4d17-9c4b-7efe9fe426af) +[Palo Alto Documentation](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list) [Video Tutorial](https://www.youtube.com/watch?v=QFVI4sOFoaI) ## Format example diff --git a/crowdsec-docs/unversioned/integrations/pfsense.mdx b/crowdsec-docs/unversioned/integrations/pfsense.mdx index b4970092b..027424e64 100644 --- a/crowdsec-docs/unversioned/integrations/pfsense.mdx +++ b/crowdsec-docs/unversioned/integrations/pfsense.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec pfSense integration allows you to block malicious IPs in your pfSense firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your pfSense firewall. -pfSense refers to this feature as **URL Table (IPs) aliases**, which are file-based aliases that periodically download and update IP lists from external URLs. +pfSense you'll use **URL Table (IPs) aliases**, to create aliases that periodically download and update IP lists from external URLs. ### Prerequisites diff --git a/crowdsec-docs/unversioned/integrations/sophos.mdx b/crowdsec-docs/unversioned/integrations/sophos.mdx index b538ede3a..5cc30a494 100644 --- a/crowdsec-docs/unversioned/integrations/sophos.mdx +++ b/crowdsec-docs/unversioned/integrations/sophos.mdx @@ -8,7 +8,7 @@ import useBaseUrl from "@docusaurus/useBaseUrl"; The CrowdSec Sophos integration allows you to block malicious IPs in your Sophos firewall. This guide will walk you through the steps to integrate CrowdSec blocklists with your Sophos firewall. -Sophos refers to this feature as **Third-Party Threat Feeds**, which enable you to integrate external sources of IP addresses, domains, and URLs involved in threat activity. +Sophos refers to this feature as [**Third-Party Threat Feeds**](https://docs.sophos.com/nsg/sophos-firewall/latest/Help/en-us/webhelp/onlinehelp/AdministratorHelp/ActiveThreatResponse/ConfigureFeeds/ThirdPartyThreatFeeds/index.html), which enable you to integrate external sources of IP addresses, domains, and URLs involved in threat activity. ### Prerequisites From bbc53f0c0127019f46d792565850af4a92a3e00c Mon Sep 17 00:00:00 2001 From: jdv Date: Tue, 20 Jan 2026 16:17:01 +0100 Subject: [PATCH 3/3] fixed some urls --- crowdsec-docs/package-lock.json | 6 +++--- .../troubleshooting/issue_integration_rc_offline.md | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/crowdsec-docs/package-lock.json b/crowdsec-docs/package-lock.json index 676e973a0..90e1f8f8d 100644 --- a/crowdsec-docs/package-lock.json +++ b/crowdsec-docs/package-lock.json @@ -17717,9 +17717,9 @@ } }, "node_modules/qs": { - "version": "6.14.1", - "resolved": "https://registry.npmjs.org/qs/-/qs-6.14.1.tgz", - "integrity": "sha512-4EK3+xJl8Ts67nLYNwqw/dsFVnCf+qR7RgXSK9jEEm9unao3njwMDdmsdvoKBKHzxd7tCYz5e5M+SnMjdtXGQQ==", + "version": "6.14.0", + "resolved": "https://registry.npmjs.org/qs/-/qs-6.14.0.tgz", + "integrity": "sha512-YWWTjgABSKcvs/nWBi9PycY/JiPJqOD4JA6o9Sej2AtvSGarXxKC3OQSk4pAarbdQlKAh5D4FCQkJNkW+GAn3w==", "dependencies": { "side-channel": "^1.1.0" }, diff --git a/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md b/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md index 530ed3934..6def3ebfa 100644 --- a/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md +++ b/crowdsec-docs/unversioned/troubleshooting/issue_integration_rc_offline.md @@ -3,7 +3,7 @@ title: Remediation Component Integration Offline id: issue_integration_rc_offline --- -The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](http://localhost:3000/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours. +The **Remediation Component Integration Offline** refers to a [Blocklist-Integration of type Remediation Component](/u/integrations/remediationcomponent) has not pulled from its endpoint for more than 24 hours. This issue applies to Remediation Components *(aka bouncers)* directly connected to a **Blocklist integration endpoint** *(aka Blocklist as a Service / BLaaS)*.