The Defend-O-Tron is designed to drop into a wide range of environments. The scenarios below are the ones we see most often. Pick the one that best matches your setup — if more than one applies, the device works across them simultaneously.
Each scenario below has three parts: a self-identification checklist (does this describe you?), the typical deployment shape, and the concrete value the Defend-O-Tron adds.
A single business location with on-premises servers (file, mail, web, line-of-business app) and one or more public services exposed via the ISP connection. Most small and medium businesses fit here.

If two or more of these tick, this is your scenario.
- One Defend-O-Tron between the ISP modem and your firewall/router.
- Internal servers continue to operate normally — the device is transparent to outbound and inbound legitimate traffic.
- Optional: forward your web server, mail server, or VPN logs to the device so CrowdSec can parse them and add bad actors to the global blocklist.
- Catches port-scanning, brute-force, and ransomware-reconnaissance probes before they reach your firewall.
- Generates the tamper-evident audit evidence your auditor and insurer want to see — see Compliance Reporting.
- One device covers everything; no per-server agents.
A central headquarters plus one or more branch offices, typically connected by VPN. Common in retail chains, multi-site healthcare, regional legal/accounting practices, and franchise operations.

- One Defend-O-Tron per branch (and one at HQ), each sitting between the branch ISP equipment and the branch firewall/router.
- The branch's existing SD-WAN appliance stays in place; the Defend-O-Tron is fully transparent to its operation.
- Centralized visibility via the CrowdSec Cloud Dashboard (free community account) or via the remote-bouncer API streaming decisions to your central SIEM.
- When branch 1 catches an attacker, branches 2-N see the IP added to their blocklist within minutes — across the global CrowdSec community and your own fleet.
- Each branch's audit evidence is independently signed and exportable, simplifying multi-site compliance reporting.
- Standalone-per-site failure mode: a branch's Defend-O-Tron going down doesn't affect the others.
Edge IoT deployments — environmental sensors, industrial equipment, telemetry uplinks, distributed monitoring. Often in locations with limited power, intermittent connectivity, and no on-site IT staff.

- Defend-O-Tron at the central IoT uplink location, sized for the device's modest 10-15W power draw.
- Serial console access (UART0) for management when network connectivity is unavailable. Tools like Minicom on Linux or PuTTY on Windows.
- Optional: feed your IoT gateway's syslog into the device so CrowdSec can correlate against the global threat picture.
- Catches IoT-specific reconnaissance (TFTP, NetBIOS, SNMP probes — see the Honeypot page) before it turns into compromise.
- Aligns with MITRE's EMB3D embedded threat model for edge devices.
- Operates standalone with no cloud dependencies for core protection — community threat intel still arrives but isn't required for defense.
A freelancer, sole proprietor, or single-practitioner business (lawyer, accountant, healthcare provider, consultant, contractor) working from a home or small home-office setup. Often handles client-confidential data with no dedicated IT staff.
- One Defend-O-Tron between your ISP modem and your home router (the simplest deployment).
- No client software, no agents on individual devices — every device on your network is protected transparently.
- Optionally enable the AdGuard DNS filter to block phishing domains at the DNS layer.
- Protection without complexity: install, cable in, walk away.
- Tamper-evident audit evidence — useful when answering compliance questions for clients in regulated sectors (healthcare, legal, financial advisory) or for cyber-insurance applications.
- A single point of recovery: if anything ever feels wrong, unplug and you're back to your original setup in seconds.
An MSP, MSSP, or IT consultancy supporting many small business clients. Each client site is typically a single-office scenario; the MSP's job is to deploy, monitor, and report across the whole fleet.
- One Defend-O-Tron per client site, in the same position as the Single Office scenario.
- Centralized monitoring via the CrowdSec Cloud Dashboard, or by attaching each device's decision stream to your own SIEM via the CrowdSec API.
- Standardized initial configuration across all clients — the same admin password rotation policy, the same Root CA distribution, the same audit-retention policy.
- Use your existing remote-access infrastructure (VPN, jumphost, RMM) to reach each Defend-O-Tron's admin interface; the device's built-in Remote Support tunnel is the customer-initiated channel to Awesome-O's support team, not an MSP-controlled remote-management path.
- Each client gets enterprise-grade defense at a price point that fits SMB budgets — you build margin into the service offering instead of buying a SIEM seat per client.
- Per-client tamper-evident audit evidence (NIS2, SOC 2, ISO 27001) ready to hand to each client's auditor with one command. Easy compliance deliverable.
- One threat intelligence source informs every client's enforcement — when one client gets probed by a new actor, every other client's device blocks them automatically.
- Single learning curve: master the admin interface once, use the same workflow across every site.
The Defend-O-Tron works across scenarios — many real-world deployments span two or three of the above (a small business with a home-office owner who also operates a remote IoT pilot, for example). When in doubt, start with the Single Office scenario and expand from there as your environment grows.
For a full feature list, see System Features. For deployment prerequisites before you order or install, see Requirements.