User Guides

Step-by-step guides to help you get the most out of Sivvy's security platform.

Getting Started

Essential guides for new users

Account Setup

Learn how to create your Sivvy account, verify your email, and set up your first security profile.

  • Create a new account
  • Email verification process
  • Initial dashboard tour
  • Account security settings
Read Guide →

IP Allowlist Setup

Configure your first IP allowlist to protect your applications from unauthorized access.

  • Add your current IP address
  • Configure CIDR blocks
  • Label and organize IPs
  • Test allowlist functionality
Read Guide →

First Website Monitor

Set up your first website monitor to track uptime, performance, and SSL certificate status.

  • Add a website URL
  • Configure check intervals
  • Set up notifications
  • View monitoring dashboard
Read Guide →

Integration Guides

Platform-specific integration tutorials

WordPress Protection

Protect your WordPress admin area and login pages with IP allowlists.

View Guide →

Laravel Middleware

Create Laravel middleware for automatic IP protection across your application.

View Guide →

Node.js Express

Implement IP protection in your Express.js applications with custom middleware.

View Guide →

Advanced Configuration

Expert guides for advanced users and developers

Webhook Configuration

Set up real-time notifications for monitoring events and security alerts.

What you'll learn:

  • Webhook URL configuration
  • Event filtering and customization
  • Authentication and security
  • Testing webhook delivery
  • Error handling and retries
Read Full Guide →

CIDR Block Management

Advanced IP range management using CIDR notation for team and office networks.

What you'll learn:

  • CIDR notation basics
  • Subnet calculation
  • Office network configuration
  • Dynamic IP management
  • Best practices for teams
Read Full Guide →

SSL Certificate Monitoring

Monitor SSL certificate expiration and validity across all your websites.

What you'll learn:

  • Automatic SSL checking
  • Expiration alerts
  • Certificate chain validation
  • Multi-domain certificates
  • Integration with cert managers
Read Full Guide →

Best Practices

Security recommendations and optimization tips

Security Best Practices

  • Use the principle of least privilege
  • Regularly audit your IP allowlists
  • Implement monitoring for all critical services
  • Set up redundant notification channels
  • Keep your API keys secure and rotated
  • Use CIDR blocks for office networks
  • Enable two-factor authentication

Performance Optimization

  • Cache API responses when possible
  • Use appropriate monitoring intervals
  • Implement proper error handling
  • Monitor your API rate limits
  • Use webhooks for real-time updates
  • Optimize webhook response times
  • Configure appropriate timeouts

Need Personal Help?

Can't find what you're looking for? Our support team is here to help you succeed.

Contact Support View Documentation