Guardrails
Protect your AI applications with guardrails
Lessons (15)
1. The Guardrails Dashboard
Learn how to navigate and use the Guardrails dashboard for production configurations
2. Creating Guardrail Configurations
Step-by-step guide to creating and configuring guardrail setups
3. Detector Reference: Security & Privacy
Complete reference for security and privacy detectors including Injection Attack and PII
4. Detector Reference: Compliance & Moderation
Learn about Policy Violation, Toxicity, NSFW, and other moderation detectors
5. Detector Reference: Integrity
Understand Bias, Hallucination, Adherence, and other integrity detectors
6. Viewing Detection Logs
Learn how to use logs to identify patterns, debug issues, and audit compliance
7. Configuring Deployments
Connect your guardrail configurations to AI models and create protected endpoints
8. Advanced Policy Patterns
Learn how to write effective policy rules and industry-specific examples
9. Monitoring Best Practices
Effective strategies for monitoring guardrails and maintaining secure AI systems
10. AI Proxy Integration
Integrate guardrails with minimal code changes using the AI proxy endpoint
11. Python SDK Integration
Use the Python SDK for custom workflows and direct guardrail calls
12. RAG Workflow Integration
Apply guardrails at three critical points in Retrieval-Augmented Generation pipelines
13. Quick Reference Guide
Handy reference for detector recommendations, use cases, and troubleshooting
14. Batch Processing Logs
Process multiple texts efficiently using the batch detection API with rate limit handling
15. Analyzing Guardrail Results
Parse, analyze, and generate reports from guardrail detection results