Cybersixgill Actionable Alerts

Supported OS Linux Windows Mac OS

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.


The Cybersixgill actionable alerts check monitors critical assets across the deep, dark, and surface web such as IP addresses, domains, vulnerabilities, and VIPs. Receive alerts with context including severity, threat type, description, post snippet, recommendations, and assessments. This integration provides an out-of-the-box dashboard to prioritize and respond to threats.



To install the Cybersixgill actionable alerts check on your host:

  1. Install the developer tool on any machine.
  2. To build the package, run the command: ddev release build cybersixgill_actionable_alerts.
  3. Install the Datadog Agent on your host.
  4. Once the Agent is installed, run the following command to install the integration:
datadog-agent integration install -t datadog-cybersixgill-actionable-alerts==1.0.1


  1. Reach out to Cybersixgill Support and request access to the Cybersixgill Developer Platform.
  2. Receive the welcome email with access to the Cybersixgill developer platform.
  3. Within the Cybersixgill developer platform, create the Client ID and Client secret.
  4. Copy the Client ID and Client secret and paste them into the Configuration.yaml file.
  5. Provide the minimum collection interval in seconds. For example, min_collection_interval: 3600


Verify that Cybersixgill events are generated in the Datadog Events Explorer.

Data Collected

Service Checks

Returns OK If Client Id and Client Secret are present in an Instance. Returns CRITICAL If Configuration Errors occur.
Statuses: ok, critical
Returns CRITICAL If the Agent is unable to connect to Cybersixgill API
Statuses: ok, critical


This integration sends API-type events to Datadog.


Need help? Contact Cybersixgill support.