---
title: CyberArk Identity
description: Monitor CyberArk Identity's MFA, Device, User, and Application information.
breadcrumbs: Docs > Integrations > CyberArk Identity
---

# CyberArk Identity
Supported OS marketplaceIntegration version1.1.1            CyberArk Identity MFA DashboardCyberArk Identity User and Endpoint DashboardCyberArk Identity Application DashboardCyberArk Identity Access Role Event DashboardCyberArk Identity Login Event DashboardCyberArk Identity Modify User Event DashboardCyberArk Identity Overview DashboardCyberArk Identity Password Event Dashboard
## Overview{% #overview %}

CyberArk Identity provides a secure platform for managing application access, endpoints, and your network infrastructure. CyberArk Identity also offers adaptive analytics, auditing of user activity, and built-in and custom reports, which are available through the Identity Administration portal.

**Features of CyberArk Identity include the following:**

- **Automated Access Provisioning:** Dynamically provision and revoke access to corporate resources.

- **Identity Orchestration:** Simplify and automate complex identity processes.

- **Compliance Controls:** Establish organization-wide compliance and access attestation controls.

- **Comprehensive Reporting:** Use audit reports and detailed dashboards to gain visibility into access permissions and entitlements.

- This integration uses CyberArk Identity as the source to collect data related to users, devices, application, MFA events, login events, password events, user modification events, and access role events. It utilizes CyberArk Identity's RedRock query endpoint to retrieve this data from the portal.

This integration includes the following [Datadog Cloud SIEM](https://docs.datadoghq.com/security/cloud_siem/) detection rules for enhanced monitoring and security:

- Manual password reset of admin account
- Native login to CyberArk
- User suffix type has changed
- User was added to priv cloud admin role
- User was added to system admin role

**Note**: To use the out-of-the-box detection rules, the relevant integration must be installed in Datadog, and Cloud SIEM must be enabled.

## Data Collected{% #data-collected %}

### Metrics{% #metrics %}

|  |
|  |
| **cds.cyberark.identity.device.available\_device\_capacity**(gauge) | Available Device Capacity |

### Service Checks{% #service-checks %}

**cds.cyberark.identity.status**

Returns `CRITICAL` if the user configurations are invalid or if server authentication fails. Returns `OK` otherwise.

*Statuses: ok, critical*

## Support{% #support %}

For support or feature requests, contact Crest Data through the following channels:

- Support Email: [datadog.integrations@crestdata.ai](mailto:datadog.integrations@crestdata.ai)
- Sales Email: [datadog-sales@crestdata.ai](mailto:datadog-sales@crestdata.ai)
- Website: [crestdata.ai](https://www.crestdata.ai/)
- FAQ: [Crest Data Datadog Marketplace Integrations FAQ](https://docs.crestdata.ai/datadog-integrations-readme/Crest_Data_Datadog_Integrations_FAQ.pdf)

This application is made available through the Marketplace and is supported by a Datadog Technology Partner. Click Here to purchase this application.
