---
title: MISP
description: Collect attributes and events from MISP
breadcrumbs: Docs > Integrations > MISP
---

# MISP
Supported OS marketplaceIntegration version1.0.0MISP - Events and Attributes
## Overview{% #overview %}

[Malware Information Sharing Platform](https://www.misp-project.org/) (MISP) is an open-source threat intelligence platform used for sharing and storing threat data across organizations. The Datadog integration for MISP brings your threat intelligence data into Datadog for centralized visibility. It collects MISP events and attributes as logs in Datadog, helping you monitor and streamline security incident investigations.

## Data Collected{% #data-collected %}

### Service Checks{% #service-checks %}

**crest\_data\_systems\_misp.status**

Returns `CRITICAL` if authentication with datadog has failed. Returns `OK` otherwise.

*Statuses: ok, critical*

**crest\_data\_systems\_misp.can\_connect**

Returns `CRITICAL` if authentication with misp has failed. Returns `OK` otherwise.

*Statuses: ok, critical*

## Support{% #support %}

For support or feature requests, contact Crest Data through the following channels:

- Support email: [datadog.integrations@crestdata.ai](mailto:datadog.integrations@crestdata.ai)
- Sales email: [datadog-sales@crestdata.ai](mailto:datadog-sales@crestdata.ai)
- Website: [crestdata.ai](https://www.crestdata.ai/)
- FAQ: [Crest Data Datadog Marketplace Integrations FAQ](https://docs.crestdata.ai/datadog-integrations-readme/Crest_Data_Datadog_Integrations_FAQ.pdf)

This application is made available through the Marketplace and is supported by a Datadog Technology Partner. Click Here to purchase this application.
