---
title: Cybersixgill Actionable Alerts
description: >-
  Monitor the activity of assets and provide real-time alerts on incoming
  threats
breadcrumbs: Docs > Integrations > Cybersixgill Actionable Alerts
---

# Cybersixgill Actionable Alerts
Supported OS Integration version1.0.1        Dashboard image of alerts countDashboard image of events list with titleDashboard image of emerging alerts countDashboard image of imminent alerts count
## Overview{% #overview %}

The Cybersixgill actionable alerts check monitors critical assets across the deep, dark, and surface web such as IP addresses, domains, vulnerabilities, and VIPs. Receive alerts with context including severity, threat type, description, post snippet, recommendations, and assessments. This integration provides an out-of-the-box dashboard to prioritize and respond to threats.

## Setup{% #setup %}

### Installation{% #installation %}

To install the Cybersixgill actionable alerts check on your host:

1. Install the [developer tool](https://docs.datadoghq.com/developers/integrations/new_check_howto.md?tab=configurationtemplate#configure-the-developer-tool) on any machine.
1. To build the package, run the command: `ddev release build cybersixgill_actionable_alerts`.
1. [Install the Datadog Agent](https://app.datadoghq.com/account/settings/agent/latest) on your host.
1. Once the Agent is installed, run the following command to install the integration:

```
datadog-agent integration install -t datadog-cybersixgill-actionable-alerts==1.0.1
```

### Configuration{% #configuration %}
Reach out to [Cybersixgill Support](mailto:support@cybersixgill.com) and request access to the Cybersixgill Developer Platform.Receive the welcome email with access to the Cybersixgill developer platform.Within the Cybersixgill developer platform, create the Client ID and Client secret.Copy the Client ID and Client secret and paste them into the Configuration.yaml file.Provide the minimum collection interval in seconds. For example, `min_collection_interval: 3600`
### Validation{% #validation %}

Verify that Cybersixgill events are generated in the [Datadog Events Explorer](https://app.datadoghq.com/event/explorer).

## Data Collected{% #data-collected %}

### Service Checks{% #service-checks %}

**cybersixgill\_actionable\_alert.can\_connect**

Returns `OK` If Client Id and Client Secret are present in an Instance. Returns `CRITICAL` If Configuration Errors occur.

*Statuses: ok, critical*

**cybersixgill.health**

Returns `CRITICAL` If the Agent is unable to connect to Cybersixgill API

*Statuses: ok, critical*

### Events{% #events %}

This integration sends API-type events to Datadog.

## Troubleshooting{% #troubleshooting %}

Need help? Contact [Cybersixgill support](mailto:support@cybersixgill.com).
