Skip to content

Files

Latest commit

 

History

History

cybersixgill_actionable_alerts

Agent Check: cybersixgill_actionable_alerts

Overview

The Cybersixgill actionable alerts check monitors critical assets across the deep, dark, and surface web such as IP addresses, domains, vulnerabilities, and VIPs. Receive alerts with context including severity, threat type, description, post snippet, recommendations, and assessments. This integration provides an out-of-the-box dashboard to prioritize and respond to threats.

Setup

Installation

To install the Cybersixgill actionable alerts check on your host:

  1. Install the developer tool on any machine.
  2. To build the package, run the command: ddev release build cybersixgill_actionable_alerts.
  3. Install the Datadog Agent on your host.
  4. Once the Agent is installed, run the following command to install the integration:
datadog-agent integration install -t datadog-cybersixgill-actionable-alerts==1.0.1

Configuration

  1. Reach out to Cybersixgill Support and request access to the Cybersixgill Developer Platform.
  2. Receive the welcome email with access to the Cybersixgill developer platform.
  3. Within the Cybersixgill developer platform, create the Client ID and Client secret.
  4. Copy the Client ID and Client secret and paste them into the Configuration.yaml file.
  5. Provide the minimum collection interval in seconds. For example, min_collection_interval: 3600

Validation

Verify that Cybersixgill events are generated in the Datadog Events Explorer.

Data Collected

Service Checks

See service_checks.json for a list of service checks provided by this integration.

Events

This integration sends API-type events to Datadog.

Troubleshooting

Need help? Contact Cybersixgill support.