HowTo: Determine Roles in CyberHoot

21st June 2025 | HowTo, MSP, Platform, Technology HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot

There are five distinct roles within the CyberHoot platform. These roles are mutually exclusive, being assigned one role does not automatically grant permissions of another. For example, a Manager is not automatically a User, and an Administrator is not automatically a Manager. Each role must be created and managed independently, including deletions.


1. Users

  • These accounts are assigned to individuals who receive security training content.

  • They do not have access to administrative or reporting functions.


2. Managers

  • These accounts receive compliance reports for all Users recursively beneath them in the organizational structure.

  • Managers of other Managers are included in the reporting hierarchy.


3. HR Contacts

  • These accounts are designated to receive HR escalation notifications.

  • Specifically, they receive notification which is triggered for Users who remain non-compliant after prior reminders.


4. Tenant Administrator

  • These accounts have full administrative control within a single tenant account.

  • They can manage Users, Managers, and HR Contacts, as well as configure client-specific settings.


5. MSP Super Administrator

  • These accounts have comprehensive administrative control across all tenant accounts within the MSP’s domain.

  • Capabilities include:

    • Switching between all tenant accounts

    • Editing MSP-wide settings

    • Performing all actions available to a Tenant Administrator

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more