HowTo: Optional Training Assignments on Power Platform

21st May 2025 | HowTo, Platform HowTo:  Optional Training Assignments on Power Platform

Overview

CyberHoot gives you the flexibility to assign policies, videos, and programs to your users as optional learning resources. These assignments are ideal for offering valuable training without triggering repeated reminders or enforcing strict compliance requirements.

Optional assignments are tracked separately from compliance data, ensuring your compliance metrics remain accurate and unaffected. This allows you to provide supplemental content without skewing your reports.

Here’s how to get started…

Optional Policy Assignment

When creating or cloning a policy, simply check the ‘This is Optional’ checkbox in the upper right hand corner of the card as seen here:

Optional Video Assignment

When creating or cloning a policy, simply check the ‘This is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Program Assignment

Once a program is added, you can assign the training program to a group of users as an optional training program by checking the ‘Training Program is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Reports

You can view the Optional Reports by click on the Reports link in the navigation bar and clicking the Optional Reports card, which will take you to the Optional Reports page.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more