HowTo

Soar through set up with ease.

Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.

HowTo: PowerShell Script for Safe Links Configuration in M365

HowTo: PowerShell Script for Safe Links Configuration in M365

PowerShell Script for Safe Links Configuration in Microsoft 365 Overview This PowerShell script configures...

Read more
HowTo: Allow-List in Perception Point

HowTo: Allow-List in Perception Point

CyberHoot – Perception Point Allowlisting Instructions Organizations using Perception Point for...

Read more
CyberHoot Treasure Map to Mastery and Success

CyberHoot Treasure Map to Mastery and Success

Welcome to Your CyberHoot Mastery Guide! You made it! This is your visual treasure map to CyberHoot success....

Read more
HowTo: Create Your Own Training with CustomHoots

HowTo: Create Your Own Training with CustomHoots

This article explains how Autopilot’s CustomHoots PowerUp works and provides guidance on creating your own...

Read more
HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

This document outlines how report delivery and recipient configuration work across Partner and Tenant levels,...

Read more
HowTo: Fix False Opens and Clicks in AttackPhish Reports

HowTo: Fix False Opens and Clicks in AttackPhish Reports

Why Does My AttackPhish Report Show Users Opening and Clicking Emails They Never Saw? Overview ​If...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Power Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

HowTo: Integrate CyberHoot with SyncroMSP (Autopilot Platform)

This guide walks you through setting up and managing the CyberHoot–SyncroMSP integration using the CyberHoot...

Read more
HowTo: Understand End-User Experience in CyberHoot

HowTo: Understand End-User Experience in CyberHoot

Overview CyberHoot provides a simple, engaging cybersecurity training experience designed to strengthen user...

Read more
HowTo: Allow-List in MailProtector

HowTo: Allow-List in MailProtector

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in DNS Filter

HowTo: Allow-List in DNS Filter

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
HowTo: Allow-List in BitDefender

HowTo: Allow-List in BitDefender

This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer