HowTo: Manually Send Welcome Emails
This HowTo article shows how to manually send “Welcome Emails” within CyberHoot’s Power and Autopilot platforms.
HowTo videos and articles explaining how to administer and use CyberHoot.
This HowTo article shows how to manually send “Welcome Emails” within CyberHoot’s Power and Autopilot platforms.
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Adding customers is easy with the 5 step wizard. This article goes into the basic details of adding your customers into CyberHoot.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Microsoft Azure / Entra allows you to define Managers for each employee entry in Azure AD. This helps CyberHoot and Clients maintain high compliance as CyberHoot will automatically notify Managers when employees are non-compliant both through weekly reports and by CC’ing Managers on a Due Date email sent to employees who have not completed their assignments.
How to Allow-list in AppRiver If you’re using AppRiver’s SpamLab spam filtering, you can add CyberHoot to your whitelist to ensure that our simulated phishing test emails and training notifications …
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Overview CyberHoot’s API allows for the following information to be pulled from the platform: Customers Managers Users Administrators Compliance Metrics Training Schedules Partner Settings Subscription Information More Information The CyberHoot …
Sending Attack emails to your users for Phish Testing requires writing an Allow-List for CyberHoot Mail relays exempting them from filtration by ProofPoint. This is true for all phish testing platforms.
When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the CyberHoot addresses. Otherwise the Website Management defenses will intercept any attempt …
This video provides MSPs with instructions on how to add a new “Automatic” client to CyberHoot. Automatic Clients automate the delivery a single monthly security awareness training video and a quarterly phishing test by assignment with no intervention by the MSP at all. The only requirement for the MSP is that they manage user adds and deletes.
This video provides end users with an overview of the Phish Testing by assignment service in CyberHoot. It should be shared with anyone who is struggling to complete their phishing test by assignment.
Phish testing has been punitive to employees and difficult for SMBs and MSPs to set up. It requires you to configure allow-lists, X-Headers, and PowerShell scripts. This video and how explains how to avoid all that hassle with automated assignment-based phish testing that is a positive learning experience for employees with zero administration and setup for SMBs or MSPs.
Are your users having issues with an endless looping with authentication emails after trying to reach your ‘My Assignments’ page on CyberHoot? One common factor that causes these issues are …
This script will allow you to add CyberHoot’s domains to the Safe Senders listing enabling the automatic downloading of images in an email message.
CyberHoot provides phish testing of end users to ensure they learn to pay attention to their email and the risks is presents. This article provides a Powershell script to automate the setup work required to ensure delivery of phishing test emails to end users inboxes.
Please note: Only Azure AD Government Community Cloud (GCC) environments need to follow these instructions. If you wish to watch our walkthrough video instead of reading through each step, click …
Microsoft Government Community Cloud environments must continue using the Enterprise Application method for user synchronization. This article explains how to add Enterprise Application permissions for CyberHoot.
Microsoft Government Community Cloud environments must continue using the Enterprise Application method for user synchronization. This article explains how to create the client secret for securely synchronizing users with CyberHoot out of Azure GCC environments.
Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users. Optional assignments provide the convenience of providing training to your users without the repeated reminders …
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
HR Contacts are edited and assigned under each Group. The processes to edit the HR contact for your MSP or your customers are below: Adding/Editing HR Contacts for Your MSP …
This article details how to setup and edit your billing information as a direct client of CyberHoot. Direct clients, who signed up for CyberHoot.com for services, live and operate on …
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your …
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
One of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the wealth of Social Media content we produce. Our Cybrary contains over 500 …
Attack-based phishing tests are becoming less common as they are replaced with more positive, educational, and effective Assignment-based tests. This video and overview teaches you how to configure the attack-based phishing tests in CyberHoot. You should also consider switching to assignment-based in the future if possible.
This video will walk you through how to share a survey in CyberHoot once you have either created one or found one in our Survey Library to share with people. …
This video outlines step by step how to find your BitLocker Recovery Key on your computer. Visit https://cyberhoot.com/howto/ for all of our HowTo instructional videos. Watch this video on YouTube …
This video outlines how to add a local Client Administrator to CyberHoot. This is not to be confused with adding an MSP Super User, which is outlined in this video …
This video will give you step by step directions on how to add a Super User to CyberHoot’s multi-tenant SaaS platform. You typically want to add your own staff at …
This video outlines step by step how to add a new video into CyberHoot and then assign that video to a specific user group. Make sure when adding a video …
This video gives you an overview of all the features available on CyberHoot’s dashboard. Watch this video to see where each button brings you and how to navigate the CyberHoot …
In this HowTo video you’ll learn how to assign a PDF document (policy, process, memorandum) to a specific group of users in your organization.
To learn how to send users that haven’t completed their assignments an email reminder in less than the time it takes to brush your teeth, watch this very short informational …
Watch this HowTo video to get an overview of CyberHoot’s “Manager Compliance Report” that is sent out every Monday to all manager’s inboxes. You can now generate customized reports in …
This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template policies to suite their purposes. The video reviews the important steps you need to …
Updated: August 9th, 2023 This article is a reference to CyberHoot’s mail relay IP Addresses and Domain names. The process of allowing phishing tests through to your end users inboxes …
If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to …
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a …
New CyberHoot businesses need to allow our training and phishing emails to reach their user’s inboxes directly. This article describes the two steps needed to make this happen. Note: If …
This video walks you through how to access ‘My Assignments‘. When you visit your assignments here you can view outstanding assignments and complete them, you can re-watch previous training videos …
Before CyberHoot can email training assignments, policies, surveys, or phishing tests reliably to targeted email accounts, our mail relays need to be permitted to do so through whitelisting. Here’s how you do that in a few easy steps and videos.
This article will walk you through setting up allow list in Mimecast. The required IP address and Domain name information is found in this HowTo article: CyberHoot Email-Relay IP Addresses, …
This video helps you create your own unique training program within CyberHoot. The video shows how to set a frequency at which your employees receive their training videos, how to …
This video outlines step-by-step how to clone a training program, assign a frequency at which the videos are being sent out to staff, and customize the training program if you …