HowTo: Avanan Allow-Listing in Google Workspace
This HowTo article shows how to allow-list Avanan in Google Workspace.
Platform resources involving CyberHoot.
This HowTo article shows how to allow-list Avanan in Google Workspace.
This HowTo article shows how to allow-list Avanan in Microsoft O365.
This HowTo article shows how to manually send “Welcome Emails” within CyberHoot’s Power and Autopilot platforms.
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Adding customers is easy with the 5 step wizard. This article goes into the basic details of adding your customers into CyberHoot.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Microsoft Azure / Entra allows you to define Managers for each employee entry in Azure AD. This helps CyberHoot and Clients maintain high compliance as CyberHoot will automatically notify Managers when employees are non-compliant both through weekly reports and by CC’ing Managers on a Due Date email sent to employees who have not completed their assignments.
How to Allow-list in AppRiver If you’re using AppRiver’s SpamLab spam filtering, you can add CyberHoot to your whitelist to ensure that our simulated phishing test emails and training notifications …
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Overview CyberHoot’s API allows for the following information to be pulled from the platform: Customers Managers Users Administrators Compliance Metrics Training Schedules Partner Settings Subscription Information More Information The CyberHoot …
Sending Attack emails to your users for Phish Testing requires writing an Allow-List for CyberHoot Mail relays exempting them from filtration by ProofPoint. This is true for all phish testing platforms.
This video provides MSPs with instructions on how to add a new “Automatic” client to CyberHoot. Automatic Clients automate the delivery a single monthly security awareness training video and a quarterly phishing test by assignment with no intervention by the MSP at all. The only requirement for the MSP is that they manage user adds and deletes.
This video provides end users with an overview of the Phish Testing by assignment service in CyberHoot. It should be shared with anyone who is struggling to complete their phishing test by assignment.
Phish testing has been punitive to employees and difficult for SMBs and MSPs to set up. It requires you to configure allow-lists, X-Headers, and PowerShell scripts. This video and how explains how to avoid all that hassle with automated assignment-based phish testing that is a positive learning experience for employees with zero administration and setup for SMBs or MSPs.
Are your users having issues with an endless looping with authentication emails after trying to reach your ‘My Assignments’ page on CyberHoot? One common factor that causes these issues are …
Please note: Only Azure AD Government Community Cloud (GCC) environments need to follow these instructions. If you wish to watch our walkthrough video instead of reading through each step, click …
Microsoft Government Community Cloud environments must continue using the Enterprise Application method for user synchronization. This article explains how to add Enterprise Application permissions for CyberHoot.
Microsoft Government Community Cloud environments must continue using the Enterprise Application method for user synchronization. This article explains how to create the client secret for securely synchronizing users with CyberHoot out of Azure GCC environments.
Overview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users. Optional assignments provide the convenience of providing training to your users without the repeated reminders …
Unique Roles (5) within the CyberHoot Tool: These five (5) roles are all mutually exclusive. Because you are a Manager, does not mean you are a user. Same for Administrators …
HR Contacts are edited and assigned under each Group. The processes to edit the HR contact for your MSP or your customers are below: Adding/Editing HR Contacts for Your MSP …
This article details how to setup and edit your billing information as a direct client of CyberHoot. Direct clients, who signed up for CyberHoot.com for services, live and operate on …
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your …
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.
One of the greatest value contributions CyberHoot can make to any Business or Managed Service Provider is the wealth of Social Media content we produce. Our Cybrary contains over 500 …
Attack-based phishing tests are becoming less common as they are replaced with more positive, educational, and effective Assignment-based tests. This video and overview teaches you how to configure the attack-based phishing tests in CyberHoot. You should also consider switching to assignment-based in the future if possible.
This video will walk you through how to share a survey in CyberHoot once you have either created one or found one in our Survey Library to share with people. …
This video outlines how to add a local Client Administrator to CyberHoot. This is not to be confused with adding an MSP Super User, which is outlined in this video …
This video will give you step by step directions on how to add a Super User to CyberHoot’s multi-tenant SaaS platform. You typically want to add your own staff at …
This video outlines step by step how to add a new video into CyberHoot and then assign that video to a specific user group. Make sure when adding a video …
This video gives you an overview of all the features available on CyberHoot’s dashboard. Watch this video to see where each button brings you and how to navigate the CyberHoot …
In this HowTo video you’ll learn how to assign a PDF document (policy, process, memorandum) to a specific group of users in your organization.
To learn how to send users that haven’t completed their assignments an email reminder in less than the time it takes to brush your teeth, watch this very short informational …
Watch this HowTo video to get an overview of CyberHoot’s “Manager Compliance Report” that is sent out every Monday to all manager’s inboxes. You can now generate customized reports in …
This video outlines how an MSP or Client admin can download and customize CyberHoot cybersecurity template policies to suite their purposes. The video reviews the important steps you need to …
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a …
Before CyberHoot can email training assignments, policies, surveys, or phishing tests reliably to targeted email accounts, our mail relays need to be permitted to do so through whitelisting. Here’s how you do that in a few easy steps and videos.
This video helps you create your own unique training program within CyberHoot. The video shows how to set a frequency at which your employees receive their training videos, how to …
This video outlines step-by-step how to clone a training program, assign a frequency at which the videos are being sent out to staff, and customize the training program if you …
This video outlines step-by-step how to delete a training program. Deleting a training program will get rid of the training program forever, whereas archiving a training program will allow you …
This video outlines step-by-step how to archive a training program. Archiving a training program is different from deleting a training program in the way that you are able to restore …
This support HowTo video shows you exactly how to add a new manager into CyberHoot. Watch this video on YouTube For more instructional ‘HowTo’ videos, head over to our HowTo …
This HowTo video outlines how to add a single new user/employee into CyberHoot. If you would like to add multiple users/employees, we recommend using a CSV file, which is explained …
This HowTo video outlines how to restore an archived user or employee in a Training Program. When an archived employee is restored to an active user, they regain all completed …
This HowTo video demonstrates how to resend all outstanding assignments to a single employee’s email address. Note: This email will contain links to ALL the employee’s outstanding assignments. It will …
This support HowTo video illustrates exactly how to electronically sign your name to complete any assignment in CyberHoot. Pro Tip: Make sure to type your name exactly as shown in …