“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...
Read more
Microsoft M365 PowerShell Scripts: Bypass SPAM, Clutter and Junk in M365. Microsoft PowerShell scripts...
Read more
Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...
Read more
CyberHoot Power Platform: Automatic Mode. The instructions below provide a walkthrough on how to add a customer...
Read more
This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...
Read more
These steps outline how to assign a training program and the frequency at which the videos are being sent out to...
Read more
This video helps you create your own unique training program within CyberHoot. This can be done as a direct...
Read more
Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...
Read more
This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...
Read more
This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...
Read more
Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace Sync If your company uses Google...
Read more
If you're utilizing Barracuda's Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
