"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
This article explains how to add a new local manager into CyberHoot's Platforms. If you prefer CyberHoot to...
Read more
These are the steps to archive/remove a training program: Log InLog in to your account and make sure you're on...
Read moreHR Contacts are edited and assigned under each Group. The process to update the HR Contact for your MSP or a...
Read more
Unique Roles within CyberHoot There are five distinct roles within the CyberHoot platform. These roles are...
Read more
Microsoft M365 PowerShell Scripts: Bypass SPAM, Clutter and Junk in M365. Microsoft PowerShell scripts...
Read more
Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...
Read more
CyberHoot Power Platform: Automatic Mode. The instructions below provide a walkthrough on how to add a customer...
Read more
This article provides steps on how to add a new governance policy into CyberHoot. How to Add a Policy to a Group...
Read more
These steps outline how to assign a training program and the frequency at which the videos are being sent out to...
Read more
This video helps you create your own unique training program within CyberHoot. This can be done as a direct...
Read more
Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...
Read more
This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
