HowTo

Soar through set up with ease.

Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.

HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail...

Read more
HowTo: Avanan Allow-Listing in Google Workspace

HowTo: Avanan Allow-Listing in Google Workspace

This HowTo article explains how to configure Avanan's Allow Listing to allow Attack Phishing tests to reach end...

Read more
HowTo: Avanan Allow-Listing in Microsoft O365

HowTo: Avanan Allow-Listing in Microsoft O365

This HowTo article explains how to configure Avanan's Allow Listing rules to allow Attack Phishing tests to reach...

Read more
HowTo: Manually Send Welcome Emails

HowTo: Manually Send Welcome Emails

Power Platform: You can manually send the welcome email two ways: Individually: Under "User-Group-Manager" in...

Read more
HowTo: Add Managers to Employees in Microsoft Azure / Entra AD

HowTo: Add Managers to Employees in Microsoft Azure / Entra AD

Defining managers for each employee in CyberHoot is very important.  Employee managers are...

Read more
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
HowTo: Adding Super Admins on Power Platform

HowTo: Adding Super Admins on Power Platform

Super Admins on Power/Partner Platform:Super administrators on the Power/Partner platform...

Read more
HowTo: Dark Web Workflow

HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot: CyberHoot offers dark web monitoring and reporting for its clients...

Read more
CyberHoot’s API Documentation

CyberHoot’s API Documentation

Overview CyberHoot's API allows for the following information to be pulled from the...

Read more
Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

If you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to...

Read more
Allow Listing CyberHoot in Sophos EndPoint Protection

Allow Listing CyberHoot in Sophos EndPoint Protection

When Phish testing environments where Sophos EDR is present, you will need to enable allow...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director