HowTo

Soar through set up with ease.

Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.

CyberHoot’s API Documentation

CyberHoot’s API Documentation

Overview CyberHoot's API allows for the following information to be pulled from the platform: Customers...

Read more
HowTo: Enable Multifactor Authentication within CyberHoot

HowTo: Enable Multifactor Authentication within CyberHoot

The Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...

Read more
HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

New CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....

Read more
CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

Updated: May 8th, 2025 This article is a reference to CyberHoot's mail relay IP Addresses and Domain names.  The...

Read more
Allow Listing CyberHoot in Sophos EndPoint Protection

Allow Listing CyberHoot in Sophos EndPoint Protection

When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...

Read more
HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

CyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...

Read more
Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

If you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to allow your users...

Read more
Autopilot Platform Administration Overview

Autopilot Platform Administration Overview

Welcome to the CyberHoot Autopilot Platform: A Guided Tour for New Administrators Starting with a new platform can...

Read more
Power Platform Administration Overview

Power Platform Administration Overview

Welcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...

Read more
HowTo: How to Add Users via M365 (Entra ID) on Power Platform

HowTo: How to Add Users via M365 (Entra ID) on Power Platform

Adding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...

Read more
HowTo: Add a New Client to CyberHoot’s Power Platform

HowTo: Add a New Client to CyberHoot’s Power Platform

This video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...

Read more
HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst