"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Quickly access our step-by-step guides and answers to help you make the most of CyberHoot.
Adding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...
Read more
This video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...
Read more
The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...
Read more
Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...
Read more
This video provides end users with a quick overview in 2 min. of their Phishing Test by Assignment service. End...
Read moreOverview CyberHoot provides the ability to optionally assign policies, videos, and programs to your users....
Read more
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in...
Read more
High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either...
Read more
This HowTo video outlines how to restore an archived user or employee in a Training Program. When an archived...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
