HowTo: Add a New PDF Policy

21st June 2025 | HowTo, MSP, Platform HowTo: Add a New PDF Policy

This article provides steps on how to add a new governance policy into CyberHoot.

How to Add a Policy to a Group in CyberHoot

Option 1: Upload Your Own Policy

  1. Log in and go to the Dashboard.

  2. Click either:

    • The Policies box, or

    • The Policies tab in the top menu.

  3. Click Add Policy.

  4. Upload your PDF file.

  5. Fill out the required fields:

    • Policy name

    • Start date

    • Auto-renew date (optional, with a 60-day reminder)

    • Acceptance window

    • Reminders

    • Enable a quiz (optional)

  6. Choose the target group.

  7. Click Create.


Option 2: Use and Customize a Template from the Library

  1. Go to the Training Library.

  2. Find a policy you want to use.

  3. Click Download to get the policy in Microsoft Word format.

  4. Open the Word document you just downloaded.

  5. Customize the policy to match your organization’s needs.

  6. Save the file as a PDF (not as a Word doc).

  7. Return to Add Policy.

  8. Upload the customized PDF.

  9. Fill out all required settings (start date, acceptance window, auto-renew, etc.).

  10. Click Create.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more