HowTo: Add Users to CyberHoot

22nd June 2025 | HowTo, MSP, Platform HowTo: Add Users to CyberHoot

This article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms.

To add users via Entra ID sync follow this document.

To add users via Google Workspace sync follow this document.

How to Add Local Users on Power Platform

1. Log in to the MSP Portal

  • Log into your CyberHoot MSP environment.

2. Select the Desired Tenant

  • Click the double-arrow icon to switch tenants.

  • Select the appropriate client (e.g., “Acme Corp”).

3. Go to the “Users” Tab

  • Click on the “Users” tab.


USER MANAGEMENT OPTIONS

LOCAL Management

A. Add a Single User

  1. Click “Add User”.

  2. Fill out:

    • First Name

    • Last Name

    • Email

    • Manager Name (select or add manually)

  3. Assign to the Default Group.

  4. Click “Add User”.


B. Add Users via CSV

  1. Click “Download CSV Template”.

  2. Fill out the CSV:

    • Columns A–C: Employee First Name, Last Name, Email

    • Columns D–F: Manager First Name, Last Name, Email

    • Optional: Group(s)

  3. Upload using the “Upload CSV” button.


How to Add a New User on Autopilot Platform

1. Log in to the MSP Portal

  • Log into your CyberHoot MSP environment.

2. Select the Desired Tenant

  • Select the appropriate client (e.g., “Acme Corp”).

3. Go to the “Users” icon.

  • Click on “Users”.


USER MANAGEMENT OPTIONS

LOCAL Management

A. Add a Single User

  1. Click “Add User”.

  2. Fill out:

    • First Name, Last Name

    • Email

    • Manager Name

  3. Click “Add +”.


B. Add Users via CSV

  1. Click “CSV Upload”.

  2. Fill out the CSV:

    • Column A: Employee FirstName LastName (Both on the “A” column)

    • Columns B: Employee’s Email

  3. Upload using the “Process CSV” button.


Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more