HowTo: Add Users to CyberHoot

22nd June 2025 | HowTo, MSP, Platform HowTo: Add Users to CyberHoot

This article explains how to add Local Users to CyberHoot on both Power and Autopilot Platforms.

To add users via Entra ID sync follow this document.

To add users via Google Workspace sync follow this document.

How to Add Local Users on Power Platform

1. Log in to the MSP Portal

  • Log into your CyberHoot MSP environment.

2. Select the Desired Tenant

  • Click the double-arrow icon to switch tenants.

  • Select the appropriate client (e.g., “Acme Corp”).

3. Go to the “Users” Tab

  • Click on the “Users” tab.


USER MANAGEMENT OPTIONS

LOCAL Management

A. Add a Single User

  1. Click “Add User”.

  2. Fill out:

    • First Name

    • Last Name

    • Email

    • Manager Name (select or add manually)

  3. Assign to the Default Group.

  4. Click “Add User”.


B. Add Users via CSV

  1. Click “Download CSV Template”.

  2. Fill out the CSV:

    • Columns A–C: Employee First Name, Last Name, Email

    • Columns D–F: Manager First Name, Last Name, Email

    • Optional: Group(s)

  3. Upload using the “Upload CSV” button.


How to Add a New User on Autopilot Platform

1. Log in to the MSP Portal

  • Log into your CyberHoot MSP environment.

2. Select the Desired Tenant

  • Select the appropriate client (e.g., “Acme Corp”).

3. Go to the “Users” icon.

  • Click on “Users”.


USER MANAGEMENT OPTIONS

LOCAL Management

A. Add a Single User

  1. Click “Add User”.

  2. Fill out:

    • First Name, Last Name

    • Email

    • Manager Name

  3. Click “Add +”.


B. Add Users via CSV

  1. Click “CSV Upload”.

  2. Fill out the CSV:

    • Column A: Employee FirstName LastName (Both on the “A” column)

    • Columns B: Employee’s Email

  3. Upload using the “Process CSV” button.


Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Safe AI Adoption: Five Rules Every Business Must Follow

Safe AI Adoption: Five Rules Every Business Must Follow

Artificial Intelligence (AI) tools are entering our businesses like a new intern with great ideas but no...

Read more
From Fear to Feedback: Report Phishing Channel Works Wonders

From Fear to Feedback: Report Phishing Channel Works Wonders

CyberHoot believes security awareness should feel positive, empowering, and rewarding. Traditional phishing...

Read more
Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more