HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

10th April 2026 | HowTo, MSP, Platform, Technology HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

Google Workspace “Report Phish” Integration


🔹 Overview

Gmail’s built-in “Report Phishing” button sends reports only to Google’s internal Alert Center — it does not forward to a custom mailbox. To route user-reported phishing emails to CyberHoot, a Gmail add-on from the Google Workspace Marketplace is required.

Required add-on: Demisto Phishing Add-on

FeatureDetails
One-click reportingUsers click a single button to report suspicious email
Forwarding methodForwards the original email as an attachment to your configured address
Admin-configurableDestination email is set once by the admin and applies to all domain users
Marketplace listingworkspace.google.com/marketplace

1️⃣ Install the Add-on (Admin Only)

1. Go to the Demisto Phishing Add-on page in the Google Workspace Marketplace:
👉 https://workspace.google.com/marketplace/app/demisto_phishing_addon/98372960675

2. Click Admin Install

3. Select Everyone at your organization

4. Check the box to agree to the Terms of Service, Privacy Policy, and Google Workspace Marketplace Terms of Service

5. Click Finish


2️⃣ Configure the Add-on (Admin Only)

Once installed, the admin must configure the destination email from within Gmail. This is a one-time setup and the settings apply to all users in the domain.

1. Open Gmail while signed in as a Google Workspace admin

2. In the right sidebar, click the Demisto add-on icon to open the panel

3. The panel will display an Admin Setup section with the following fields:

FieldWhat to enter
Forwarding email addressEnter reportphish@cyberhoot.com to send reports directly to CyberHoot, or enter your internal security team’s mailbox if you prefer to review reports before they are forwarded
Add-on display nameEnter a name your users will recognise, e.g. Report Phishing
Add-on logo URLOptionally enter your own logo URL, or use CyberHoot’s logo:
https://cyberhoot.com/wp-content/themes/cyberhoot-theme/images/logo.png
  1. Click Update to save. Settings are applied domain-wide immediately.

📌 If you choose to use an internal mailbox as the forwarding address, make sure to configure that mailbox to forward a copy of all received reports to reportphish@cyberhoot.com so CyberHoot can process them. See Step 3 below.


3️⃣ Forward Reports to CyberHoot (If Using an Internal Mailbox)

Skip this step if you entered reportphish@cyberhoot.com directly in Step 2. If you are routing reports through an internal security mailbox first, follow these steps to forward a copy to CyberHoot.

Google Workspace blocks automatic external forwarding by default, so you must first enable it for the reporting mailbox.

3️⃣.1️⃣ Allow External Forwarding for the Reporting Mailbox

  1. Sign in to the reporting mailbox in Gmail
  2. Go to Settings → See all settings → Forwarding and POP/IMAP
  3. Click Add a forwarding address and enter reportphish@cyberhoot.com
  4. Confirm the forwarding address when prompted by Google
  5. Select Forward a copy to retain the original in the internal mailbox
  6. Click Save Changes

4️⃣ Validate the Full Flow

  1. Send a test phishing email to a user
  2. User opens the email in Gmail and clicks the Report Phishing button in the sidebar
  3. Confirm:
    • The reported email is forwarded to the configured address
    • If using an internal mailbox, confirm it relays a copy to CyberHoot
    • The original email is preserved as an .eml attachment

📌 Result:
User-reported messages are automatically forwarded to CyberHoot with a single click, with no further action required from the user.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more