HowTo: Determine Roles in CyberHoot

21st June 2025 | HowTo, MSP, Platform, Technology HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot

There are five distinct roles within the CyberHoot platform. These roles are mutually exclusive, being assigned one role does not automatically grant permissions of another. For example, a Manager is not automatically a User, and an Administrator is not automatically a Manager. Each role must be created and managed independently, including deletions.


1. Users

  • These accounts are assigned to individuals who receive security training content.

  • They do not have access to administrative or reporting functions.


2. Managers

  • These accounts receive compliance reports for all Users recursively beneath them in the organizational structure.

  • Managers of other Managers are included in the reporting hierarchy.


3. HR Contacts

  • These accounts are designated to receive HR escalation notifications.

  • Specifically, they receive notification which is triggered for Users who remain non-compliant after prior reminders.


4. Tenant Administrator

  • These accounts have full administrative control within a single tenant account.

  • They can manage Users, Managers, and HR Contacts, as well as configure client-specific settings.


5. MSP Super Administrator

  • These accounts have comprehensive administrative control across all tenant accounts within the MSP’s domain.

  • Capabilities include:

    • Switching between all tenant accounts

    • Editing MSP-wide settings

    • Performing all actions available to a Tenant Administrator

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more