HowTo: Determine Roles in CyberHoot

21st June 2025 | HowTo, MSP, Platform, Technology HowTo: Determine Roles in CyberHoot

Unique Roles within CyberHoot

There are five distinct roles within the CyberHoot platform. These roles are mutually exclusive, being assigned one role does not automatically grant permissions of another. For example, a Manager is not automatically a User, and an Administrator is not automatically a Manager. Each role must be created and managed independently, including deletions.


1. Users

  • These accounts are assigned to individuals who receive security training content.

  • They do not have access to administrative or reporting functions.


2. Managers

  • These accounts receive compliance reports for all Users recursively beneath them in the organizational structure.

  • Managers of other Managers are included in the reporting hierarchy.


3. HR Contacts

  • These accounts are designated to receive HR escalation notifications.

  • Specifically, they receive notification which is triggered for Users who remain non-compliant after prior reminders.


4. Client Administrator

  • These accounts have full administrative control within a single client account.

  • They can manage Users, Managers, and HR Contacts, as well as configure client-specific settings.


5. MSP Super Administrator

  • These accounts have comprehensive administrative control across all client accounts within the MSP’s domain.

  • Capabilities include:

    • Switching between all client accounts

    • Editing MSP-wide settings

    • Performing all actions available to a Client Administrator

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more