HowTo: Optional Training Assignments on Power Platform

21st May 2025 | HowTo, Platform HowTo:  Optional Training Assignments on Power Platform

Overview

CyberHoot gives you the flexibility to assign policies, videos, and programs to your users as optional learning resources. These assignments are ideal for offering valuable training without triggering repeated reminders or enforcing strict compliance requirements.

Optional assignments are tracked separately from compliance data, ensuring your compliance metrics remain accurate and unaffected. This allows you to provide supplemental content without skewing your reports.

Here’s how to get started…

Optional Policy Assignment

When creating or cloning a policy, simply check the ‘This is Optional’ checkbox in the upper right hand corner of the card as seen here:

Optional Video Assignment

When creating or cloning a policy, simply check the ‘This is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Program Assignment

Once a program is added, you can assign the training program to a group of users as an optional training program by checking the ‘Training Program is Optional‘ checkbox in the upper right hand corner of the card as seen here:

Optional Reports

You can view the Optional Reports by click on the Reports link in the navigation bar and clicking the Optional Reports card, which will take you to the Optional Reports page.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more