HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

1st December 2025 | HowTo, MSP, Platform, Technology HowTo: Report Delivery and Recipient Configuration Overview in Autopilot

This document outlines how report delivery and recipient configuration work across Partner and Tenant levels, including which reports allow customization, which are hard-coded, and CyberHoot’s recommended best practices.

1. Recipient Configuration by Report Type

Reports Configurable at the Tenant and/or Partner Level

Within the Tenant Dashboard, under Reports, the following reports are available:

Cybersecurity Summary Report

  • Recipient delivery can be configured under Settings.
  • Delivery can be set to:
    • Tenant-level recipients
    • Partner-level recipients
    • Both Tenant and Partner levels
  • This configuration is visible when selecting Custom Settings for report delivery.
  • Additional email addresses can be manually added.

Managers Summary Report

  • This report is automatically sent only to designated managers.
  • Managers must have active users reporting to them.
  • Recipient configuration is not customizable beyond assigned managers.

2. Reports Hard-Coded to the Partner Contact Email

The following reports are always delivered to the Partner Contact Email and cannot be reassigned:

AttackPhish Summary Report

  • Sent automatically after an AttackPhish campaign completes.
  • Delivery is hard-coded to the Partner Contact Email.

MSP Aggregate Report

  • Available in the Partner Dashboard under Reports.
  • Provides aggregated compliance data and user counts across all tenants.
  • Delivery recipients can be configured under Settings.
  • Reports can be sent to selected site administrators.

3. Delivery to Client-Side Roles

Supported Client-Side Delivery Options

  • Managers Summary Report: Sent exclusively to managers.
  • Cybersecurity Summary Report:
    • Can be sent to Tenant-level contacts
    • Can be sent to Partner-level contacts
    • Can be sent to both
    • Supports additional manual email recipients

4. Disabling Automatic Report Delivery

Automatic delivery can be disabled for the following reports:

  • Cybersecurity Summary Report
  • Managers Summary Report

To disable:

  1. Navigate to Delivery
  2. Select Custom Settings
  3. Toggle Disable Auto-Generated Report

This will stop all automatic deliveries for the selected report.

5. On-Demand Report Delivery

For the Cybersecurity Summary and Managers Summary reports:

  • Administrators can access the tenant environment to generate reports manually.
  • Under Generate Now, reports can be:
    • Emailed immediately
    • Downloaded for offline use

This allows reports to be delivered on demand instead of on a fixed schedule.

6. Excluding the MSP / Partner Contact from Delivery

  • For both the Cybersecurity Summary and Managers Summary reports:
    • Delivery can be set to Tenant-level recipients only.
    • When using Email Report Now, Tenant-level recipients can be selected exclusively.
  • The Partner Contact Email cannot be excluded from:
    • AttackPhish Summary Report delivery

7. Global vs Per-Tenant Configuration

Per-Tenant Configuration Required

  • Cybersecurity Summary Report
  • Managers Summary Report

Each tenant must be individually configured for:

  • Delivery schedule
  • Recipient selection

Global / Automatic Behavior

  • AttackPhish Summary Report
    • Automatically sent per tenant
    • Always delivered to the Partner Contact Email

CyberHoot’s default report settings reflect recommended best practices:

  • Cybersecurity Summary Report
    • Delivered monthly
    • Scheduled for the 1st of each month
  • Managers Summary Report
    • Delivered weekly
    • Sent every Monday

These schedules provide consistent visibility while avoiding unnecessary report fatigue.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more