HowTo: CyberHoot’s API Documentation

HowTo: CyberHoot’s API Documentation

CyberHoot API Documentation

Overview

CyberHoot’s API allows for the following information to be pulled from the platform:

  • Customers
  • Managers
  • Users
  • Administrators
  • Compliance Metrics
  • Training Schedules
  • Partner Settings
  • Subscription Information
  • Email Logs
  • Reporting
  • More Information

The CyberHoot API is available to our partners. It is organized around REST, uses standard HTTP response codes, accepts form-encoded request bodies, and returns JSON-encoded responses.

Use Cases:

With CyberHoot’s API, you can:

  • Customer Onboarding:
    Automate setup and manage client details easily.

  • Compliance Tracking:
    Monitor and report compliance metrics effectively.

  • User Synchronization:
    Sync user roles and access between systems.

  • Training Scheduling:
    Integrate and optimize security training calendars.

  • Subscription Management:
    Streamline subscription tracking and billing processes.

  • Email Auditing:
    Analyze email interactions and user engagement efficiently.

  • Documentation Link:

    https://cyberhoot.com/API/


      • Related Articles

      • HowTo: Allow-List CyberHoot’s Mail-Relays in M365

        High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either Domain Name or IP Addresses in Microsoft’s O365 environment. This process is very similar whether you use the domain names shown below or the ...
      • HowTo: Add CyberHoot’s RSS Feed

        CyberHoot delivers tremendous value to businesses and Managed Service Providers (MSPs) through a steady stream of high-quality cybersecurity content. By tapping into our RSS feed, you can keep your team informed and engaged with the latest security ...
      • HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365

        Detailed Instructions From Microsoft: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide Once you click the link above, follow the instructions under ...
      • HowTo: The Benefits of CyberHoot’s HootPhish

        The Challenges of Traditional Phish Testing Traditional attack-based phishing tests have often felt punitive to end-users and cumbersome for MSPs to deploy. They require complex configurations like allow-lists, X-Headers, and PowerShell scripts just ...
      • HowTo: Allow-List CyberHoot – Personal Gmail Account

        If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a quick video for how to accomplish that. https://youtu.be/VzXBGn-g5eI ...