HowTo: CyberHoot’s API Documentation
Overview
CyberHoot’s API allows for the following information to be pulled from the platform:
- Customers
- Managers
- Users
- Administrators
- Compliance Metrics
- Training Schedules
- Partner Settings
- Subscription Information
- Email Logs
- Reporting
- More Information
The CyberHoot API is available to our partners. It is organized around REST, uses standard HTTP response codes, accepts form-encoded request bodies, and returns JSON-encoded responses.
Use Cases:
With CyberHoot’s API, you can:
Customer Onboarding:
Automate setup and manage client details easily.
Compliance Tracking:
Monitor and report compliance metrics effectively.
User Synchronization:
Sync user roles and access between systems.
Training Scheduling:
Integrate and optimize security training calendars.
Subscription Management:
Streamline subscription tracking and billing processes.
Email Auditing:
Analyze email interactions and user engagement efficiently.
Documentation Link:
Related Articles
HowTo: Allow-List CyberHoot’s Mail-Relays in M365
High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either Domain Name or IP Addresses in Microsoft’s O365 environment. This process is very similar whether you use the domain names shown below or the ...
HowTo: Add CyberHoot’s RSS Feed
CyberHoot delivers tremendous value to businesses and Managed Service Providers (MSPs) through a steady stream of high-quality cybersecurity content. By tapping into our RSS feed, you can keep your team informed and engaged with the latest security ...
HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365
Detailed Instructions From Microsoft: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide Once you click the link above, follow the instructions under ...
HowTo: The Benefits of CyberHoot’s HootPhish
The Challenges of Traditional Phish Testing Traditional attack-based phishing tests have often felt punitive to end-users and cumbersome for MSPs to deploy. They require complex configurations like allow-lists, X-Headers, and PowerShell scripts just ...
HowTo: Allow-List CyberHoot – Personal Gmail Account
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a quick video for how to accomplish that. https://youtu.be/VzXBGn-g5eI ...