Allowlist by IP in Email Security Gateway
If you are using Barracuda’s Email Security Service (cloud), follow these steps to allowlist Barracuda by IP address:
- Log in to your Barracuda Cloud Control.
- Go to Email Security > Inbound Settings > IP Address Policies .
- In the IP Blocking / Exemption section, enter the IP addresses listed in the your Infosec IQ Account Settings. Please note that this process will need to be repeated for each IP address.
- In the Netmask field, type 255.255.255.255.
- Set the Policy field to Exempt.
- Click Add to allowlist the IP address.
- Repeat steps 2 through 6 for each IP address.
If you are using Barracuda’s Email Security Gateway (on-premises), follow these steps to allowlist Barracuda by IP address:
- Log in to your Barracuda Email Security Gateway web interface.
- Go to the BLOCK/ACCEPT > IP Filters page
Barracuda Sender Authentication
This is Barracuda Email Security Gateway’s way of protecting your organization from spoofed email addresses. Although preventing spammers from hiding their true identity is a valuable feature, it may also prevent email templates from phishing simulations campaigns from being successfully delivered to your learners’ inbox.
The Sender Spoof Protection feature can be configured at the global level from the ADVANCED > Email Protocol page or at the per-domain level on the DOMAINS > Manage Domain > ADVANCED > Email Protocol page. At the domain level, however, this feature is labeled as Reject messages from my domain. Note that if the administrator enables Sender Spoof Protection at the global level it will supersede any allowlist entry created at the per-user level by a User, Helpdesk or Domain Admin account holder.
Additional information can be found in Barracuda’s knowledge base.
Barracuda Intent Analysis - Inbound Mail
Intent Analysis is the defense layer that catches phishing attacks. This can result in emails being marked as phished before the learner even receives the email. Intent Analysis can be enabled or disabled on the Inbound Settings > Anti-Phishing page.
Use the Intent Domain Policies table to exempt (Ignore) our Phishy Domains from Intent Analysis. To get a complete list of available Phishy Domains, navigate to PhishSim > Phishy Domains and click the button labeled Download Phishy Domains.
To exempt domains found in the message body from Intent Analysis:
- Enter a phishy domain
- Select Ignore for the Policy .
- Click Add .
Any messages containing the exempt domains still undergo spam scanning and Intent Analysis on other domains (not listed in the policy). Specify either a domain or subdomain if you want a wildcard match. For example, enter example.com
to exempt messages containing www.example.com
and secure.example.com
.
Note: Any domain listed in this table with Policy set to Ignore is also exempt from URL Click Protection settings. Any URL in the list is not rewritten by the service.
Additional information can be found in Barracuda’s knowledge base.
Barracuda Advanced Threat Protection
When using Barracuda Advanced Threat Protection you may need to set up exemptions to prevent scanning of emails sent from Infosec IQ. Configuring exemptions will help if you have encountered a false positive situation where a learner gets marked as phished without interacting with a PhishSim email.
- Log into the Barracuda Email Security Gateway admin portal.
- Click the ATP Settings tab.
- Enter the Infosec IQ Email Stack IP addresses found in the IQ Account Settings page.
- Click Add.
Additional information can be found in Barracuda’s knowledge base.