It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda ONE

Generating and exporting reports

  • Last updated on

How to generate a report you can view now for any account, and how to export it to a PDF

If you want to generate a recurring report on a schedule, see Scheduling reports.

You can use security reports to show the value of your protection to your customers or potential customers. These reports itemize the threats that your services have blocked, showing the possible security breaches that you prevented from reaching your clients.

Reports can be generated for a single account only. You can't generate a report that includes multiple accounts.

How elements in reports are generated

The elements in reports are generated from the following Barracuda applications in your environment:

  • Email Gateway Defense

  • Incident Response

  • Impersonation Protection

  • Cloud Archiving Service

  • Cloud-to-Cloud Backup

  • Data Inspector

The items you can include in your report are generated from the applications you have in your environment. For example, if you have Impersonation Protection, you get data on targeted attacks prevented by Impersonation Protection, but if you have both Impersonation Protection and Incident Response, you get data from both sources.

For certain widgets, data for Incident Response and Impersonation Protection is only available from March 7, 2025.

Data from Email Gateway Defense is available for the last 365 days.

When you're missing applications

If an element aggregates data from more than one application, but you don't have all the applications the data is aggregated from, the element aggregates data from the applications you do have. For example, the Threats blocked element aggregates data from Email Gateway Defense, Incident Response, and Impersonation Protection. If you only have Email Gateway Defense and Impersonation Protection, the element is generated from those two applications.

If you don't have any of the applications that an element aggregates data from, the element displays blank or "0". You can clear the check boxes of elements that are aggregated from applications you don't have.

Email related

Element
Description
How it's generated

Threats blocked

The number of threats blocked in the selected timeframe.

The following data is available:

  • One year of data for Email Gateway Defense and Impersonation Protection.

  • Data from March 7, 2025 and onwards for Incident Response.

Aggregates the total number of:

  • Emails blocked by Email Gateway Defense,

  • Emails blocked by Impersonation Protection, and

  • Emails deleted and quarantined in incidents blocked by Incident Response.

Emails evaluated

The number of emails evaluated by security programs in the selected timeframe.

The following data is available:

  • One year of data for Email Gateway Defense.

  • Data from March 7, 2025 and onwards for Impersonation Protection, and Incident Response.

Aggregates the total number of:

  • Emails evaluated by Email Gateway Defense,

  • Emails evaluated by Impersonation Protection, and

  • Emails evaluated by Incident Response.

Emails archived

The number of emails that have been archived in the selected timeframe.

The total number of Emails archived by Barracuda Cloud Archiving Service.

Threats blocked immediately

The number of threats blocked immediately in the selected timeframe.

The following data is available:

  • Data from March 7, 2025 and onwards.

The total number of emails deleted and quarantined by automated remediation/creation of incidents, and automated workflows that resulted in incidents, by Incident Response.

Incidents investigated

The number of suspected threats investigated in the selected timeframe.

The following data is available:

  • Data from March 7, 2025 and onwards.

The total number of incidents investigated by Incident Response.

Top 5 threat types

A list of the most common email threat types in the selected timeframe.

The following data is available:

  • One year of data for Email Gateway Defense and Impersonation Protection.

  • Data from March 7, 2025 and onwards for Impersonation Protection.

Compiled from:

  • by Email Gateway Defense and

  • by Impersonation Protection.

Top 5 recipients for threats

A list of the most common recipients of email threats in the selected timeframe.

The following data is available:

  • One year of data for Email Gateway Defense and Incident Response.

  • Data from March 7, 2025 and onwards for Impersonation Protection.

Complied from:

  • The top recipients of threats from Email Gateway Defense, and

  • The top recipients of threats from Impersonation Protection.

Email volume trend

A graph of the trend of email volume in the selected timeframe.

The following data is available:

  • One year of data for Email Gateway Defense.

  • Data from March 7, 2025 and onwards for Impersonation Protection, and Incident Response.

Analyzes the trend from:

  • The total number of emails received by Email Gateway Defense,

  • The total number of emails evaluated by Impersonation Protection, and

  • The total number of emails in all incidents from Incident Response.

Data protection

Item
Description
How it's generated

Terabytes backed up

The amount of data backed up, in terabytes

Compiled from the amount of data backed up by Cloud-to-Cloud Backup.

Backups by source

The number of backups in the selected timeframe

Compiled from the sources in Cloud-to-Cloud Backup.

Scans completed

The number of scans completed in the selected timeframe

Compiled from the scans completed by Data Inspector.

Violations found

The number of data violations found in the selected timeframe

Compiled from the violations in scans completed by Data Inspector.

Top 5 violation types

A list of the most common five types of data violations in the selected timeframe.

The following data is available:

  • Data from May 30, 2025 and onwards.

Compiled from the violation types in scans completed by Data Inspector.

Top 5 users with violations

A list of the top five users with the most violations in the selected timeframe.

The following data is available:

  • Data from May 30, 2025 and onwards.

Compiled from the user in scans completed by Data Inspector.

To generate a report

  1. If you're not on the Reports > Report page, click Reports, then click Report.

  2. If you haven't selected an account, click the Account switcher, then select your account.

  3. To choose a time frame for the report, do one of the following:

    • Select an option in the Time frame box.

    • Select a date in the Start date box, and select a date in the End date box.

  4. If you want to show logos on the report, select any of the following:

    • The Display check box next to the Account Logo.

    • The Display check box next to Your Logo.

  5. Select the check boxes of the email-related items you want to show

    • Threats blocked

    • Emails evaluated

    • Emails archived

    • Threats blocked immediately

    • Incidents investigated

    • Top 5 threat types

    • Top 5 recipients for threats

    • Email volume trend
      NOTE To include all of the email-related items, select the Email check box.

  6. Select the check boxes of the data protection-related items you want to show.

    • Terabytes backed up

    • Backups by source

    • Scans completed

    • Violations found

    • Top 5 violation types

    • Top 5 users with violations

      NOTE To include all of the email-related items, select the Data Protection check box.

  7. Click Save.

To export a report

Exporting a report generates a .PDF of the report

  1. Generate your report using the To generate a report procedure above.

  2. Click Actions.

    ActionsReports.png
  3. Click Export.

    ExportReport.png

    The report downloads to your Downloads folder.