It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Email Protection

Note

If you purchased one of the following products, refer to Barracuda Total Email Protection.

  • Total Email Protection 
  • Total Email Security 
  • Essentials Complete 
  • Essentials Compliance 
  • Essentials Security

Email Protection Offboarding Guide

  • Last updated on

This is a guide for customers to assist with offboarding Barracuda Email Protection products.

Cloud Archiving Service

  1. Remove the journal rule.

    1. Navigate to https://purview.microsoft.com/datalifecyclemanagement/exchange/journalrules.

    2. Select the journal rule for the Cloud Archiving Service.

    3. Click Delete.

      bcasDelete.png

  2. Remove the send connector.

    1. Navigate to https://admin.exchange.microsoft.com/#/connectors.

    2. Select the send connector that was created for the Cloud Archiving Service.

    3. Click Delete.

      bcasDelete1.png

Cloud-to-Cloud Backup

Remove the application from Azure Enterprise Applications.

  1. Navigate to http://portal.azure.com.  

  2. Go to Azure services > Enterprise Applications.

  3. Locate the Cloud-to-Cloud Backup application with application ID bea75f7a-2505-46e8-9bf6-d3f7da9c9da7.

  4. Navigate to Properties, and then click Delete

ccbRemove1.png

Data Inspector

Remove the application from Azure Enterprise Applications.

  1. Navigate to http://portal.azure.com.  

  2. Go to Azure services > Enterprise Applications.

  3. Locate the Barracuda Data Inspector application with application ID 557dec0e-19cf-4d28-bc25-9561fd07d026.

  4. Navigate to Properties, and then click Delete

DIremove.png

Domain Fraud Protection 

If you were using Barracuda Networks to capture DMARC reports, ensure you update your DMARC record and remove the Barracuda mailto: entries in the ruf and rua report variables. This was set up in Step 1 - Configuring DMARC on Your Domain.

Email Gateway Defense 

  1. Delete any existing MX records from Email Gateway Defense, and update your MX records to your new email security provider. 

  2. Log into Email Gateway Defense, in the Domains page, remove your domains. 

If domains are not removed from Email Gateway Defense, you may experience issues receiving emails from other Barracuda-protected domains. Barracuda Networks does not perform external MX lookups for verified domains. Note that merely changing MX records will not automatically unverify your domain(s).

  1. Update the SPF record. If you were routing outbound mail through Barracuda Networks, ensure that you remove the Barracuda include statement from your SPF record. This was set up in Step 2 - Configure Microsoft 365 for Inbound and Outbound Mail, Step 5. Configure Sender Policy Framework for Outbound Mail.

  2. Remove the send connector. Disable (or remove) the send connector created on your mail server to route outbound mail to Barracuda Networks. This was set up in Step 2 - Configure Microsoft 365 for Inbound and Outbound Mail, Step 7. Configure Outbound Mail.

For Microsoft 365 customers only 
  1. Remove the Entra ID app from Azure Enterprise Applications. This application was used to sync your user list and provide SSO access for user quarantine. 

    1. Navigate to http://portal.azure.com.  

    2. Locate the Barracuda AzureAD Sync App – US application with application ID c98f100b-de82-441b-8ec6-400b448ec696.

    3. Navigate to Properties, and then click Delete

  2. Remove the Barracuda Networks partner connector. 

    1. Navigate to https://admin.exchange.microsoft.com/#/connectors 

    2. Locate the Barracuda Inbound Connector and delete it. 

      inboundConn.png

Email Protection Outlook Add-In

Remove the Outlook Add-In.

  1. Log into https://admin.microsoft.com.

  2. Navigate to Settings > Integrated Apps.

  3. Click on Barracuda Email Protection Add-In.

  4. Click Remove App.

removeAddIn.png

Impersonation Protection (Email Threat Scanner)

Remove the application from Azure Enterprise Applications. This removes Barracuda Networks' access to the mailboxes. 

  1. Navigate to http://portal.azure.com.  

  2. Locate the Barracuda Networks application with application ID 8f0bb7d0-51ef-4c03-8837-ab91cbc1c509.

  3. Navigate to Properties, and then click Delete.

Incident Response 

Note: Incident Response uses the same application as Impersonation Protection. If you have already deleted the application for Impersonation Protection, there is nothing else to remove for Incident Response. 

Remove the application from Azure Enterprise Applications. This removes Barracuda Networks’ access to the mailboxes. 

  1. Navigate to http://portal.azure.com.  

  2. Locate the Barracuda Networks application with application ID 8f0bb7d0-51ef-4c03-8837-ab91cbc1c509. 

  3. Navigate to Properties, and then click Delete

    IRremove.png

Removing the Enterprise Application does not remove your data from Barracuda Networks. Impersonation Protection and Incident Response will automatically deprovision 30 days past license expiration, which is when your data will be removed from our systems for the associated products. If you want to have your data removed sooner, contact Barracuda Networks Technical Support

Security Awareness Training

Remove the Entra ID connector from Azure Enterprise Applications.

  1. Navigate to http://portal.azure.com.  

  2. Go to Azure services > Enterprise Applications.

  3. Locate the Barracuda Phishline Address Book Connector application with application ID 4326c83b-02a7-4dc3-817f-455022887768.

  4. Navigate to Properties, and then click Delete

satRemove1.png