We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Office 365 Security Edition

  • Last updated on

After you complete the procedures in Step 1 - Set Up Essentials for Office 365, in Barracuda Cloud Control, navigate to the Email Security page. Click Set up additional domains to go to the Barracuda Email Security Service Domains page, or continue with your configuration.

BARRACUDA EMAIL SECURITY SERVICE

Step 1. Set Up User Accounts

You can add users manually, or use LDAP or Azure AD authentication to automatically synchronize the Barracuda Email Security Service with your active directory server.

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

Manually Add Users
  1. Go to Users > Add/Update Users:
    AddUpdateUser.png
  2. In the User Accounts field, enter each user email address for the domain on a separate line, and then select from the following options:
    1. Enable User Quarantine – All emails for the user which meet the configured block policy go to the user's quarantine account.

      Depending on how you have configured the quarantine notification interval on the Users > Quarantine Notification page, the user receives a quarantine digest at a specified time. From the Users > Quarantine Notification page you can also enable the user to set their own quarantine notification interval.

    2. Notify New Users – When set to Yes, users receive a welcome email once the account is created.
  3. Click Save Changes. The users are added to the Users > Users List table where you can select from the following actions:
    1. Edit – Click to specify domains this user can manage.
    2. Reset – Click to send the user an email with instructions on how to reset their account password.
    3. Log in as this user – Click to view or change the user's settings (for example, quarantine notifications), view/manage the domains this user manages, and view/search/manage the user's Message Log.
    4. Delete – Click to remove the user account.

The first time the Barracuda Email Security Service receives an Allowed email for a non-existent user at a domain configured for the service, if that same recipient receives a second email 1-6 days later, a new user account is created. This method of new account creation does not use LDAP lookup, and the user receives an email from the Barracuda Email Security Service with their login information so they can access their quarantine account.

Automatically Add Users

You can configure user authentication via your organization's LDAP server or Azure AD service. For complete setup details, see the following articles:

Step 2. Add Additional Email Domains

Use the steps in this section only if you want to manually add additional email domains, otherwise, go to Step 3. Create Transport Rule.

Obtain the hostname:

  1. Log in to the Office 365 admin center.
  2. In the left pane, click Settings > Domains.
  3. In the Domains table, click on your domain.
  4. Take note of the hostname. This is the address of your destination mail server, for example, cudaware-com.mail.protection.outlook.com
    ManagedDomain.png 

Enter the hostname:

Barracuda recommends using a hostname rather than an IP address so that you can move the destination mail server and update DNS records without making changes to the Barracuda Email Security Service configuration. This address indicates where the Barracuda Email Security Service should direct inbound mail from the Internet to your Office 365 Exchange server. For example, your domain displays to the Internet as: bess-domain.mail.protection.outlook.com

  1. Log in to the Barracuda Email Security Service as administrator, and click Domains, and click Add Domain.
  2. Enter the domain name and destination mail server hostname obtained from your Office 365 account in the dialog box. 
  3. Click Add; the Domain Settings page displays.

Step 3. Create Transport Rule

  1. Log in to the Office 365 admin center, and go to Admin centers > Exchange.

  2. In the left pane, click mail flow, and click rules.
  3. Click the + symbol, and click Bypass spam filtering:
    BypassSpamFiltering.png
  4. In the new rule page, enter a Name to represent the rule.
  5. From the Apply this rule drop-down menu, select The sender > IP address is in any of these ranges or exactly matches:
    SenderIPAddress.png
  6. In the specify IP address ranges page, type the IP address range for the Sender (Barracuda Email Security Service) based on your Barracuda Email Security Service instance, for example, type: 64.235.144.0/20, and click the + symbol.
  7. Type the next IP address range for the Sender, for example, type 209.222.80.0/21, and click the + symbol:
    Specify_IP_Ranges.png 
  8. Click OK, and click Save to create the transport rule.
  9. Click the Edit icon for the rule, scroll to the Properties of this rule section, and in the Priority field, type 0.
  10. Click Save.
  11. Verify the new rule displays at the top of the list of mail flow rules. If the rule is not at the top, click on the rule, and use the Up arrow to move the rule to the top of the list.

Step 4. Restrict Inbound Mail to the Barracuda Email Security Service IP Range

Select the PowerShell script to restrict inbound mail to the Barracuda Email Security Service based on the region selected when setting up the your service.

Important: After updating your MX records, allow 24 hours before completing the steps in this section to allow the records to propagate.

PowerShell Script (US Region)

If your Barracuda Essentials instance is located in the US region, use the following PowerShell script to restrict inbound mail to the Barracuda Email Security Service IP address range.

Run the following PowerShell script from your local system:

# Set-ExecutionPolicy unrestricted 
# $UserCredential = Get-Credential
# $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection 
# Import-PSSession $Session
# New-InboundConnector -Name "Barracuda Inbound Connector" -RequireTls $true -SenderDomains * -SenderIPAddresses 64.235.144.0/24,64.235.145.0/24,64.235.146.0/24,64.235.147.0/24,64.235.148.0/24,64.235.149.0/24,64.235.150.0/24,64.235.151.0/24,64.235.152.0/24,64.235.153.0/24,64.235.154.0/24,64.235.155.0/24,64.235.156.0/24,64.235.157.0/24,64.235.158.0/24,64.235.159.0/24,209.222.80.0/24,209.222.81.0/24,209.222.82.0/24,209.222.83.0/24,209.222.84.0/24,209.222.85.0/24,209.222.86.0/24,209.222.87.0/24 -RestrictDomainstoIPAddresses $true
PowerShell Script (German Region)

If your Barracuda Essentials instance is located in the German region, use the following PowerShell script to restrict inbound mail to the Barracuda Email Security Service IP address range.

Run the following PowerShell script from your local system:

# Set-ExecutionPolicy unrestricted
# $UserCredential = Get-Credential
# $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection
# Import-PSSession $Session
New-InboundConnector -Name "Barracuda Inbound Connector" -RequireTls $true -SenderDomains * -SenderIPAddresses 35.157.190.225,35.157.190.226,35.157.190.227,35.157.190.228,35.157.190.229,35.157.190.230,35.157.190.231,35.157.190.232,35.157.190.233,35.157.190.234,35.157.190.235,35.157.190.236,35.157.190.237,35.157.190.238,35.157.190.239,35.157.190.240,35.157.190.241,35.157.190.242,35.157.190.243,35.157.190.244,35.157.190.245,35.157.190.246,35.157.190.247,35.157.190.248,35.157.190.249,35.157.190.250,35.157.190.251,35.157.190.252,35.157.190.253,35.157.190.254,35.157.190.255 -RestrictDomainstoIPAddresses $true
PowerShell Script (UK Region)

If your Barracuda Essentials instance is located in the UK region, use the following PowerShell script to restrict inbound mail to the Barracuda Email Security Service IP address range.

 Run the following PowerShell script from your local system:

# Set-ExecutionPolicy unrestricted
# $UserCredential = Get-Credential
# $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection
# Import-PSSession $Session
New-InboundConnector -Name "Barracuda Inbound Connector" -RequireTls $true -SenderDomains * -SenderIPAddresses 35.176.92.96,35.176.92.97,35.176.92.98,35.176.92.99,35.176.92.100,35.176.92.101,35.176.92.102,35.176.92.103,35.176.92.104,35.176.92.105,35.176.92.106,35.176.92.107,35.176.92.108,35.176.92.109,35.176.92.110,35.176.92.111,35.176.92.112,35.176.92.113,35.176.92.114,35.176.92.115,35.176.92.116,35.176.92.117,35.176.92.118,35.176.92.119,35.176.92.120,35.176.92.121,35.176.92.122,35.176.92.123,35.176.92.124,35.176.92.125,35.176.92.126,35.176.92.127 -RestrictDomainstoIPAddresses $true

Step 5. Configure Sender Policy Framework for Outbound Mail

To assure Barracuda Networks is the authorized sending mail service of outbound mail from your Barracuda Email Security Service, add the following to the Sender Policy Framework (SPF) record INCLUDE line of the SPF record for your sending mail server for each domain sending outbound mail. Select the relevant SPF INCLUDE based on the region you selected for your Barracuda Email Security Service. See Sender Policy Framework for Outbound Mail for INCLUDE values based on your Barracuda Email Security Service instance.

For example, if you are using Office 365, your record would look similar to:

v=spf1 include:spf.protection.outlook.com include:spf.ess.barracudanetworks.com -all

See Sender Authentication for more information.

  • If you have an SPF record set up for your domain, edit the existing record, and add the following to the INCLUDE line for each domain sending outbound mail based on your Barracuda Email Security Service instance. For example: include:spf.ess.barracudanetworks.com -all
  • If you do not have an SPF record set up for your domain, use the following value to create a TXT record that creates a HARDFail SPF for your domain based on your Barracuda Email Security Service instance. For example: v=spf1 include:spf.ess.barracudanetworks.com -all 

Step 6. Configure Outbound Mail

If you have multiple domains within your Office 365 tenant and you want to scan only certain domains outbound, see How to Configure Office 365 to Scan Only Selected Domains Outbound.  

If you have not already done so, contact Barracuda Technical Support and request that Outbound Groups be enabled on your Barracuda Email Security Service account.

  1. Log in to the Barracuda Email Security Service, click Domains, and click on the domain name to toggle the MX Records configuration; make note of the Outbound Hostname.  

  2. Log in to the Office 365 admin center, and go to Admin centers > Exchange
  3. In the left pane, click mail flow, and click connectors.
  4. Click the + symbol and use the wizard to create a new connector.

  5. From the From drop-down menu, select Office 365, and from the To drop-down menu, select Partner organization:
    MailFlowScenario.png 

  6. Enter a Name and (optional) Description to identify the connector:
    NewConnector2.png 

  7. Click Next. Select Only when email messages are sent to these domains, click the + symbol, and enter an asterisk (*) in the add domain field:
    AddDomain.png

  8. Click OK, and click Next. Select Route email through these smart hosts, and click the + symbol.

  9. Go to the Barracuda Email Security Service, click the Domains tab, and click on the domain name to toggle the MX records configuration. Copy your outbound hostname, and enter it in the add smart host page:
    AddSmartHost_Updated.png 

  10. Click Save, and click Next. Use the default setting, Always use Transport Layer Security (TLS) to secure the connection (recommended) > Issued by Trusted certificate authority (CA):
    TLS_Issued.png

  11. Click Next. In the confirmation page, verify your settings and click Next. Office 365 runs a test to verify your settings:
    confirmationUpdated.png

  12. When the verification page displays, enter a test email address, and click Validate. Once the verification is complete, your mail flow settings are added.

For additional configuration options and features, log in to the web interface and click Help.


ADVANCED THREAT PROTECTION

Files blocked by Advanced Threat Protection (ATP) display on the Overview > Dashboard page.

  1. Go to ATP Settings, and select the desired option:
    • Deliver First, then Scan – Attachments are delivered with the message to the recipient and then scanned by the ATP service; if a virus is detected, an email notification is sent to the email recipient. Additionally, if Notify Admin is set to Yes, and a virus is detected in the scanned attachment, an email is sent to the administrator.
    • Scan First, then Deliver – Attachments are scanned by the ATP service before delivery. If a virus is detected in the attachment the message is blocked, otherwise it is delivered to the recipient.
  2. Select whether to Notify Admin if a virus is detected in a scanned attachment. When set to Yes, enter the ATP Notification Email address in the associated field.

When ATP is set to either Deliver First, then Scan or Scan First, then Deliver, you can exempt sender email addresses, sender domains, recipient email addresses, recipient domains, or sender IP addresses from ATP scanning in the ATP Exemptions section on the ATP Settings page.

 

 

Last updated on