We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Understanding Forensics & Incident Response

  • Last updated on

Review the minimum requirements described in the Overview.


Logging In

To log into Barracuda Forensics & Incident Response:

  1. Log into your Barracuda Cloud Control account at https://login.barracudanetworks.com/.
  2. Sign into your Barracuda Sentinel account or create a Barracuda Sentinel account if you do not already have one.

    Creating a new Barracuda Sentinel account redirects you to the Microsoft Office page. Log into your Office account, and allow all permissions to link your Barracuda Sentinel account to your Office 365 account.

  3. Sign into Barracuda Forensics & Incident Response. You can now create an incident and begin remediation.

Example Use Case

Organization A is hit with a phishing attack from outside the company. The IT team is alerted by an internal user who received the email containing the attack. The IT team needs to:

  • Determine all recipients that received the attack based on the email subject or sender email
  • Alert the recipients that received the email in question that they need to change their password and delete the offending email
  • List all the URLs in the attack emails so the URLs can be blocked on Organization A's firewall

The IT team performs Barracuda Forensics & Incident Response tasks including:

  • Identify affected users and provide instructions on updating passwords
  • Block fraudulent links
  • Determine if additional security training is necessary

forensics_response_mvp2.png

Last updated on