We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Attention

Review the Data Retention Setting in the Global Settings menu by December 2019 to ensure it meets your needs. The first data retention delete will occur on January 1, 2020.

Customer-Owned Mail Servers for Sending Training

  • Last updated on

You might choose to send emails from a valid email account on a corporate email server because you want to:

  • Send training invitations from a valid internal account so your users can confidently click on the training without thinking it is a phishing attack.

  • Send out information security announcements and use Barracuda PhishLine to track which users interacted with your message.
  • Simulate a phishing attack from a "compromised" internal account.

To set up a customer-owned mail server:

  1. Provide your Barracuda PhishLine representative with the following information:
    For sending emails: 
    • SMTP Host – The DNS name or IP address of your SMTP server.
    • SMTP Port – The TCP/IP port for your SMTP server. Defaults to 587.

    • SMTP User – The user account.

    • SMTP Password – The password for the user account.

    For reading replies, bounces, etc:
    • IMAP Host – The DNS name or IP address of your IMAP server. 

    • IMAP SSL – Whether SSL/TLS is required to connect.

    • IMAP Port – The TCP/IP port for your IMAP server. Defaults to 993.

    • IMAP User – The user account.

    • IMAP Password – The password for the user account.

  2. If you do not expose your SMTP/IMAP to the Internet, adjust your firewall rules to allow SMTP/IMAP access from the Barracuda PhishLine data centers only.
    • 64.132.201.82
    • 74.203.211.2

    • 207.67.44.178

  3. Your Barracuda PhishLine representative configures and tests the settings, preferably working with your email administrator. 

Be sure to proactively consider the rules for password expiration. If a process is not in place to handle password changes, campaign activity will be halted because Barracuda PhishLine will not be able to use SMTP/IMAP if the password expires on your server.


Last updated on