It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Understanding the Dashboard

  • Last updated on

When you first log into Barracuda Sentinel. the Dashboard appears. You can also reach the Dashboard at any time from the menu in the upper left corner of any Barracuda Sentinel page. 


Viewing Licensed and Protected Mailboxes

In the Licensing Information box, click View Mailboxes. On the Mailboxes protected by Sentinel page, each mailbox – for users and shared – is displayed, along with Display Names.


Each mailbox can have either one or both status values:

  • Licensed – Whether that mailbox has a Microsoft Exchange license. 
  • Protected – Whether the mailbox is currently monitored and protected by Barracuda Sentinel.
  • A Microsoft Exchange license is not required to be protected by Barracuda Sentinel.
  • In rare cases, Sentinel might not be able to protect a licensed mailbox.
Exporting Mailbox Information 

You can export and download this mailbox information to a CSV file, so you can use it for other administrative functions. 

To export your mailbox information:

  1. On the Dashboard, in the Licensing Information box, click View Mailboxes
  2. On the Mailboxes protected by Sentinel page, click Export to CSV.
    The CSV file downloads automatically to your usual download location. 

Note for larger organizations: The first 10,000 of your mailboxes are exported, based on the Display Name value. Your searching or changing the sort order does not affect the export. 

Viewing Recent Spear Phishing Attacks

The Dashboard displays recent spear phishing attacks.

To locate specific attacks:

  • Search – Enter all or part of a word in the Search box to find matching incidents.
  • Filter Attacks – Click to display a list where you can choose to see one of the following types of attacks:
    • All – All types of attacks. Selected by default.  
    • Conversation Hijacking – A nefarious actor uses compromised credentials to insert themselves into a legitimate email thread, using a slightly altered domain, and attempt to take over lucrative opportunities, like bank transfers. Domain Hijacking, using a slightly altered Sender domain, as just described, can be a part of a Conversation Hijacking attack.  
    • Employee impersonations – A nefarious actor is sending email, pretending to a member of your organization.
    • Extortion – A nefarious actor is demanding money from your organization, threatening that if they do not receive the funds, they will publish information that will be embarrassing to your organization or to people within it.
    • Service impersonations– A nefarious actor is sending email, pretending to represent a service, like a bank or an internet service provider.
    • Scamming – A nefarious actor is trying to get money from you or your organization.

For any record, click the details icon viewDetailsIcon.png to see more information about it.

Click Search for Similar Messages to locate messages similar to the one you are currently viewing. A new window opens with the Barracuda Forensics & Incident Response wizard, where you can search for these messages. This feature requires Barracuda Forensics & Incident Response.

Exporting Spear Phishing Information 

Click Export to CSV to export records that are displayed in the pages of the table, up to a limit of 2,000 records, sorted by date.

Last updated on