We believe that peace of mind is worth protecting. Made for businesses of any size, we offer world-class cybersecurity that is accessible, affordable, and, most importantly, effective. Monitoring everything from emails to endpoints, our team helps you get back to business.
Barracuda XDR Dashboard Basics
- Logging in and out of Barracuda XDR Dashboard
- Navigating around Barracuda XDR Dashboard
- Getting Help with Barracuda XDR Dashboard
- Introduction to Events, Alerts, and Alarms
- Contacting Customer Support
- Accepting the XDR Terms and Conditions
- Glossary
Introduction to the Home Dashboard
- Changing the Timeframe Displayed on the Home Dashboard
- Getting Detailed Information on the Event Timeline Graph on the Home Dashboard
- Setting up AWS Security Lake
- Setting up Log Degradation Threshold Warnings on the Home Dashboard
- Muting and Un-Muting Log Degradation Threshold Warnings on the Home Dashboard
- Getting Detailed Information on the Event Timeline Graph on the Home Dashboard
Intelligence
Working with the Security Overview
- Filtering the Security Overview
- Changing the Date Range Displayed on the Security Overview
- Getting Detailed Information on the Incident Timeline Graph on the Security Overview
- Getting Detailed Information on the Geographic Source of Incidents on the Security Overview
- Viewing Tickets on the Security Overview
Working with Tickets on the Alerts & Alarms Page
Protecting Email
- Deploying INKY Email Protection
- Filtering the Email Protection Page
- Viewing Email Security Trends by Threat Level
- Analyzing Email Threat Types
- Analyzing and Reporting Threats to a Single Email Address
- Email Protection FAQ
Viewing Threat Advisories
Reporting
- Creating Custom Reports
- Deleting Custom Reports
- Modifying Report Options for Custom Reports
- Modifying Pages in Custom Reports
- Modifying Components in Custom Reports
- Scheduling Reports
- Downloading PDFs of Scheduled Reports
- Viewing and Downloading Reports
- Reporting Tips and Tricks
Infrastructure
- Working with the Endpoint Devices Page
- Filtering the Endpoint Devices Page
- Blocking and Unblocking USB Ports
- Setting a Threshold for Log Degradation
- Setting up Endpoint Security Groups
- Exporting the Endpoint Devices Table
- Snoozing and Unsnoozing Protection on Devices
Downloads
Using Sensors
- Setting up a Hyper-V Virtual Sensor
- Setting up a VMWare Virtual Sensor
- Setting up a Virtual Sensor for Azure
SOAR Settings
- Setting up SOAR for Barracuda CloudGen Control Center Firewall
- Setting up SOAR for Barracuda CloudGen Standalone Firewall
- Setting up SOAR for SonicWall Firewall - Beta
- Setting up SOAR for FortiGate Firewall - Beta
- Setting up SOAR for Cisco Meraki Firewall - Beta
Administration
Integrating Asset Risks
Integrating Email Risks
- Integrating Barracuda Email Gateway Defense
- Integrating Barracuda Impersonation Protection
- Integrating Barracuda Incident Response
- Deploying INKY Email Protection
- Integrating Microsoft 365
- Integrating Mimecast
- Integrating Okta
- Integrating Duo
- Integrating Azure
- Integrating AWS Cloudtrail with XDR Dashboard
- Integrating AWS GuardDuty
- Integrating Cisco Umbrella
- Integrating Google Workspace
Integrating Endpoint Security Software
- Integrating Bitdefender GravityZone
- Integrating Broadcom Endpoint Security
- Setting up the Broadcom Endpoint Security Collector
- Integrating Cisco Secure Endpoint
- Integrating Crowdstrike
- Integrating Cylance Protect Endpoint Protection
- Integrating with ESET NOD32 Antivirus
- Setting up ESET NOD32 Collector
- Integrating Microsoft Defender
- Integrating SentinelOne
- Integrating Sophos Central
- Integrating Tanium Connect
- Setting up Tanium Collector
- Integrating Trend Micro Deep Security
- Setting up the Trend Micro Deep Security Collector
- Integrating Trend Micro Worry-Free
Integrating Firewalls
- Integrating Barracuda CloudGen Firewall
- Integrating Barracuda SecureEdge Firewall
- Setting up Check Point Firewall Collector
- Integrating CheckPoint FireWall-1 Monitoring
- Integrating a Cisco Adaptive Security Appliance
- Setting up Cisco Adaptive Security Appliance (ASA) Collector
- Setting up Cisco FTD Collector
- Integrating Cisco Meraki
- Setting up Cisco Meraki Collector
- Integrating Cisco Umbrella
- Setting up the Citrix ADC Integration Collector
- Integrating Fortinet FortiGate Firewall
- Setting up Fortinet FortiGate Firewall Collector
- Integrating Juniper Secure Services Gateway (SSG) Firewall
- Setting up Juniper SRX Firewall Collector
- Setting up Palo Alto Collector
- Integrating Palo Alto Firewall Logs
- Integrating SonicWALL Firewall
- Setting up SonicWALL Firewall Collector
- Integrating Sophos UTM
- Setting up Sophos UTM Collector
- Integrating Sophos XG
- Setting up Sophos XG Collector
- Integrating WatchGuard Firebox Firewall
- Setting up WatchGuard Collector
Integrating Identity Risks
- Integrating AWS Cloudtrail with XDR Dashboard
- Integrating Duo
- Integrating Google Workspace
- Integrating Microsoft 365
- Integrating Microsoft Azure
- Integrating Okta
Integrating IDS Risks
Integrating Load Balancers and Application Firewalls
- Integrating Citrix Netscaler Application Delivery Controller (ADC)
- Integrating F5 BIG-IP
- Setting up F5 BIG-IP Collector
Integrating Servers
- Integrating Linux Server
- Setting up Linux Server Collector
- Integrating Windows Server/NXLog
- Integrating Windows Server Collector
Integrating Tickets
Managing Users
Working with the Allow List
- Working with the Allow List
- Adding a Threat to the Allow List
- Filtering the Allow List Page
- Viewing Details of Threats on the Allow List
- Removing a Threat from the Allow List