It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Barracuda Managed XDR Release Notes — May 2025

  • Last updated on

Welcome to the Barracuda Managed XDR’s monthly release notes! At XDR, we are committed to protecting Barracuda Managed XDR customers from complex threats. To achieve this, we continuously introduce new features as well as enhance our detection, automation, threat intelligence, and automated response capabilities to combat evolving threats. In May 2025, we’ve introduced a variety of new features, fixes, important updates and enhancements. 

What’s New This Month 

  • New features include the release of the Barracuda Managed XDR Collector Appliance hardware, direct SentinelOne console access, and several other small improvements

  • Major improvements to Office 365 Anomalous Login and Impossible Travel detections

  • Multiple tuning and suppression enhancements across Suricata, SentinelOne, Google Workspace, and firewalls

  • SOAR automation expanded for high-fidelity Windows and Azure detections

  • SentinelOne STAR Rule update for early detection of PLAY ransomware 

New features

The Barracuda Managed XDR Collector Appliance hardware is now available!

The BX500 Collector Appliance hardware is a Barracuda Manufacturing purpose-built appliance that replaces the outdated legacy Sensors.

This plug-and-play device makes it easier to manage Barracuda Managed XDR Network Security and monitor the health of hardware, provide support, and manage patching and upgrades.

For more information, contact your Sales Representative.

For technical specifications and details, see the BX500 Collector Appliance Hardware Quick Start Guide.

SentinelOne Console Access

The Barracuda Managed XDR Dashboard now provides read-only access to the SentinelOne console, allowing you to see a fuller picture of security events and what is going on in their environment.

To do this, click Infrastructure, User management, then click Edit User. For more details, including prerequisites, see Setting up direct access to SentinelOne for users .

image-20250530-160048.png

Improvements

Session timeout duration increased

The session timeout duration for the Barracuda Managed XDR Dashboard has been increased to 15 days, so you are automatically logged out of the Barracuda Managed XDR Dashboard if you stay logged in for 15 days. This is more convenient for users while maintaining security standards.

Okta Preview Support

You can now select whether your integration monitors Okta or Okta Preview, Okta’s staging environment.

Improvements to the Email Distribution page

Some small improvements have been made to the Email Distribution page.

Improved focus when viewing alerts in the Dashboard

Focused the ticket when viewing an alert in the Dashboard by removing some unnecessary comments.

Detection Updates 

Detection Name 

Description 

Office 365 Anomalous Login 

Added correlation and suppression for VPNs, known devices, org-shared IPs, and mobile devices. Reduced overall alert volume and refactored customer alert content. 

Office 365 Impossible Travel 

Added Suppression for same two device names which the two logins are originating from, org-shared IPs, reoccurring IPs with 30 days and mobile logins. Improved alert logic and content. 

User Added to Global Administrator Role 

Added Suppressed if prior similar change occurred from known IP. 

Suricata - External Permitted Malicious Traffic - Repeated 

Added Suppressed if from known scanners: Hurricane Electric, Palo Alto, Censys, Shadow Server. 

Firewall - RDP From Internet 

Allow-listed specific customers to reduce noise. 

Meraki Threat IP Communication Detected 

Allow-listed specific customers to reduce noise. 

SentinelOne - New Threat Not Mitigated/Mitigated 

Revised threat matrix to tune alerting. 

Windows Remote File Download via Cmd.exe 

Added Suppression window increased to 24 hours. 

Windows Suspicious Scheduled Task Creation 

Added Suppression window increased to 24 hours. 

Google Workspace Suspended/Re-Enabled Users 

Allow-listed specific customers. 

SOAR Enhancements 

Detection Name 

Description 

Windows System and Security Logs Cleared 

Newly automated 

Windows Suspicious Logon Failures (Legacy) 

Newly automated 

Windows User added to High Risk Security Enabled Group 

Filtered to top 5 target user data in ticket to reduce template size. 

GLB.AD.CAS User Added as Owner for Azure Application 

Added two new fields to ticket: Application added/initiated. 

Palo Alto SOAR Setup 

Updated Campus docs to include port translation for 4433 to 443. 

CloudGen CC ATR 500 error 

Resolved. 

Managed EDR Updates 

Item Name 

Description 

S1 Agent Upgrade for Managed EDR 

Upgraded to version v24.2 

New STAR Rule 

Early Detection of PLAY Ransomware 

STAR Rule Enhancement 

Added additional ransomware file extensions. Ex: .safepay .killsec .Blacklock .incransom .Threeam .threeamtime .devmanv1 .EVEREST .nspire .interlock