It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Barracuda Campus is getting an upgrade!

We are excited to announce that Barracuda Campus will migrate to a new platform around mid-January 2026. Please see the announcement on the Campus Dashboard to find out more.

Barracuda XDR Release Notes — December 2025

  • Last updated on

New features

Automated Threat Response (ATR) for Meraki CrowdStrike Automated Threat Response is now live

For CrowdStrike users, Barracuda Managed XDR can now automatically isolate an endpoint from the network when a threat is detected.

ATR support includes the following rules, upon which devices are isolated given a high confidence event:

  • CrowdStrike Attempted to Quarantine a Malicious File​\

  • CrowdStrike Detection Summary Event

Users who can also manually isolate or un-isolate an endpoint via Host Name or Host ID.

This broadens the scope of XDR’s Endpoint ATR offerings beyond:

  • ATR for Managed Endpoint with SentinelOne

  • Monitored Endpoint with MS Defender for Endpoint

For more information, see Setting up ATR for Cisco Meraki Firewall.

Managed Endpoint Security self-service exclusions for SentinelOne

Partners can now manually enter file path-based exclusions in the XDR Dashboard, to exclude by site or group.

image-20251218-183350.png
Integration detection rules available in the XDR Dashboard

We've added the new Detection List page, which displays all current XDR detection rules for XDR integrations. For each rule, this page displays the:

  • Rule name

  • Description

  • MITRE ATT&CK classification

  • Category

  • Data source

  • Detection observables

To view the detection list, in the Barracuda Managed XDR Dashboard Navigation menu, click Administration > Detection List.

Wildcard Search

When searching throughout the XDR Dashboard, you can now use wildcard characters.

Use

To find

?

Single characters
For example, sm?th finds "smith" and "smyth"

*

Multiple characters
For example, *west finds "Southwest" and "Northwest"

Resolved issues

Resolved issues

Resolved an issue where Zendisk tickets were duplicated on the Dashboard.

Resolved an issue where users were not able to initiate a Full Disk Scan from the Dashboard.

Resolved an issue where certain users couldn’t use the Crowdstrike test.

Resolved an issue where the graph sizes in custom reports weren’t consistent.

New rules

  • Sonicwall

    • Sonicwall Outgoing Traffic To Potentially Malicious IP Address

    • Sonicwall Successful Login From Suspicious IP

  • Cloudgen

    • Cloudgen Management Access from Suspicious IP Address

    • Cloudgen IPS Large Scanning Activity Detected

Rule tuning and rule bug fixes

  • Office 365 Anomalous Login & Impossible Travel Release Notes

    • Recently, we released an upgraded version of our machine learning model, designed to improve the detection of Anomalous Login and Impossible Travel activities in Office 365. Guided by invaluable feedback, we have proactively implemented substantial enhancements to our detection capabilities.

      • Our model has improved its recognition of geo-location and device consistency for user logins, eliminating unnecessary alerts for those with frequently changing IPs.

      • We now better distinguish low, medium, and high alerts to assist in prioritizing alert review.

      • Reduced overall alert volume and refactored customer alert content.

  • Updated the ATR workflow to run the block action before the unblock action when clicking the Test button in the Dashboard, since it can emit block and unblock events simultaneously. This is achieved by generating an SHA-256 hash from simple_name, module, instance, ip_to_block/ip_to_unblock, and domain_to_block/domain_to_unblock, and grouping events by this hash within 10 seconds.

  • The alert for the Palo Alto Grayware Traffic Allowed detection rule now includes the potentially malicious URL in the alert body. The domain is extracted from the URL, enriched, and the alert is generated only if either the domain enrichment or IP enrichment indicates malicious activity.

  • Duo - Correlated the login on the device_access EP Key against historical logs to determine if the current login is using a known device.

  • Windows Suspicious Scheduled Task Creation - Implemented 10-minute deduplication on the scheduled task name to decrease mass ticket spam when a task is created on many hosts at once.