Automatic Remediation – Automatic Remediation can automatically remediate email messages that contain malicious URLs or attachments. All user-reported messages are automatically scanned for malicious content. When a threat is detected all matching emails are moved from users’ mailboxes into their junk folders. Security teams will receive an alert notifying them of an incident.
Incident Response (included with Barracuda Email Protection Premium and Premium Plus plans) – Remediate threats quickly and efficiently, by automating investigative workflows and enabling direct removal of malicious emails. Take advantage of fully-automated, post-delivery incident response and threat-hunting capabilities.
Minimum Requirements
To use Automatic Remediation or Incident Response, you must have:
Microsoft 365
Your first login requires Microsoft 365 global administrator credentials.
Optional Integration
Accounts for the following products add the functionality listed below, but are not required for Incident Response.
These features are included in Barracuda Email Protection plans. DNS Filtering is available in Barracuda Email Protection Premium and Premium Plus plans.
Barracuda Essentials for Office 365
Creating a new incident.
Working with geographical insights.
Working with emails users reported as suspicious through
For a description of configuration requirements for integration, refer to Integration with Other Barracuda Networks Features.
DNS Filtering
Adding block exception policies for linked domains.
Barracuda Sentinel
Remediating incidents found in Impersonation Protection.
Getting Started
Before You Begin
Provision Incident Response in Barracuda Cloud Control. For details, refer to Account Administrator Actions in the Barracuda Cloud Control.
Accessing Incident Response
To access Incident Response:
Log in through Barracuda Cloud Control.
Open https://forensics.barracudanetworks.com in a browser.
Your First Login
Log into Barracuda Cloud Control – https://login.barracudanetworks.com/account/office365. If you do not already have an account, you can create one here.
To activate Incident Response:
In the left navigation panel, select Incident Response.
Follow on-screen instructions to connect your Microsoft 365 account.
Bootstrapping/Initial Information Loading – The first time you log in, Incident Response must connect to your Microsoft 365 account and load your email information for the last 30 days. This process can take anywhere from an hour to a day or more, depending on the volume of email in your account.
Reporting Suspicious Messages – When you first start using Incident Response, wait about one hour before reporting suspicious messages with the Outlook Add-in. It takes about an hour for the two systems to coordinate. See User-Reported Emails for information on how to report messages.
With your purchase, you received an email from Barracuda Networks. Follow the instructions in the email to get started.
If you are evaluating Incident Response as a free trial, you will not receive this email.