Email Gateway Defense Best Practices
Email Gateway Defense Best Practices
MAY 2025
CONTENTS
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
INVESTIGATING FALSE POSITIVES
1. Submit the message – Make sure you report the email as “incorrectly delivered” from the message
log. This information will be used as part of any classifier retraining that we do.
• Barracuda-Controlled:
o Report Message: Click “Report as Incorrectly Blocked” from the message log. This
information will be used to retrain our systems. Note: There is no guarantee that
reporting the message this way will prevent future emails from being blocked. You
must still consider alternative methods to ensure delivery.
o Contact Support: For issues that require more immediate attention, a support
ticket can be opened to have the block cleared. Blocks are typically cleared within
24 hours. Use an exemption policy temporarily, reviewing it after 24-48 hours.
• Custom Policy: Adjust your policies to be less strict if they cause false positives.
3. Exemption Ability:
• Make specific exemptions instead of a full exemption to maintain other layers of filtering.
o Intent Analysis
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
o Advanced Threat Protection
o Machine Learning
o Bulk Email
4. Policy Scope:
• Company-Wide vs. Single User: Create exemptions at the user level when possible or
allow users to manage their own exemptions.
o Leverage your ability to sign in as a user via the user list to create the policy on their
behalf.
5. Alternative Exemptions:
• IP Policy: Exempt IPs instead of domains, useful for services like DocuSign.
o Make sure to not exempt IP that belong to hosting platforms such as: Microsoft,
Google, SendGrid, Rackspace.
• Content Policy: Use unique email identifiers, such as Salesforce account IDs, for
exemptions.
• Use the Show Message History functionality to bring a messages history into focus. In
cases where messages are deferred or released by an end user, the message history will
show when a message was reprocessed/redelivered. Deferred messages are often retried
and delivered within 15 minutes; in which case no policies are needed.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
We can see in this example, the email was deferred and then retried/delivered one minute later
SENDER POLICIES
Creating sender policies can be a quick solution for delivery issues, but overuse can lead to unintended
consequences. Follow these best practices when creating sender policies:
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
• Limit sender policies to the last 90 days. Remove older policies when possible.
SENDER AUTHENTICATION
Sender authentication checks are a common source of "false positives" when inbound messages are
blocked due to improper sender configurations. Here are the best practices for handling these situations:
• Function: Ensures emails that fail DMARC checks (with a reject or quarantine policy) are blocked or
quarantined.
• Importance: By not enforcing DMARC, fraudulent messages can enter your organization.
• Handling Misconfigurations: Implement a DMARC exemption for misconfigured domains.
• Default: Yes
• Recommendation: Yes
• Function: Validates DKIM signature found within an email by calculating a body hash
• Limitations: Does not help to protect against domain spoofing
• Handling Misconfigurations: Enter a DKIM exemption using the domain found in the DKIM signature
(d=)
• Default: Off
• Recommendation: Off or Quarantine
• Function: Validates if an email originates from an authorized mail system using the SPF record
published by the envelope sender domain
• Hard Fail (-all): Block emails that fail this check.
o Default: Block
o Recommendation: Block
• Soft Fail (~all): Tag or quarantine emails, do not block outright.
o Default: Off
o Recommendation: Quarantine or Off
No SPF Record
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
• Context: SPF records help verify that an email is sent from an authorized server for the domain. If a
domain lacks an SPF record, it cannot be authenticated, making it vulnerable to spoofing.
• Significance: Domains without SPF records are easier targets for spoofers and malicious actors to
send fraudulent emails appearing legitimate.
• Risks: Rejecting emails from domains without SPF records can prevent potential spoofed emails but
may also block legitimate emails from domains that haven't set up SPF due to lack of awareness or
technical capability.
• Handling: Monitor emails from domains without SPF records closely to minimize false positives and
ensure there is no significant impact on business operations. Add SPF exemptions for problematic
senders.
• Default: Off
• Recommendation: Off or Quarantine
SPF Exemptions:
• Exemptions can be made using an IP or a domain. It's recommended to use the envelope domain for
exemptions rather than an IP.
• Exempt senders that fail SPF checks, ensuring other malicious content is still scanned.
No PTR Record
REGIONAL POLICIES
GeoIP
Creating regional policies is an effective way to strengthen perimeter defenses by blocking spam and scams
originating from countries where organizations rarely conduct business.
• Start with a baseline geoIP block list, focusing on countries where spam originates.
o Use sources like Spamhaus for updated lists.
• Avoid blocking countries hosting SaaS exit nodes (e.g., Ireland, Singapore, Netherlands) to prevent
blocking legitimate mail due to sender domain's load-balancing scenarios.
• Create exemptions for specific domains, emails, or IP addresses to bypass regional blocks.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
o For instance, block emails from China but exempt a specific vendor's domain for business
purposes.
• Utilize Regional Insights for detailed insights on countries sending emails to users.
• Create new regional block policies or policy exemptions using this information as your guide.
• For more information, see Geographical Insights
Language Policies
Language policies help filter out unwanted emails containing languages not relevant to the organization.
Languages include:
• Arabic
• Chinese
• German
• Greek
• Hebrew
• Japanese
• Korean
• Russian
• Thai
• Turkish
• Vietnamese
ANTI-SPAM/ANTIVIRUS
The Barracuda Reputation Block List (BRBL) is maintained by Barracuda Central, containing IP addresses of
known good and bad senders. It helps identify legitimate messages and spammers based on sending history.
Barracuda Central continuously updates BRBL.
• Default: Block
• Recommendation: Block
Virus Scan
Virus scanning utilizes powerful virus definitions from open-source communities and Barracuda Central.
• Default: Yes
• Recommended: Yes
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Barracuda Real-Time System (BRTS)
BRTS detects zero-hour spam and virus outbreaks, even without traditional heuristics and signatures. Using
fingerprinting and domain reputation checks.
• Default: Block
• Recommended: Block
Cloudscan
Cloudscan assigns a score to each message processed, indicating the likelihood of spam. Adjust settings to
balance filtering legitimate messages and blocking spam.
• Default Block: 5
• Recommended Block: 4-5
Utilize the message log search capabilities to fine-tune the spam score beyond the recommended
thresholds. While default and recommended settings provide a starting point, customers may need to adjust
their scores to align with the organization's needs and end users' preferences.
• Analyze messages in the message log to assess their impact on the current spam score thresholds.
• Use search parameters like "score_gte" or "score_lte" to identify messages within specific score
ranges.
• Example search parameters:
o Score_lt(e): Lists messages with a score less than (or equal to) the specified value.
o Score_gt(e): Lists messages with a score greater than (or equal to) the specified value.
Adjusting Spam Score: Based on the analysis from the message log search, adjust the spam score
thresholds up or down as needed to better align with organizational requirements and end users'
preferences.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
In the provided example, a query of score_gte:1.8 with an action of Allowed was run. The existing spam
quarantine score was set to 2. By performing this search, we can identify emails that would end up getting
quarantined if the score was lowered to 1.8 (from 2).
Email Categorization
This feature offers administrators greater control over email categorization, allowing them to manage
messages that might not meet the technical definition of spam but could still be considered unwanted.
1. Corporate Emails
Emails from authenticated organization's Barracuda-verified mail servers, intended for general
corporate communications.
• Default: Allow
• Recommended: Allow
2. Transactional Emails
Emails related to specific transactions or orders, including confirmations, notices, bills, and account
updates.
• Default: Allow
• Recommended: Allow
3. Marketing Materials
• Default: Off
• Recommended: Quarantine
4. Mailing Lists
• Note: These types of emails have become a significant source of spam, contributing to
unwanted clutter in users' inboxes.
• Default: Off
• Recommended: Block
5. Social Media
Notifications and emails from social media sites like Facebook and LinkedIn.
• Default: Allow
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
• Recommended: Allow or Quarantine
Bulk email makes up many of the emails that users receive daily. In some cases, these emails may be work or
industry-related, but often, they are not work-related and serve as a distraction. These distractions can
hamper the productivity of employees.
By leveraging bulk mail quarantine, you can limit these distractions by placing bulk mail into quarantine. The
end users can then release the ones they need while ignoring the others. Limiting distractions in the Inbox
while still allowing access can keep your users more productive.
• Default: Off
• Recommended: Quarantine or Off
For any senders flagged as “bulk mail” that you wish to allow through, you will want to add that sender or
domain to the bulk email exemptions. This will allow the message to skip the bulk mail policy action, but still
be scanned for other threats, such as malicious URL or failed sender authentication. More information can
be found here.
CUSTOM RBLS
Consider leveraging external block lists like Spamhaus within the terms of service. Paid versions may be
required for full functionality. Adding additional RBLs can help reduce spam but may increase false positives.
Barracuda Support cannot assist with messages blocked due to third-party RBLs.
RATE CONTROL
Inbound rate control protects your mail server from spammers sending large amounts of email in a short
time. It limits the number of messages from a sender's IP address within a 30-minute period.
• Default: 1,000
• Recommended: 1,000
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
IP ADDRESS POLICIES
1. Avoid Shared IPs: Only make IP exemptions when you are certain that the IP is not shared by multiple
senders. For instance, it's not recommended to add Microsoft or SendGrid IPs as these ranges are
shared by many customers.
2. Use for Known Applications: An IP exemption can be appropriate for known applications like DocuSign
if the IP space is solely dedicated to the application. Refer to a list of popular applications with dedicated
IPs for guidance.
3. Proper IP/Subnet Notation: Ensure you use proper IP/subnet notation. Invalid entries will not be
evaluated during mail scanning.
4. Be Specific: Be as specific as possible. If you only need to allow or block a single IP, create an entry
using /32 (255.255.255.255). Avoid exempting entire network ranges.
Trusted Forwarder
Most customers should not configure trusted forwarders. Only set up if a server forwards mail from the
original source. Incorrect setup may affect IP-based checks and lead to missed or incorrect detections.
RECIPIENT POLICIES
Recipient policies are generally discouraged because there are limited scenarios where a recipient should be
exempt from external email filtering. However, in certain situations, recipient policies might be necessary.
Some examples include:
• Lead Generation: If your business relies heavily on leads coming in through emails, ensuring that no
leads are accidentally blocked is critical.
• Help Desk Operations: For businesses that operate help desk services where external helpdesk
tickets are submitted via email, recipient policies can ensure that these tickets are not blocked.
• Upper Management Requests: Occasionally, requests from upper management may necessitate
specific recipient policies to ensure their communication is not hindered.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
CONTENT POLICIES
Content policies provide finer control over the types of emails you want to prevent or allow into your
organization. However, these policies can increase false positives (FPs), requiring exemptions that can
complicate configurations and yield unintended results over time.
Attachment Policies
Attachment policies allow you to create rules around filenames and MIME types. With the advancements in
Advanced Threat Protection (ATP) and sandboxing, the necessity for filename attachment policies has
diminished. The use of these filters depends on organizational requirements.
Given the rise in cloud usage for sharing sensitive files, password-protected email attachments are often
malicious or unwanted. Password-protected files cannot be scanned for malware, making them a potential
attack vector. Barracuda Email Gateway Defense (EGD) allows blocking or quarantining password-protected
archives, office documents, and zips.
• Archives:
o Default: Block
o Recommended: Block
• Office Documents:
o Default: Off
o Recommended: Block
• PDFs:
o Default: Off
o Recommended: Block
While the default for Office and PDF files is Off due to their common use for secure data transmission,
blocking these can enhance security for organizations without such requirements.
False positives can be reviewed and released from the message log. A modern approach is to use SharePoint
or OneDrive for file sharing, reducing multiple versions of the same document in mailboxes.
Content policies can filter emails based on specific patterns, such as headers like a Salesforce account ID.
While powerful, these policies must be used cautiously. Aggressive policies can disrupt communication by
generating false positives, while permissive policies might miss genuine threats.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Here are some resources to learn more:
Regex Support: Message content filters support case-insensitive regex (re2) queries written in Golang. To
test your regex pattern, you can use a tool such as regex101.com.
ANTI-PHISHING
Phishing scams are typically fraudulent email messages appearing to come from legitimate senders, such as
universities, Internet service providers, or financial institutions. These messages often direct recipients to
spoofed websites or otherwise trick them into revealing private information like logins, passwords, or other
sensitive data, which is then used for identity and monetary theft.
Anti-Fraud Intelligence
This feature uses a special Bayesian database that continuously learns to detect new phishing scams.
• Default: Block
• Recommended: Block
Intent Analysis
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Intent analysis is a method for identifying phishing attacks by examining email addresses, web links, and
phone numbers embedded in email messages and attachments to determine their legitimacy. Domains
incorrectly flagged by intent analysis can be excluded using an Intent Ignore policy.
• Default: On (Block)
• Recommended: On (Block)
Content Intent
Content Intent is a subset of Intent Analysis that identifies messages with URLs in the body leading to
suspicious websites.
• Default: Block
• Recommended: Block
Link Protection
Email Gateway Defense automatically rewrites URLs in email messages, replacing them with secure links
provided by Barracuda Networks. When a user clicks a rewritten URL, the service assesses its legitimacy in
real time. If the site is trustworthy, the user is redirected; if not, access is blocked to prevent fraud. This real-
time protection ensures user safety while browsing.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
To exclude a URL or domain from link analysis, including rewriting, create an Ignore policy under Intent
Domain Policies on the Anti-Phishing page. Domains listed here will not undergo link analysis but will still be
scanned by other security layers. Note that these policies apply only to new emails going forward. For
existing links, contact Barracuda Support.
• Default: On
• Recommended: On
Typosquatting Protection
Typosquatting, or URL hijacking, tricks users into visiting a misleading domain by subtly altering the domain
name (e.g., "bankofamerlca.com" instead of "bankofamerica.com"). The Typosquatting Protection feature
checks for common typos in domain names and, if found, rewrites the URL to the correct domain so the user
visits the intended website.
• Default: On
• Recommended: On
Phishing scams are typically fraudulent email messages appearing to come from legitimate senders (for
example, a university, an Internet service provider, a financial institution). These messages usually direct you
to a spoofed website or otherwise get you to reveal private information such as logins, passwords, or other
sensitive data. This information is then used to commit identity and/or monetary theft.
The email warning banners setting alerts users about the types of potential threats that may exist within a
given email.
• Default: Off
• Recommended: On
For more information, please see Email Warning Banners | Barracuda Campus
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
MACHINE LEARNING
Machine learning models can recognize and filter out unwanted messages by continuously learning and
adapting to new spam tactics, minimizing the chance of falling victim to phishing or scams. In Email Gateway
Defense, the use of machine learning algorithms can help identify and block malicious emails before they
reach your inbox, enhancing your email security and further protecting your organization from evolving email
threats.
If you encounter a message incorrectly blocked by Machine Learning, you can enter that sender/domain into
the machine learning exemptions.
ATP SETTINGS
Advanced Threat Protection (ATP) is a cloud-based virus scanning service designed to analyze email
attachments with most MIME types in a separate, secured cloud environment. This advanced scanning
detects new threats and determines whether to block such messages, enhancing the security of your email
communications.
ATP Exemptions
While ATP exemptions are available, it is strongly recommended to minimize their use. If you believe an ATP
exemption is necessary, please ensure the following:
1. Verify Attachment Status: Confirm that the attachment was Not Delivered. Often, attachments are
deferred for Pending Scan but are delivered upon sender retry. Use the Show Message History
button when reviewing messages that show as Pending Scan to ensure accurate status.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
3. Never Exempt Your Own Domain: Exempting your own domain can create significant security
vulnerabilities and should be avoided.
USERS
Within email security, we always talk about defense in depth and the need for multiple layers. Your users are
viewed as the “human firewall” layer and are the last line of defense against any attack. Just like we integrate
the Barracuda layers, we also need to integrate the human layer. The best way to do this is through Email
Gateway Defense (EGD).
There are several ways that users can engage with EGD:
1. Outlook Add-in:
• The Outlook add-in, which is deployed from the Microsoft app store, allows end users to report
suspicious or unwanted messages directly from Outlook. The Outlook add-in integrates with
Barracuda’s threat platform, as well as your Incident Response and Awareness Training tenants.
• Provides a digest of quarantined emails received since the previous digest was sent out. Users
can allow or block the sender and release the held message directly from the digest.
3. Web UI:
• Users can seamlessly access the Barracuda web portal, where they have full message log and
policy options at their disposal.
Each of these requires some level of training/enablement for the end user so they are familiar with the tools
and understand how to use them effectively and efficiently.
Leveraging the end user quarantine digest will give you a way to limit distractions caused by certain types of
emails, such as bulk or marketing, newsletters, and mailing lists. Additionally, it allows you to tighten up
perimeter defenses without worrying so much about a legitimate email getting caught (compared to not
having user quarantine, which would require blocking). It’s critical to ensure you train users to recognize the
signs of harmful emails since they may end up in the digest occasionally.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
USERS LIST
Importance:
The user list is essential for various email security functions and ensures smooth mail flow by synchronizing
with either LDAP or AzureAD.
Functions:
• Purpose: Applies rate limits per user to prevent mail flow disruption. Default is 150
messages/30 min per sender.
• Example: Prevents a single user from affecting the entire domain's outbound mail if they exceed
rate limits.
2. User Quarantine:
3. Recipient Verification:
• Purpose: Provides proper recipient verification for inbound mail in rare cases where the mail
server cannot handle it.
• For more information, see Recipient Verification
• Purpose: Provides an account in which the end user can manage their emails and
allowed/blocked sender list.
Policies:
1. Default Policy:
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
2. Exempt Senders:
3. Block Senders:
• Allows end users to view/deliver blocked messages from their end user portal
• Default: No
• Recommended: No
• Allows end users to view/deliver quarantined messages from their digest or end user portal
• Default: Yes
• Recommended: Yes
• Purpose: Controls the time zone on the message log for both end users and administrators.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Allow Users to Specify Interval
Email Continuity
• Purpose: Ensures email functionality when primary mail servers are unavailable.
• Function: Allows sending, receiving, composing, and forwarding emails during outages; syncs
sent/received mail when services are restored.
• Default: Off
• Recommended: Auto-Enable (will also enable spooling on all domains if not already enabled)
DOMAIN SETTINGS
• Purpose: Useful for managing multiple clients on a single account with different policies.
• Identification: Look for the orange indicator on the Domains tab.
• Policy Identification: Use keyword search reason_extra:domain in the message log.
• Default: Not configured
• Recommended: Not needed for most customers.
Spooling
• Function: Spools mail for up to 96 hours if your mail system goes offline, ensuring no email loss.
• Default: No
• Recommended: Yes
• Note: Contact Barracuda Support if more than 96 hours are needed.
• Function: Automatically creates user accounts based on email activity for customers without LDAP
or AzureAD.
• Default: Off
• Recommended: Off (use LDAP or AzureAD)
• Important: Ensure proper recipient verification to avoid creating invalid user accounts.
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Sender Spoof Protection
• Function: Blocks inbound emails where the sender's domain matches your domain to prevent
spoofing.
• Default: Off
• Recommended: Off (use DMARC, SPF, and DKIM)
• Note: Create sender policy exemptions for necessary external emails but be aware this bypasses all
scanning.
SMTP Encryption
• Function: Enforces TLS policies for inbound emails. Settings vary by customer requirements.
• Recommendation: Configurable based on customer needs.
Encryption Validation
Directory Integration
• Default: Off
• Recommended: Use LDAP or AzureAD for automatic synchronization and SSO enabled.
RESOURCES
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Germany (DE) 35.157.190.224/27 35.157.190.224/27
18.185.115.192/26
18.184.203.224/27
18.133.136.128/26
18.133.136.96/27
CAMPUS ARTICLES
User Guides
Update to Microsoft 365 Deployment for Email Gateway Defense | Barracuda Campus
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.
Understanding Inbound and Outbound message flow
Last Updated May16-2025 • Copyright 2024 Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com
Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners.