Unlocking Barracuda: Master the Art of Allow-Listing Like a Pro!
If you’re using Barracuda’s Email Security Gateway, you can add CyberHoot IP addresses and domain names to your allow-list. This ensures that our simulated phishing test emails and training notifications land right in your users’ inboxes. Let’s dive into the step-by-step process to make this happen.
Current IP Addresses and Domain Names for CyberHoot
First things first, make sure you have the latest IP addresses and domain names for CyberHoot. You can find this info in our dedicated article:
Allow-Listing by IP in Barracuda Email Security Gateway
These instructions are based on Barracuda’s knowledge base. For more details, check out Barracuda’s official resources.
Allow-Listing in Barracuda Email Security Service (Cloud)
Here’s how to allow-list by IP address in Barracuda’s Email Security Service (cloud):
- Log in to your Barracuda Cloud Control.
- Head to Email Security > Inbound Settings > IP Address Policies.
- In the IP Blocking / Exemption section, enter the first CyberHoot mail server IP in the IP/Network Address field.
- In the Netmask field, type the netmask like this: 255.255.255.255.
- Feel free to add a note in the Comment field, like “CyberHoot Simulated Phishing IP Address”.
- Click Add to allow-list the IP address.
- Repeat these steps for each of the CyberHoot IP addresses.
Allow-Listing in Barracuda Email Security Gateway (On-Premises)
Follow these steps to allow-list by IP address in Barracuda’s Email Security Gateway (on-premises):
- Log in to your Barracuda Email Security Gateway web interface.
- Go to the BLOCK/ACCEPT > IP Filters page.
- In the Allowed IP/Range section, enter the first CyberHoot mail server IP in the IP/Network Address field.
- In the Netmask field, type the netmask like this: 255.255.255.255.
- Add a note in the Comment field if you want, like “CyberHoot Simulated Phishing IP Address”.
- Click Add to allow-list the IP address.
- Repeat these steps for each of the CyberHoot IP addresses.
Barracuda Intent Analysis
You might need to allow-list us in Barracuda’s Intent Analysis feature. This prevents the URLs in simulated phishing tests from being changed, which could mess up your phishing test results.
Allow-Listing in Barracuda’s Intent Analysis (Cloud)
Here’s how to allow-list in Barracuda’s Intent Analysis (cloud):
- Log in to your Barracuda Cloud Control.
- Navigate to Email Security > Inbound Settings > Anti-Phishing.
- Under the Intent section, add CyberHoot’s hostnames. Make sure the Policy drop-down is set to Ignore.
Allow-Listing in Barracuda’s Intent Analysis (On-Premises)
Follow these steps to allow-list in Barracuda’s Intent Analysis (on-premises):
- Log in to your Barracuda Email Security Gateway web interface.
- Navigate to Email Security Gateway > Basic > Spam Checking.
- Under the Intent Analysis section, add CyberHoot’s hostnames to the URI Exemptions text box field.
Barracuda Advanced Threat Protection (ATP)
If you’re using Barracuda’s Advanced Threat Protection (ATP) and have run into false clicks or false attachment opens, you can set up exemptions. This lets you bypass PDF scanning for phishing test emails from CyberHoot’s IP addresses.
Setting Up Exemption Addresses to Bypass ATP PDF Scanning
Here’s how to set up exemption addresses: