Barracuda Threat Scanner for Exchange

Similar documents
How to Get and Configure Barracuda Exchange Antivirus Agent 7.1 and Above

Troubleshooting Policy Client

Inware Technologies Shuttle IMAP Extractor

Installation Manual. and User Guide

Deployment Guide For Microsoft Exchange With Cohesity DataProtect

RoomWizard Exchange Connector. Complete Implementation Guide

Raptor University. Installing Raptor v Instructor: RAPTOR TECHNOLOGIES, LLC

Metasploit. Installation Guide Release 4.4

LifeSize Control Installation Guide

Samsung Flip Printing Software

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

TABLE OF CONTENTS. Page 1 of 59

Step 1 - Set Up Essentials for Office 365

Abaqus Student Edition. Installation Instructions

Installing and Configuring vcenter Multi-Hypervisor Manager

Raptor University. Installing Raptor v Instructor: RAPTOR TECHNOLOGIES, LLC

Troubleshooting Web Inbox

How to Configure Virus Scanning in the Firewall

Essentials Wizard Help - Configure Office 365

Step 1 - Set Up Essentials for Office 365

WMI log collection using a non-admin domain user

The modusgate console is composed of five configuration modules, these are described in the following table:

A Guide to Installing OLI Software

User Guide. Quick Heal Technologies Ltd.

How to Configure Office 365 for Inbound and Outbound Mail

Endpoint Security Manager

Kaspersky PURE 2.0. Exclusions

Outlook 2010 Exchange Setup Guide

Sage Installation and System Administrator s Guide. October 2016

Classic/Premier Installer Possible errors and solutions

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

CounterACT Check Point Threat Prevention Module

RoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Sage Installation and System Administrator s Guide. March 2019

Symprex Folder Permissions Manager

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.

Microsoft Dynamics CRM Installation (MB2-708)

EntraPass Installation Guide Kantech-OnBoard systems

How to Install and Configure the Barracuda Outlook Add-In

Installing FileMaker Pro 11 in Windows

Using Trustwave SEG Cloud with Exchange Online

Symprex Out-of-Office Extender

Installation on Windows Server 2008

Movithere Server edition Guide. Guide to using Movithere to perform a Microsoft Windows Server data migration quickly and securely.

Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus

Antivirus Solution Guide for Clustered Data ONTAP: Sophos

Mailbox Manager Getting Started Guide. Licensing Installation Options System Requirements Installation Instructions

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

Software Requirements: The software requirements for installing the software are as follows:

Quick Configuration Guide For Exchange Reporter Plus

Installation Guide for Pulse on Windows Server 2012

Exchange Pro 4.4. User Guide. March 2017

How to Install and Configure the Barracuda Outlook Add-In

[Outlook Configuration Guide]

1 Installing the integration server

Comodo. Endpoint Security Manager Software Version 1.6. CIS Configuration Editor Guide Guide Version

Workstation Configuration

Deposit Wizard TellerScan Installation Guide

User Guide. PCmover Professional for Windows XP. Laplink Software, Inc. User Guide MN-PCMPRO-XP-EN-08 (REV. 2014/07/08)

Freshservice Discovery Probe User Guide

Sophos Enterprise Console Help. Product version: 5.3

EntraPass (W10) Installation Guide Kantech-OnBoard systems

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

How to Configure GroupWise Message-Level Backups

Quest Collaboration Services 3.6. Installation Guide

How to remove Adware from Mozilla Firefox

Sage 100 ERP 2015 Installation and System Administrator s Guide

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Software Version 5.3 August P Xerox Secure Access Unified ID System 5.3 Installation Guide

This document provides instructions for the following products.

SecureAPlus User Guide. Version 3.4

KG-TOWER Software Download and Installation Instructions

BCPro Installation Instructions Code No. LIT Software Release 3.0 Issued September 2017

IT Essentials v6.0 Windows 10 Software Labs

Workstation Configuration

Verify that your operating environment meets all hardware and software requirements. For detailed requirements

Module Browser-based Deployment

SafeConsole On-Prem Install Guide

CaseWare Working Papers Getting Started Guide. For Working Papers

Workstation Configuration

IBM i Version 7.2. Connecting to your system Connecting to Your system with IBM Navigator for i IBM

INSTALLATION AND CONFIGURATION

WANSyncHA Microsoft Exchange Server. Operations Guide

KNOXPLANS for New Users

MOVE AntiVirus page-level reference

F-Secure Client Security. Quick Installation Guide

UNINSTALL THE BPR FOR WIN-Rev2.bprm

Free. User Guide. Free. Laplink Software, Inc. User Guide MN-PCMFREE-EN-08 (REV. 2/2013)

ReadyDoc Client Application Installation Instructions

Guardian Total Security User Guide

Dell License Manager Version 1.2 User s Guide

Version 12.0 Component Installation and Configuration. January 31, 2007

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Workstation Configuration Guide

Configuration Guide for Exchange Reporter Plus

Step 4 - Choose Your Deployment

Workstation Configuration

Top Producer 7i Remote

Transcription:

The is a free Windows application that allows you to scan onpremises Microsoft Exchange Servers for threats in existing user mailboxes. This tool provides insight into what threats have already entered the organization through email; threats that can be stopped by Barracuda's Advanced Threat Protection. runs on a local workstation and leverages the existing Microsoft Outlook application to access the Exchange Server. The specific email boxes you can scan depends on the credentials you provide. Once the scan is complete, the tool places the output in a local folder allowing you to view it as a web page and examine the scan logs. Note that is not a remediation tool. While an administrator can scan an entire server, by default the tool only report the first 50 threats it finds. When the scanner reaches its limit, the scan stops. How the Scan Works Email Threat Scanner for Exchange leverages your existing Outlook installation to scan your Exchange Server mailboxes to discover security and compliance threats. Scanning is based on the provided credentials; scanning your personal mailbox requires your personal credentials, while scanning all mailboxes requires an account with administrator privileges. During a scan, uses hooks into Outlook to log into and scan through the selected mailboxes, looking for emails with attachments. Attachments are then passed to Barracuda Advanced Threat Protection (ATP) over a secure SSL connection for analysis. Threats found during the scan are added to the report. While the scanner uses ATP to identify threats, it is using a subset of the full ATP capabilities. Scans through do not pass through the final Sandbox stage. However, the scan leverages the previous layers including Anti-Virus and Heuristic Analysis. Together, these stages provide a 99% capture rate even without the Sandbox stage. Table 1. Potential Impact. Exchange Server Local Client Running a scan has minimal impact on the Exchange Server. Since it is using a normal Outlook client connection, and only retrieving emails with attachments, it is no greater load than a normal user searching through their attachments. Even in cases where an administrator is using to scan the entire server, the impact remains minimal. Most processing is done on the local client running the scan and the impact is minimal, with testing showing less than 10% CPU load. Note that scans can run for several hours and the workstation needs to remain on and connected to the network during the scan. Requirements You must have at a minimum: Outlook 2013 or 2016 8GB RAM Windows 7 or higher External network access 1 / 7

Antivirus Software If your system is running antivirus software, this may interfere with Email Threat Scanner for Exchange. To prevent interference, exempt the following directory from antivirus scanning: %LOCALAPPDATA%\Barracuda\Email Threat Scanner for Exchange\Scans Outlook Profile To run the installer, you must have at least one Exchange-configured Outlook profile. This account must have access to the mailboxes to be imported and the credentials for that user must be cached in the system. If you need to configure account permissions, use the following PowerShell script: Get-Mailbox -ResultSize unlimited -Filter '(RecipientTypeDetails -eq "UserMailbox")' Add-MailboxPermission -User <account email address> - AccessRights fullaccess -InheritanceType all -AutoMapping $false); where <account email address> represents the email address for the Exchange-configured Outlook profile. Install Scanner 1. Click the following link to download the installer to a Windows system: http://d.barracuda.com/xts/1.0/email Threat ScannerScan.exe 2. Run the installer and follow the online prompts to complete the wizard. If you uninstall Email Threat Scanner for Exchange, all scans, including reports, are deleted. Scan Mailboxes 1. 2. Launch. Enter your registration details in the Register Product screen, click OK, and click OK once Email Threat Scanner for Exchange is registered. For partners, when running the scanner for customers, you must select a different profile for each customer. 3. From the Outlook profile drop-down menu, select the profile. 4. From the Mailbox filter drop-down menu, select what to scan: 1. 2. 3. 4. 5. 6. All users Scans all user mailboxes Distribution list Enter the distribution list name on which to scan Email address Enter the email address on which to scan Last name Enter the name on which to scan My mailbox Scans the default mailbox associated with the selected Outlook profile Public folders Scans all public folders Because the scan can take several hours to complete, use the Test feature before starting the scan. To verify the server is available and items can be scanned successfully, select Email 2 / 7

address, enter a test email address, and click Test. If the email address is found, click OK to close the dialog box and proceed with the scan: If the email address is not found, click Yes to view the log file to troubleshoot the issue: 5. Select the Mailbox filter on which to scan, and click Scan. The scanner may take a few hours per mailbox to scan, so you can leave this running in the background. Note that mailboxes are scanned in parallel. Once the scan is complete, a Barracuda representative will contact you. Email Threat Scanner for Exchange Menu Options 3 / 7

File menu options: Scan Start the scan Exit Close Email Threat Scanner for Exchange Tools menu options: View History View your scan history: Logs View Log File Click to open the log file in Notepad Open Log Directory Click to open the log directory in Explorer Enable Trace Logging If directed to do so by Barracuda Networks Technical Support, Click to toggle trace logging On to resolve any errors encountered during scanning View Scan Report The report includes up to the first 50 threats found during scanning. 1. Once the scan is complete, the scan complete dialog box displays the scan results: 4 / 7

2. Click Yes to view the scan report in your browser: 3. Click the Report ( ) icon to view the full report: 5 / 7

The scan report is also sent to Barracuda for evaluation. Table 1. Full Report Details. View the full report contains a summary of the scanned mailboxes, number of attachments, threats and suspicious attachments, and a summary of the discovered threat types. The following table describes the full report fields. Field Attachment file name Threat category Examples pdf.pdf INVOICE.TAM_48530_20161129_A41E487BF.xls Suspicious Malicious File application category application/vnd.ms-excel File size Threat detection 43.7K 91.5K Detected by anti-virus software Once threats are identified, Barracuda recommends using Advanced Threat Protection to prevent new threats from entering your system. For more information, see Advanced Threat Protection. Troubleshooting If you encounter an error similar to: Failure during COM call: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider. [0x800B0109] There is an error referencing the root certificate. To resolve this issue, open the web filter to allow connection to back end. 6 / 7

Figures 7 / 7