Office 365 Standalone Security

Similar documents
To create a few test accounts during the evaluation period, use the Manually Add Users steps.

How to Configure Office 365 for Inbound and Outbound Mail

Step 2 - Deploy Advanced Security for Exchange Server

Office 365 Inbound and Outbound SMX configuration. 4 th January 2018

How to Configure Esva for Office365

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Exchange Online

Setting up Microsoft Office 365

Step 4 - Choose Your Deployment

Step 1 - Set Up Essentials for Office 365

Step 1 - Set Up Essentials for Office 365

Mail Assure. Quick Start Guide

Welcome to ContentCatcher 3.0! If this is your first time using ContentCatcher 3.0, here s a great way to start. We ll walk you through the essential

Getting Started Guide moduscloud

Important Information

You can find more information about the service at

Mail Assure Quick Start Guide

WeCloud Security. Administrator's Guide

Important Information

Office 365 Integration Guide Software Version 6.7

Barracuda Security Service User Guide

Enable Continuity for all users on all domains on the account to comply with business continuity regulations.

Workshare Protect Server 3.9 on Microsoft Azure. Admin Guide

Symantec Security. Setup and Configuration Guide

Connecting to Mimecast

3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings 4. Select the check box for SPoE as default.

Office 365 Journaling

Integrating Trend Micro Hosted Security with Google Gmail

Essentials Wizard Help - Configure Office 365

Step 3 - Deploy Compliance Edition for Exchange 2013 and Newer

Appliance Installation Guide

You should not have any other MX records for your domain name (subdomain MX records are OK).

Comendo mail- & spamfence

Step 3 - Deploy Advanced Security and Compliance for Exchange Server

Barracuda Security Gateway User 's Guide 6 and Above

Mail Assure. User Guide - Admin, Domain and Level

How to Journal to the Cloud Archiving Service from Microsoft Exchange Server 2007 and 2010


The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users.

Trustwave SEG Cloud Customer Guide

Office 365: Secure configuration

2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8

TrendMicro Hosted Security. Best Practice Guide

How to Install and Configure the Barracuda Outlook Add-In

Symantec ST Symantec Messaging Gateway Download Full Version :

iq.suite Azure Edition

Instructions Microsoft Outlook 2007 Page 1

Instructions Microsoft Outlook 2013 Page 1

Integrate Barracuda Spam Firewall

Configuring Gmail (G Suite) with Cisco Cloud Security

User guide NotifySCM Installer

How to configure Sophos for all other clients

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Configure Exchange 2003 Server

Sophos Mobile. super administrator guide. Product Version: 8

Comprehensive Setup Guide for TLS on ESA

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Workshare Protect Server 3.8. Solutions Guide

Instructions Microsoft Outlook 2010 Page 1

Sophos Mobile. super administrator guide. product version: 8.6

Version SurfControl RiskFilter - Administrator's Guide

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

EVRY Security. Administrator's Guide

How to Configure GroupWise Message-Level Backups

Anti-Spoofing. Inbound SPF Settings

Symantec ST0-250 Exam

Sophos Mobile super administrator guide. Product version: 7.1

Admin Guide Defense With Continuity

VMware AirWatch: Directory and Certificate Authority

Outlook GroupWare Connector User Guide

Comodo Dome Antispam Software Version 6.0

Configuring an IMAP4 or POP3 Journal Account for Microsoft Exchange Server 2003

Instructions Microsoft Outlook 2003 Page 1

MDaemon Vs. SmarterMail Enterprise Edition

CLD206x Compliance in Office 365: Data Governance

.-----~ IPSWITCH. IMail Server. Getting Started Guide

WORKSHARE PROTECT SERVER 3.6 SOLUTIONS GUIDE

CryptoHeaven Administration Guide 2011

Sophos Mobile. super administrator guide. product version: 9

Christensen Software Exchange Server Configuration Guide

Internet Key Administration

WEBSENSE PERSONAL MANAGER

Troubleshooting IMAP Clients and ViewMail for Outlook

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

SonicWALL Security 6.2 Appliance

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

MDaemon Vs. Kerio Connect

User Account Manager

MDaemon Vs. Microsoft Exchange Server 2016 Standard

Integrating AirWatch and VMware Identity Manager

MDaemon Vs. Zimbra Network Edition Professional

Quest Collaboration Services 3.6. Installation Guide

Comodo Dome Antispam MSP Software Version 2.12

SOLUTION MANAGEMENT GROUP

MDaemon Vs. Kerio Connect

Test-king q

Cloud Services. Spam Manager. Quarantine Admin Guide

Transcription:

The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page displays in Barracuda Cloud Control. Click Set up additional domains to go to the Barracuda Email Security Service Domains page, or continue with your configuration. BARRACUDA EMAIL SECURITY SERVICE Step 1. Set Up User Accounts You can add users manually, or use LDAP or Azure AD authentication to automatically synchronize the Barracuda Email Security Service with your active directory server. To create a few test accounts during the evaluation period, use the Manually Add Users steps. Manually Add Users Click to manually add users... 1. Go to Users > Add/Update Users: 2. In the User Accounts field, enter each user email address for the domain on a separate line, and then select from the following options: 1. Enable User Quarantine All emails for the user which meet the configured block policy go to the user's quarantine account. Depending on how you have configured the quarantine notification interval on the Users > Quarantine Notification page, the user receives a quarantine digest at a specified time. From the Users > Quarantine Notification page you can also enable the user to set their own quarantine notification interval. 3. 2. Notify New Users When set to Yes, users receive a welcome email once the account is created. Click Save Changes. The users are added to the Users > Users List table where you can select from the following actions: 1. Edit Click to specify domains this user can manage. 2. Reset Click to send the user an email with instructions on how to reset their account password. 3. Log in as this user Click to view or change the user's settings (for example, quarantine notifications), view/manage the domains this user manages, and v iew/search/manage the user's Message Log. 4. Delete Click to remove the user account. 1 / 13

The first time the Barracuda Email Security Service receives an Allowed email for a non-existent user at a domain configured for the service, if that same recipient receives a second email 1-6 days later, a new user account is created. This method of new account creation does not use LDAP lookup, and the user receives an email from the Barracuda Email Security Service with their login information so they can access their quarantine account. Automatically Add Users You can configure user authentication via your organization's LDAP server or Azure AD service. For complete setup details, see the following articles: How to Configure User Authentication with Azure AD How to Configure User Authentication Using LDAP Step 2. Add Additional Email Domains Use the steps in this section only if you want to manually add additional email domains, otherwise, go to Step 3. Create Transport Rule. Click to add additional email domains... Obtain the hostname: 1. Log in to the Office 365 admin center. 2. In the left pane, click Settings > Domains. 3. In the Domains table, click on your domain. 4. Take note of the hostname. This is the address of your destination mail server, for example, cudawarecom.mail.protection.outlook.com 2 / 13

Enter the hostname: Barracuda recommends using a hostname rather than an IP address so that you can move the destination mail server and update DNS records without making changes to the Barracuda Email Security Service configuration. This address indicates where the Barracuda Email Security Service should direct inbound mail from the Internet to your Office 365 Exchange server. For example, your domain displays to the Internet as: bessdomain.mail.protection.outlook.com 1. Log in to the Barracuda Email Security Service as administrator, and click Domains, and click Add Domain. 2. Enter the domain name and destination mail server hostname obtained from your Office 365 account in the dialog box. 3. Click Add; the Domain Settings page displays. Step 3. Create Transport Rule 1. 2. 3. Log in to the Office 365 admin center, and go to Admin centers > Exchange. In the left pane, click mail flow, and click rules. Click the + symbol, and click Bypass spam filtering: 4. In the new rule page, enter a Name to represent the rule. 5. From the Apply this rule drop-down menu, select The sender > IP address is in any of these ranges or exactly matches: 3 / 13

6. In the specify IP address ranges page, type the IP address range for the Sender (Barracuda Email Security Service) based on your Barracuda Email Security Service instance, for example, type: 64.235.144.0/20, and click the + symbol. 7. Type the next IP address range for the Sender, for example, type 209.222.80.0/21, and click the + symbol: 8. Click OK. 9. Click Save. The list of mail flow rules displays. 10. Select the rule you just created, and click the edit icon to display the properties. 4 / 13

11. 12. Scroll to the bottom and change the Priority of the rule to 0. This ensures it is the first rule to process. Click Save. Step 4. Restrict Inbound Mail to the Barracuda Email Security Service IP Range (Optional) Important: After updating your MX records, allow 24 hours before completing the steps in this section to allow the records to propagate. Use the following steps if you want to restrict inbound mail to the Barracuda Email Security Service IP address range: Click to restrict inbound mail... 1. Log in to the Office 365 admin center, and go to Admin centers > Exchange. 2. In the left pane, click mail flow, and click rules. 3. Click the + symbol, and click Create a new rule. 4. In the new rule page, enter a Name to represent the rule. For example, type: Barracuda ESS IP restriction 5. Scroll down and click More Options. 6. From the Apply this rule if drop-down menu, select The Sender > Is External/Internal > Outside the organization. 7. From the Do the following drop-down menu, select Reject this message with the explanation. 8. Enter the message you want included in the non-delivery report (NDR) that is sent to the sender. For example, enter: You have attempted to bypass our Email Security Service. Please ensure your DNS is up-to-date and try sending your message again. 9. Click Add Exception. 10. Select The Sender > Sender s IP address is in any of these ranges or exactly matches, and enter the Barracuda Email Security Service IP range based on your Barracuda Email Security Service instance. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Enter the Barracuda Email Security Service IP range, for example: 64.235.144.0/20 Click the + symbol. Enter the Barracuda Email Security Service IP range, for example: 209.222.80.0/21 Click the + symbol. Click OK. Select Stop processing more rules. Under Match sender address in message, select Envelope. Click Save. The list of mail flow rules displays. Select the rule you just created, and click the edit icon to bring up the properties. Scroll to the bottom and change the Priority of the rule to 0. This ensures it is the first rule to process. Click Save. If you complete both Step 3. Create Transport Rule and Step 4. Restrict Inbound Mail to the Barracuda Email Security Service IP Range, verify the Restrict Inbound Mail from Outside Your Organization to the Barracuda Email Security Service IP Range rule displays first in the mail flow rules list, and the Transport Rule rule displays second in the mail flow rule list. 5 / 13

Step 5. Configure Outbound Mail If you have multiple domains within your Office 365 tenant and you want to scan only certain domains outbound, see How to Configure Office 365 to Scan Only Selected Domains Outbound. If you have not already done so, contact Barracuda Technical Support and request that Outbound Groups be enabled on your Barracuda Email Security Service account. 1. 2. 3. 4. Log in to the Barracuda Email Security Service, click Domains, and click on the domain name to toggle the MX Records configuration; make note of the Outbound Hostname. Log in to the Office 365 admin center, and go to Admin centers > Exchange. In the left pane, click mail flow, and click connectors. Click the + symbol and use the wizard to create a new connector. 5. From the From drop-down menu, select Office 365, and from the To drop-down menu, select Partner organization: 6. Enter a Name and (optional) Description to identify the connector: 6 / 13

7. Click Next. Select Only when email messages are sent to these domains, click the + symbol, and enter an asterisk (*) in the add domain field: 7 / 13

8. Click OK, and click Next. Select Route email through these smart hosts, and click the + symbol. 9. Go to the Barracuda Email Security Service, click the Domains tab, and click on the domain name to toggle the MX records configuration. Copy your outbound hostname, and enter it in the add smart host page: 8 / 13

10. Click Save, and click Next. Use the default setting, Always use Transport Layer Security (TLS) to secure the connection (recommended) > Issued by Trusted certificate authority (CA): 9 / 13

11. Click Next. In the confirmation page, verify your settings and click Next. Office 365 runs a test to verify your settings: 10 / 13

12. When the verification page displays, enter a test email address, and click Validate. Once the verification is complete, your mail flow settings are added. For additional configuration options and features, log in to the web interface and click Help. Step 6. Configure Sender Policy Framework for Outbound Mail To assure Barracuda Networks is the authorized sending mail service of outbound mail from your Barracuda Email Security Service, add the following to the Sender Policy Framework (SPF) record INCLUDE line of the SPF record for your sending mail server for each domain sending outbound mail. Select the relevant SPF INCLUDE based on the region you selected for your Barracuda Email Security Service. For example, if you are using Office 365, your record would look similar to: v=spf1 include:spf.protection.outlook.com include:spf.ess.barracudanetworks.com -all See Sender Authentication for more information. If you have an SPF record set up for your domain, edit the existing record, and add the following to the INCLUDE line for each domain sending outbound mail based on your Barracuda Email Security Service instance. For example: include:spf.ess.barracudanetworks.com -all If you do not have an SPF record set up for your domain, use the following value to create a TXT record that creates a HARDFail SPF for your domain based on your Barracuda Email Security Service instance. For example: v=spf1 include:spf.ess.barracudanetworks.com -all See Sender Policy Framework for Outbound Mail for INCLUDE values based on your Barracuda Email Security 11 / 13

Service instance. 12 / 13

Figures 13 / 13