HowTo: Allow-List in Barracuda

If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to your end-user’s inboxes.

Please see this article for the current IP Addresses and Domain Names for CyberHoot.

CyberHoot Email-Relay IP Addresses, Domains, and White-Listing Articles

White-listing by IP in Barracuda in Email Security Gateway

These instructions were gathered and summarized–based on Barracuda’s knowledgebase. For more information on how to white-list in Barracuda, check out this video from Barracuda.

If you are using Barracuda’s Email Security Service (cloud), follow these steps to white-list Barracuda by IP address:

  1. Log in to your Barracuda Cloud Control.
  2. Go to Email Security > Inbound Settings > IP Address Policies.
  3. In the IP Blocking / Exemption section,  enter the first CyberHoot mail server IP in the IP/Network Address field.
  4. In the Netmask field, type the netmask using this format:  255.255.255.255
  5. If you’d like, add a note in the Comment field. For example, CyberHoot Simulated Phishing IP Address.
  6. Click Add to white-list the IP address.
  7. Complete steps 2 through 6 for each of the CyberHoot IP addresses found above.

If you are using Barracuda’s Email Security Gateway (on-premises), follow these steps to white-list Barracuda by IP address:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Go to the BLOCK/ACCEPT > IP Filters page.
  3. In the Allowed IP/Range section, enter the first CyberHoot mail server IP in the IP/Network Address field.
  4. In the Netmask field, type the netmask using this format:  255.255.255.255
  5. If you’d like, add a note in the Comment field. For example, CyberHoot Simulated Phishing IP Address.
  6. Click Add to white-list the IP address.
  7. Complete steps 2 through 6 for each of the CyberHoot IP addresses found above.

Barracuda Intent Analysis

You may need to white-list us in Barracuda’s Intent Analysis feature to prevent the URLs in simulated phishing tests from being altered, and potentially resulting in skewed phishing test results. See this article from Barracuda explaining this process

If you are using Barracuda’s Email Security Service (cloud), follow these steps to white-list Barracuda’s Intent Analysis:

  1. Log in to your Barracuda Cloud Control.
  2. Navigate to Email Security > Inbound Settings > Anti-Phishing.
  3. Under the Intent section, add CyberHoot’s hostnames. Make sure the Policy drop-down is set to Ignore.

If you are using Barracuda’s Email Security Gateway (on-premises), follow these steps to white-list Barracuda’s Intent Analysis:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Navigate to Email Security Gateway > Basic > Spam Checking.
  3. Under the Intent Analysis section, add CyberHoot’s hostnames to the URI Exemptions: text box field.

Barracuda Advanced Threat Protection (ATP) 

If you are using Barracuda’s Advanced Threat Protection (ATP) and have experienced false clicks or false attachment opens, you can set up exemptions. Setting up exemptions allows you to bypass PDF scanning for phishing test emails from CyberHoot’s IP addresses. 

To set up exemption addresses to bypass ATP PDF Scanning:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Select the ATP Settings tab.
  3. Enter the above CyberHoot IP address(es) and subnet mask(s) at the beginning of this How To article.
  4. Click Add.
Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.