Barracuda Email Gateway Defense

Configure the Barracuda Email Gateway Defense data connector.

In this guide, you'll set up a trusted relationship between Radiant and your Barracuda Email Defense account to allow Radiant to give your organization visibility into email logs and also alerts for spam, viruses, worms, phishing, denial of service attacks, and zero-day threats.

Prerequisites

Configure Barracuda Email Defense to forward to Radiant Security

  1. In the Email Gateway Defense console, select the Account Management tab.

  2. Under Syslog Integration, add the following:

    1. IP Address / Hostname: Enter primary.syslog.radiantsecurity.ai

    2. Port: Enter 7514

  3. Click the Add button.

  4. Under Actions, click Test to begin sending logs for testing.

Find your Barracuda Email Defense Account ID

  1. To find the account ID, go to the main Overview > Dashboard page.

  2. Scroll to the bottom of this page and find the Account ID information in the page footer. There are two IDs here, note down the one that begins with ESS.

Add the data connector in Radiant Security

  1. Log in to Radiant Security.

  2. From the navigation menu, select Settings > Data Connectors and click + Add Connector.

  3. Search for and select the Barracuda EGD (syslog) option and then click Data Feeds.

  4. Under Select your data feeds, select Barracuda EGD (syslog) and click Credentials.

  5. Under Credential Name, give the credential an identifiable name (e.g. Barracuda EGD Credentials).

  6. Under Required Credentials, add the ESS Account ID that you copied from the previous section.

  7. Click Add Connector.

Last updated