Force TLS for inbound mail

by Barracuda Networks
What: New feature to Force TLS for inbound mail To require mail coming inbound to Email Gateway Defense to use a TLS connection, use the SMTP Encryption section on the Domains > Edit Settings page for each domain. Use the RequireĀ TLS to
New Feature

Ability to Exempt from Outbound Encryption

by Barracuda Networks
You now have the ability to add exemptions to outbound encryption policies. On the Outbound Settings>Content Policies page> Message Content Filter, select the Do not encrypt action filter to customize outbound encryption exemptions for
New Feature

Granular Control for End User Sender Policies

by Barracuda Networks
You can now allow your end users to exempt senders and decide if their sender policies may or may not override admin block lists. To review or make changes to this policy, go to Users> Default Policy> Exempt Senders. Exempt
New Feature

Option to Block or Quarantine Emails from Domains with No SPF Record

by Barracuda Networks
You can now block or quarantine inbound emails from domains that do not have an SPF record. Additionally, if you have known/trusted contacts that send email from or through mail servers whose domains have no SPF records, you can create...
New Feature

Option to Block Senders from the Quarantine Notification

by Barracuda Networks
You now have the option to block senders directly from the quarantine notification. A new link has been added, for each message, in the Quarantine Notification email. In addition to the DELIVER and ALLOW LIST links, there is now also a...
New Feature

Prevent Users from Viewing and Delivering Quarantined Email

by Barracuda Networks
You can now choose whether or not to allow your end users to view and deliver emails that have been quarantined. To configure this, go to Users>Default Policy>Allow end users to view and deliver quarantined messages. The default setting...
New Feature

ESS will no longer support TLS v1.0 and TLS v1.1

by Barracuda Networks
On November 30, 2020, ESS will drop support for TLS v1.0 and v1.1. These are extremely old protocols that have numerous security vulnerabilities. If you are aware of any senders that are still using these protocols, advise them to upgrade.
Announcement