Barracuda XDR Release Notes — April 2026
The April release of Barracuda XDR includes
New Dashboard features
The following are the new features of the Barracuda Managed XDR Dashboard.
Configuring ports for syslog integrations
You can now configure custom ports for certain integrations. Instead of being restricted to the default port, you can select any port, as long as it’s open. The integrations where you can identify a custom port include:
Check Point
Cisco ASA
Cisco FTD
Cisco Meraki
Citrix WAF (Citrix Netscaler Application Delivery Controller ADC)
Eset Protect
F5 BIG IP
Fortinet
Juniper SRX
Palo Alto
Sonicwall
Sophos UTM
Sophos XGS
Symantec (Broadcom Endpoint Security)
Tanium
Trendmicro Deep Security
Watchguard
ZScaler
SQL search for data source logs
You can now search data source logs with SQL in addition to AI. You can start with SQL created from plain language search, then edit the SQL, run it, and copy the SQL code.
For more information, see https://documentation.campus.barracuda.com/wiki/spaces/SKOUT/pages/519045121.
Additional data sources
The following have been added to data source logs as a data source:
AWS Cloudtrail
Microsoft GCC High
Sophos XG
Stormshield
Ubiquiti
Zscaler
For more information, see https://documentation.campus.barracuda.com/wiki/spaces/SKOUT/pages/294715691.
New Endpoint Security group
A new endpoint security group, Monitor + Remediation + VSS Disabled, is created by default when SentinelOne is integrated.
Monitor + Remediation + VSS Disabled — Barracuda XDR monitor your endpoints, notifies you with an Alert if any risks are detected, and isolates and remediates risks. In this group, Volume Shadow Copy Service (VSS) is disabled, which is required for most backup software to run without interference from the SentinelOne agent. If you’re running your own backup systems, place your servers in this group to avoid issues right away upon installation.
For more information, see https://documentation.campus.barracuda.com/wiki/spaces/SKOUT/pages/6947821.
Managing SentinelOne threats
You can now mitigate threats detected by SentinelOne directly in the Barracuda Managed XDR dashboard, letting you act instantly when a threat is detected. You can choose between quarantining the file that started the process or killing the process.
Introducing geographic controls
Defining your authorized geographic footprints (country, region/state, city) enhances the accuracy of XDR detections by incorporating geographic data into detection models and automated workflows, reducing false positives.
XDR uses this data to track login anomalies such as impossible travel.
For more information, see https://documentation.campus.barracuda.com/wiki/spaces/SKOUT/pages/519602190.
Automatic Threat Response (ATR) added for Microsoft Defender XDR (Previously known as Microsoft 365 Defender)
While endpoint ATR was previously available for Microsoft Defender for Endpoint, XDR has added ATR for Microsoft Defender XDR. Once ATR is set up, if a security alert triggers, ATR quarantines the impacted device from the network. You can manually isolate devices and also see the records of ATR actions that XDR has taken for Microsoft Defender XDR.
For more information on setting up ATR for Microsoft Defender XDR, see https://documentation.campus.barracuda.com/wiki/spaces/SKOUT/pages/429162693.
Automated interoperability catalog
A new page in the XDR Dashboard lets you manage their SentinelOne Interoperability Catalog and application exclusions. To see it, select Administration > Managed Endpoint Interoperability Catalog.
Dashboard bug fixes
|
|
|---|---|
8474 | Hid Multi Factor Authentication (MFA) settings for users signed in with authdb. |
9980 | Resolved an issue where the log search screen didn’t load properly. |
10027 | Resolved an issue with account changer. |
10049 | Resolved an issue with audit log formatting. |
10077 | Resolved an issue with saving Barracuda Intrusion Detection System (IDS) integration. |
100163 | Resolved an issue where certain users with a new account saw an error on the Interoperability Catalog page. |
Rules
New Rules
Windows WinRM Activation
Windows Net User Account Created
Windows Net User Account Deleted
Windows Net User Account Disabled
Windows Suspicious Net User Domain Command
Windows Domain Admin Group Enumeration
Stormshield SNS (9)
Query
Stormshield Blocked Traffic Major Alarm
Stormshield Configuration Change from External IP
Stormshield Network Security Threat Simulation
Stormshield Suspicious Outbound Traffic to High-Risk Ports
Threshold
Stormshield Brute Force Authentication Attempt
Stormshield Password Spraying Activity
Threat Intel
Stormshield Outbound Traffic to Threat IP
Stormshield Threat IP Communication Detected on Critical Protocol
Stormshield User Login from Threat IP
pfSense (10)
QuerypfSense Inbound RDP from Internet Allowed
pfSense Inbound SSH from Internet Allowed
pfSense Network Security Threat Simulation
pfSense Suspicious Outbound Traffic to High-Risk Ports
Threshold
pfSense Allowed Port Scan Activity
pfSense Potential C2 Beaconing Activity
Threat Intel
pfSense Inbound Traffic from Threat IP
pfSense Outbound Traffic to Threat IP
pfSense Threat IP Communication on Critical Protocol
pfSense User Login from Threat IP
Tuning and Bug Fixes
GLB.EA.NET Checkpoint Detected Download Manager Traffic - Rule Tuned by removing legitimate applications consistently used by customers internally.
The following Windows rules have updated ticket bodies and recommendations:
Windows PsExec Executed
Windows Device Logs Cleared
Windows Persistence Via Bits Job Cmdline
Windows Firewall Disabled via PowerShell
Windows Deleting Backup Catalogs Wbadmin
Windows PowerShell Kerberos Ticket Dump
Windows Suspicious Certutil Commands
Windows HackTool - WinPwn Execution
Windows RDP Enabled via Registry
Windows Mimikatz Command Line Syntax Detected
Windows DPAPI Domain Backup Key Extraction
Windows Impacket smbexec Reverse Shell Gained
Windows Remote File Download via Cmd.exe
Windows Potential Evasion via Filter Manager
Windows Impacket PsExec Reverse Shell Executed
Windows Volume Shadow Copy Deletion via PowerShell
Windows Volume Shadow Copy Deletion via VssAdmin
Windows Volume Shadow Copy Deletion
Checkpoint Detected Download Manager Traffic
Excluded package managers such as apt-get, dnf, git, npm
Okta: Logon from Anomalous Location
Added a correlation via SentinelOne to check if a device in the console matches the suspect IP
Microsoft Office 365 Anomalous Login
Added a correlation via SentinelOne to check if a device in the console matches the suspect IP