Migrating from an existing email security solution

Modified on Sat, 7 Sep at 3:53 PM

About migrating your email configurations

You can export allowlists, blocklists, and VIP lists from your current email security solution, and then send them to PP or Acronis Support to import them into Perception Point X-Ray.


Migrating from specific solutions

You can use the configuration mappings that are included in the links below to migrate your configuration from Barracuda Essentials, Proofpoint Essentials, or Trend Micro Email Security [Standard] to Perception Point X-Ray.

 


 Configuration mappings for Barracuda Essentials

This page includes:

 

About configuration mappings for Barracuda Essentials

You can use the configuration mappings in the table below to migrate your configuration from Barracuda Essentials to Perception Point X-Ray.

Configuration mappings

 

 

Setting description

Setting location in Perception Point X-Ray

Setting location in Barracuda Essentials

Migration steps

 

Do not scan emails from listed IPs

Detection Setup > Allow List / Block List > Sender IP Allow List

Inbound Settings > IP Address Policies

Copy all Exempted IPs from Barracuda to Perception Point X-Ray.

 

Mark emails, from the listed IPs, as malicious

Detection Setup > Allow List / Block List > Sender IP Block List

N/A

N/A

 

Do not scan emails from listed sender email addresses (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Allow List

Inbound Settings > Sender Policies

Copy all Exempted email addresses and domains from Barracuda to Perception Point X-Ray.

 

Mark emails, from listed sender email addresses, as malicious (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Block List

Inbound Settings > Sender Policies

Copy all email addresses and domains that are marked as Block or Quarantine, in Barracuda, to Perception Point X-Ray.

 

Do not scan emails to listed recipient email addresses

Detection Setup > Allow List / Block List > Recipient Email Address Allow List

Inbound Settings > Recipient Policies

Copy all Exempted users email addresses from Barracuda to Perception Point X-Ray.

 

Do not scan listed URLs (exact or domain)

Settings > Detection tab >  URL Allow List

Inbound Settings > Intent Domain Policies

Copy all Ignored URLs from Barracuda to Perception Point X-Ray.

 

Mark emails with listed URLs as malicious (exact or domain)

Detection Setup > Allow List / Block List > URL Block List

N/A

N/A

 

List of private email addresses of users that are more prone to impersonation attacks

Detection Setup > VIP users

N/A

N/A

 


 Configuration mappings for Proofpoint Essentials

This page includes:

 

About configuration mappings for Proofpoint Essentials

You can use the configuration mappings in the table below to migrate your configuration from Proofpoint Essentials to Perception Point X-Ray.

Configuration mappings

 

 

Setting description

Setting location in Perception Point X-Ray

Setting location in Proofpoint Essentials

Migration steps

 

Do not scan emails from listed IPs

Detection Setup > Allow List / Block List > Sender IP Allow List

Company Settings > Sender Lists

Copy all Exempted IPs from Proofpoint to Perception Point X-Ray.

 

Mark emails, from the listed IPs, as malicious

Detection Setup > Allow List / Block List > Sender IP Block List

Company Settings > Sender Lists

N/A

 

Do not scan emails from listed sender email addresses (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Allow List

Company Settings > Sender Lists

Copy all Exempted email addresses and domains from Proofpoint to Perception Point X-Ray.

 

Mark emails, from listed sender email addresses, as malicious (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Block List

Company Settings > Sender Lists

Copy all email addresses and domains that are marked as Block or Quarantine, in Proofpoint , to Perception Point X-Ray.

 

Do not scan emails to listed recipient email addresses

Detection Setup > Allow List / Block List > Recipient Email Address Allow List

Company Settings > Filters

Copy all Exempted users email addresses from Proofpoint to Perception Point X-Ray.

 

Do not scan listed URLs (exact or domain)

Detection Setup > Allow List / Block List >  URL Allow List

Company Settings > URL Defense

Copy all Ignored URLs from Proofpoint to Perception Point X-Ray.

 

Mark emails with listed URLs as malicious (exact or domain)

Detection Setup > Allow List / Block List > URL Block List

N/A

N/A

 

List of private email addresses of users that are more prone to impersonation attacks

Detection Setup > VIP users

N/A

N/A

 


 Configuration mappings for Trend Micro Email Security [Standard]

This page includes:

 

About configuration mappings for Trend Micro Email Security

You can use the configuration mappings in the table below to migrate your configuration from Trend Micro Email Security to Perception Point X-Ray.

Configuration mappings

 

 

Setting description

Setting location in Perception Point X-Ray

Setting location in Trend Micro Email Security

Migration steps

 

Do not scan emails from listed IPs

Detection Setup > Allow List / Block List > Sender IP Allow List

Inbound Protection > Connection Filtering >  IP Reputation

Copy all IP addresses in Approved IP Address from Trend Micro Email Security to Perception Point X-Ray.

 

Mark emails, from the listed IPs, as malicious

Detection Setup > Allow List / Block List > Sender IP Block List

Inbound Protection > Connection Filtering >  IP Reputation

Copy all IP addresses in Blocked IP Address from Trend Micro Email Security to Perception Point X-Ray.

 

Do not scan emails from listed sender email addresses (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Allow List

Inbound Protection > Connection Filtering > Sender Filter

Copy all email addresses and domains addresses in Approved Senders from Trend Micro Email Security to Perception Point X-Ray.

 

Mark emails, from listed sender email addresses, as malicious (exact or domain)

Detection Setup > Allow List / Block List > Sender Email Address Block List

Inbound Protection > Connection Filtering > Sender Filter

Copy all email addresses and domains addresses in Blocked Senders from Trend Micro Email Security to Perception Point X-Ray.

 

Do not scan emails to listed recipient email addresses

Detection Setup > Allow List / Block List > Recipient Email Address Allow List

Inbound Protection > Policies

Look for rules that allow Users to receive all mails, without any conditions. Copy the addresses of these users to Perception Point X-Ray.

 

Do not scan listed URLs (exact or domain)

Detection Setup > Allow List / Block List >  URL Allow List

Inbound Protection > Administration > Policy Objects

Copy exact URLs and Domains from Web Reputation Approved List to Perception Point X-Ray.

 

Mark emails with listed URLs as malicious (exact or domain)

Detection Setup > Allow List / Block List > URL Block List

N/A

N/A

 

List of private email addresses of users that are more prone to impersonation attacks

Detection Setup > VIP users

Inbound Protection > Spam Filtering > High Profile Users

Copy private email addresses of users in Trend Micro High Profile Users to Perception Point X-Ray.

 


References:

https://docs.perception-point.io/WP/Content/PP/Migrating.htm

Acronis: https://docs.perception-point.io/acronis/Content/PP/Migrating.htm

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article