About migrating your email configurations
You can export allowlists, blocklists, and VIP lists from your current email security solution, and then send them to PP or Acronis Support to import them into Perception Point X-Ray.
Migrating from specific solutions
You can use the configuration mappings that are included in the links below to migrate your configuration from Barracuda Essentials, Proofpoint Essentials, or Trend Micro Email Security [Standard] to Perception Point X-Ray.
Configuration mappings for Barracuda Essentials
This page includes:
About configuration mappings for Barracuda Essentials
You can use the configuration mappings in the table below to migrate your configuration from Barracuda Essentials to Perception Point X-Ray.
Configuration mappings
| Setting description | Setting location in Perception Point X-Ray | Setting location in Barracuda Essentials | Migration steps |
| Do not scan emails from listed IPs | Detection Setup > Allow List / Block List > Sender IP Allow List | Inbound Settings > IP Address Policies | Copy all Exempted IPs from Barracuda to Perception Point X-Ray. |
| Mark emails, from the listed IPs, as malicious | Detection Setup > Allow List / Block List > Sender IP Block List | N/A | N/A |
| Do not scan emails from listed sender email addresses (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Allow List | Inbound Settings > Sender Policies | Copy all Exempted email addresses and domains from Barracuda to Perception Point X-Ray. |
| Mark emails, from listed sender email addresses, as malicious (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Block List | Inbound Settings > Sender Policies | Copy all email addresses and domains that are marked as Block or Quarantine, in Barracuda, to Perception Point X-Ray. |
| Do not scan emails to listed recipient email addresses | Detection Setup > Allow List / Block List > Recipient Email Address Allow List | Inbound Settings > Recipient Policies | Copy all Exempted users email addresses from Barracuda to Perception Point X-Ray. |
| Do not scan listed URLs (exact or domain) | Settings > Detection tab > URL Allow List | Inbound Settings > Intent Domain Policies | Copy all Ignored URLs from Barracuda to Perception Point X-Ray. |
| Mark emails with listed URLs as malicious (exact or domain) | Detection Setup > Allow List / Block List > URL Block List | N/A | N/A |
| List of private email addresses of users that are more prone to impersonation attacks | Detection Setup > VIP users | N/A | N/A |
Configuration mappings for Proofpoint Essentials
This page includes:
About configuration mappings for Proofpoint Essentials
You can use the configuration mappings in the table below to migrate your configuration from Proofpoint Essentials to Perception Point X-Ray.
Configuration mappings
| Setting description | Setting location in Perception Point X-Ray | Setting location in Proofpoint Essentials | Migration steps |
| Do not scan emails from listed IPs | Detection Setup > Allow List / Block List > Sender IP Allow List | Company Settings > Sender Lists | Copy all Exempted IPs from Proofpoint to Perception Point X-Ray. |
| Mark emails, from the listed IPs, as malicious | Detection Setup > Allow List / Block List > Sender IP Block List | Company Settings > Sender Lists | N/A |
| Do not scan emails from listed sender email addresses (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Allow List | Company Settings > Sender Lists | Copy all Exempted email addresses and domains from Proofpoint to Perception Point X-Ray. |
| Mark emails, from listed sender email addresses, as malicious (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Block List | Company Settings > Sender Lists | Copy all email addresses and domains that are marked as Block or Quarantine, in Proofpoint , to Perception Point X-Ray. |
| Do not scan emails to listed recipient email addresses | Detection Setup > Allow List / Block List > Recipient Email Address Allow List | Company Settings > Filters | Copy all Exempted users email addresses from Proofpoint to Perception Point X-Ray. |
| Do not scan listed URLs (exact or domain) | Detection Setup > Allow List / Block List > URL Allow List | Company Settings > URL Defense | Copy all Ignored URLs from Proofpoint to Perception Point X-Ray. |
| Mark emails with listed URLs as malicious (exact or domain) | Detection Setup > Allow List / Block List > URL Block List | N/A | N/A |
| List of private email addresses of users that are more prone to impersonation attacks | Detection Setup > VIP users | N/A | N/A |
Configuration mappings for Trend Micro Email Security [Standard]
This page includes:
About configuration mappings for Trend Micro Email Security
You can use the configuration mappings in the table below to migrate your configuration from Trend Micro Email Security to Perception Point X-Ray.
Configuration mappings
| Setting description | Setting location in Perception Point X-Ray | Setting location in Trend Micro Email Security | Migration steps |
| Do not scan emails from listed IPs | Detection Setup > Allow List / Block List > Sender IP Allow List | Inbound Protection > Connection Filtering > IP Reputation | Copy all IP addresses in Approved IP Address from Trend Micro Email Security to Perception Point X-Ray. |
| Mark emails, from the listed IPs, as malicious | Detection Setup > Allow List / Block List > Sender IP Block List | Inbound Protection > Connection Filtering > IP Reputation | Copy all IP addresses in Blocked IP Address from Trend Micro Email Security to Perception Point X-Ray. |
| Do not scan emails from listed sender email addresses (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Allow List | Inbound Protection > Connection Filtering > Sender Filter | Copy all email addresses and domains addresses in Approved Senders from Trend Micro Email Security to Perception Point X-Ray. |
| Mark emails, from listed sender email addresses, as malicious (exact or domain) | Detection Setup > Allow List / Block List > Sender Email Address Block List | Inbound Protection > Connection Filtering > Sender Filter | Copy all email addresses and domains addresses in Blocked Senders from Trend Micro Email Security to Perception Point X-Ray. |
| Do not scan emails to listed recipient email addresses | Detection Setup > Allow List / Block List > Recipient Email Address Allow List | Inbound Protection > Policies | Look for rules that allow Users to receive all mails, without any conditions. Copy the addresses of these users to Perception Point X-Ray. |
| Do not scan listed URLs (exact or domain) | Detection Setup > Allow List / Block List > URL Allow List | Inbound Protection > Administration > Policy Objects | Copy exact URLs and Domains from Web Reputation Approved List to Perception Point X-Ray. |
| Mark emails with listed URLs as malicious (exact or domain) | Detection Setup > Allow List / Block List > URL Block List | N/A | N/A |
| List of private email addresses of users that are more prone to impersonation attacks | Detection Setup > VIP users | Inbound Protection > Spam Filtering > High Profile Users | Copy private email addresses of users in Trend Micro High Profile Users to Perception Point X-Ray. |
References:
https://docs.perception-point.io/WP/Content/PP/Migrating.htm
Acronis: https://docs.perception-point.io/acronis/Content/PP/Migrating.htm
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article