Headquarters

Send Us An Email


Give us a call

Waypoint Technology Solutions Blog

Waypoint Technology Solutions has been serving the Erie area since 2011, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Doing Enough to Prevent Risk? (Probably Not)

Are You Doing Enough to Prevent Risk? (Probably Not)

There are plenty of risks that today’s businesses regularly deal with, particularly in terms of cybersecurity. This year, a panel of experts shared some human risk management insights at the Cybsafe Impact 2024 USA conference. Let’s review some of the topics they touched on.

0 Comments
Continue reading

How to Create Business Goals Designed for Success

How to Create Business Goals Designed for Success

We all want our businesses to succeed… that’s generally the point of running one. However, this will require you to set the right goals and do so correctly.

Let’s walk through the process you should follow to accomplish this.

0 Comments
Continue reading

So, Your Business Project Failed… How Can You Learn from It?

So, Your Business Project Failed… How Can You Learn from It?

It can be challenging to deal with failure in any context, but in the case of your workplace projects and other efforts, it can be particularly harsh. This makes it all the more important to frame such failures as opportunities to grow in the future.

Let’s discuss six reasons an initiative may fail and the lessons that can be learned from these situations.

0 Comments
Continue reading

Tip of the Week: Creating Google Forms that Auto-Populate Google Sheets

Tip of the Week: Creating Google Forms that Auto-Populate Google Sheets

There are several reasons to use a form to collect data for your business, from customer impressions and service needs to employee feedback about internal matters as a means of collaborative decision-making. The trouble comes when it is time to compile all the responses… unless you know how to use the tools at your disposal.

For this week’s tip, we’re walking through the process of creating a form that self-populates a spreadsheet using Google’s toolkit.

0 Comments
Continue reading

How to Keep Engagement Up (Even in a Remote or Hybrid Workplace)

How to Keep Engagement Up (Even in a Remote or Hybrid Workplace)

Remote and hybrid work models have become more popular than ever, in no small part thanks to the improved technology businesses of all sizes can now access. Nevertheless, this shift has brought new challenges for organizations everywhere. One such challenge is maintaining and enhancing remote workplace engagement—a crucial aspect that directly impacts employee satisfaction, productivity, and retention.

0 Comments
Continue reading

How to Use Technology to Support Your Team’s Wellness

How to Use Technology to Support Your Team’s Wellness

It isn’t easy to be a member of the workforce right now. While we won’t cover them in detail, plenty of stressors—related to and separate from the workplace—can easily impact an employee’s performance. As a result, it is often in your company’s best interest to invest in your team’s well-being, and one way to do this is by implementing and encouraging the use of different technologies.

0 Comments
Continue reading

How an MSP Can Aid in IT Project Management

How an MSP Can Aid in IT Project Management

It’s always an exciting time when you commit to a new IT project that promises to change your organization for the better. Of course, the exciting stuff is what comes after the implementation process—a process that can range from easy-as-pie to incredibly complex and stressful, depending on the expertise your organization employs.

0 Comments
Continue reading

How to Scale a Growing Business (Using Technology to Your Advantage)

How to Scale a Growing Business (Using Technology to Your Advantage)

If you could generate more revenue without spending more, wouldn’t you?

If you share most people's goals and aspirations, the answer is a resounding and enthusiastic “yes.” Scaling a business is an important element of continued success—provided it is carried out correctly. Let’s discuss how you can help ensure your success, partly by implementing the right technology.

0 Comments
Continue reading

How to Make Templates for Google Docs

How to Make Templates for Google Docs

Templates are a handy feature that popular word processing platforms, like Google Docs, offer to help users create specific types of documents. While there are plenty of prebuilt templates available, there’s always the possibility that you have a need that isn’t filled by one of them.

In these cases, you always have the option to build your own. Let’s go over how, and discuss some of the elements and options that your custom Google Docs templates can support.

0 Comments
Continue reading

How-to: Email Security User Guide - Barracuda Threat Protection

Barracuda Email Protection is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks. The Barracuda Email Security Service web interface includes the Message Log from which you can manage your quarantined messages. Additionally, you can set account preferences based on features enabled for your account by the administrator.

 

To access your Email Security user account, log into the Barracuda Email Security Service corresponding to your region:

 

Permissions may include:

  • Modify quarantine notification report settings. Set email receipt frequency with a list of messages in your quarantine account. Once received, you can select whether to delete or deliver these messages to your email address.
  • Create exemption (accept mail from), Block, or quarantine policies for email addresses, domains, and users.
  • Manage quarantine inbox delivery or delete quarantined messages.
  • Change password (manually added users only)
  • Link Accounts. Use the current account as an alias and add additional email addresses in the same domain for which the quarantined email is to be forwarded to this account.

Login IDs

Unless otherwise communicated, your Windows account is synchronized to the Barracuda Email Protection Portal. You will not need to create an account, but in some cases, you may be prompted to verify your Microsoft 365 Credentials. 

Message Log

The Barracuda Email Security Service web interface includes the Message Log, which you can use to manage your quarantined messages.

Quarantined Mail

When enabled, you are notified regularly when you have quarantined messages. Your Waypoint administrator sets the default quarantine notification interval, or if you have permission, you can set the interval on the Settings > Quarantine Notification page.

Please Note that quarantined messages are deleted after 30 days. For more information, see Quarantine Notifications.

The links in the Actions column allow the user to:

  • Deliver – Click to deliver the message to your regular inbox.
  • Allow List – Click to allow the sender. All future messages from the sender are allowed and go directly to the user's regular inbox.
  • Block List – Click to have the sender added to the block list.

Figure 1. Sample Quarantined Email Notification

essQuarantineDigest1.png

Manage Mail

Use the Message Log to manage mail. The Message Log page displays all email messages from the Barracuda Email Security Service to your account. You can filter messages by All, Allowed, UI Delivered, Not Allowed, Blocked, Deferred, or Quarantined using the drop-down menu. Note that messages are deleted after 30 days.

Figure 2. Filter Messages in the Message Log

messageFilterOptions.png

Messages are blocked due to the following:

  • Spam and virus policies set by your administrator for the domain and
  • Your administrator sets email address or domain block policies and emails from other users for the domain. 

Messages are deferred for various reasons. Click the Help icon on the Message Log page for more information and details on searching for and filtering messages.

Select one or more messages from the Message Log page, then click on an action. To select all messages, select the check box at the top of the Message List.

Depending on the message filter, once you select one or more messages, you can take the following actions:

  • Allow List – Senders of selected messages are added to the allow List; note that you cannot add blocked messages to the allow List.
  • Recategorize – You can change the category when one or more categorized emails are selected. For example, if the message is categorized as Corporate but should be categorized as Marketing Materials, you can change the category via the Recategorize drop-down. This action submits this email message for recategorization to your selected category. If you select Other and enter a custom category, the category updates for that particular email message. For more information, see Email Categorization below.
  • Export – Selected messages are exported to a CSV file. When prompted, enter a file name and select whether to save to your local desktop or network.
  • Deliver – The service attempts to deliver the selected messages to your mailbox; note that you cannot deliver messages blocked for Advanced Threat Protection (ATP). If a message is successfully delivered, the Delivery Status changes to Delivered. The mail remains in the log until you select the message and click Delete. A notice will be displayed in your browser window if the mail cannot be delivered, and the Delivery Status will not change. If messages are not delivered to the recipient's mailbox, it may be due to a filter on the mail server or a service on your network catching the mail as spam. Check with your system administrator for more information. Additionally, check your local trash/spam folder for the mail.

Figure 3. Message Actions

messageActions.png

Email Categorization

If the Reason for a message in your Message Log displays as Email Categorization, the email from this sender is categorized as not necessarily spam but something that you may have subscribed to at one time but no longer want to receive—for example, newsletters and memberships, or marketing information. Email Categorization assigns some of these emails to specific categories, which the administrator can decide to allow, Block, or quarantine. Supported categories display in the Message Log Reason field as:

  • Email Categorization (corporate) – Emails sent by a user at an authenticated organization from an MS Exchange Server that involves general corporate communications. Does not include marketing newsletters.
  • Email Categorization (transactional) – Emails related to order confirmations, bills, invoices, bank statements, delivery/shipping notices, and service-related surveys.
  • Email Categorization (marketing) – Promotional emails from companies such as Constant Contact.
  • Email Categorization (mailing lists) – Emails from mailing lists, newsgroups, and other subscription-based services such as Google and Yahoo! Groups.
  • Email Categorization (social media) – Notifications and other emails from social media sites like Facebook and LinkedIn.

View Message

To view the message source, headers, and available options, double-click the message; the message content will be displayed. You can take the following actions:

  • Click Source to view all headers
  • Click Allow List to allow the sender
  • Click Block and select whether to block the message Domain or Email
  • Click Download to download the message to your local system or network
  • Click Deliver to deliver the message to your regular mailbox
  • Click Delete to remove the message. (This option is available for quarantined messages only.)
  • Click Report as Incorrectly Blocked for a message that should have been delivered to your regular mailbox. This includes messages that are not spam. (This option is available for quarantined and blocked messages only.)
  • Click Report as Incorrectly Delivered for a message that should have been blocked. This includes spam messages.

Alternatively, you can use the Settings > Sender Policy page to exempt or block senders. See Set Exempt and Block List Policies later in this article for additional information.


Figure 4. Message Source with Headers

Source_Details.png

Set Quarantine Notification Interval

Quarantined messages are deleted after 30 days.

You can direct the Email Security Service to notify you by email when you have quarantined messages. When set to Yes, messages that would usually be blocked are instead quarantined. This setting does not apply to messages blocked by Sender or Content policies. On the Settings > Quarantine Notification page, select Scheduled. Click and drag in the Schedule notification intervals section to set the day and time for quarantine notification email delivery. Click to clear a selection. Alternatively, select Never if you do not want to receive quarantine notifications. Click  Save Changes to save your settings.

Figure 5. Set Quarantine Notification Interval

User_Quarantine_Notification.png

Set Exempt and Block List Policies

Use the Sender Policy page to specify whether to block, allow, or quarantine messages from a specific sender or domain. These are called exempt/block list policies. To create a new policy:

  1. Go to Settings > Sender Policy page, and enter the email address or domain in the Sender field.
  2. Select whether to BlockExempt, or Quarantine the sender from the Policy drop-down menu.
  3. Optionally, you can add a comment to indicate why you created the policy.
  4. Click Add to save the policy:
    Sender_Policies.png
  5. To remove a policy, click Remove in the Actions column for the sender policy you want to remove.

ink Quarantine Accounts

You can add additional email addresses in the same domain for which the quarantined email will be forwarded to this account. From the Settings> Linked Accounts page, enter the email address in the Account field, select whether to Link the account without verification and click Add

Tags:
0 Comments
Continue reading

How-to: Send Encrypted Messages with Barracuda Add-in

Send Encrypted Messages

Encrypt outbound messages for secure message transmission. 

This feature is only for use with the Barracuda Email Threat Protection platform.

To encrypt an outbound message:

  1. Log into Outlook or OWA, and select to create, forward, or reply to a message. The compose message pane opens.
  2. Click the Encrypt Message Add-In

    Encrypt_Msg.png

  3. The Encryption Window will display. (By default, Encryption is off) 

  4. add-in-encryption-off.png

  5. Click to toggle Encryption to on. The encryption attachment is added to your message.

    Do not delete the attachment. If deleted, the message will not be encrypted.

    add-in-encryption-on.png

  6. Complete and send the message.

Tags:
0 Comments
Continue reading

How-to: Use Barracuda Email Protection Add-In

In this article, you will learn how to use the Barracuda Email Protection Add-In to  block emails, mark them as unwanted spam, 

NOTE:

The Microsoft 365 authorization pop-up may temporarily appear after you take action with the Add-In. This briefly confirms your credentials and then disappears. There is nothing you need to do.


ir-authorizing.png

 

How to Handle Reported Email

Once a message has been reported as suspicious, it will be sent for further analysis and moved out of the Inbox to a selected folder. To determine which folder you prefer:

  1. Log into Outlook or OWA and select a message. The read message pane opens.
  2. Click the Barracuda Email Protection Add-In at the top of the window to open the actions panel.
    add-in-on-menu-bar.png
  3. The Report Email screen is displayed.
    add-in-report-email.png
  4. Click More at the bottom and select Settings.
    add-in-settings.png
  5. Click on Move email and select the account folder that will receive reported messages (i.e. Deleted ItemsJunk Email, a custom folder, etc.)

Report Suspicious Email

Report emails as suspicious and send to Barracuda Networks for further analysis.

  1. Log into Outlook or OWA, and select a message you want to report. The read message pane opens.
  2. Click the Barracuda Email Protection Add-In at the top of the window to open the add-in's actions panel.

    add-in-report-email.png
  3. Click the Report email button and select the reason that best describes the email.

    add-in-select-reason.png
  4. Click the Submit button.

    add-in-reported-success.png

0 Comments
Continue reading

4 Ways a Managed Service Provider Can Help Your Business

msps_help_businesses

How much does your business rely on technology to keep your organization running forward? As business technology becomes more complex, it’s becoming increasingly popular for organizations to have their own internal IT departments to manage and maintain it. Yet, small businesses don’t often have the necessary funds for such a feat. How can your company afford quality IT service? You can start by pursuing managed IT solutions from a managed service provider.

0 Comments
Continue reading

Customer Login

News & Updates

Waypoint Technology Solutions is proud to announce the launch of our new website at www.thinkwaypoint.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Waypoint Technology Solutions can do for your business.


Mailing Address:
Waypoint Technology Solutions
1892 Bell Drive
Erie, Colorado 80516