Searching for Emails Using Barracuda Archive Tools

There are four options for searching for emails using Barracuda Archive Tools.

Barracuda Plugin for Outlook

Note: This option is not available for Office 365 Webmail. Please use one of the other options below.

  1. In the Outlook client, select the Home tab and look for the Barracuda Networks section in the upper right hand corner of the screen.
    outlook toolbar
  2. Choose Search Archive. The first time you do this, a login box will appear. If prompted for the URI, enter Use your email credentials to log in.
    barracuda message archiver setup
  3. The Search box will appear. Use the available options to search for the email you are looking for.
    barracuda message archiver search

You can search your archived mail by criteria you choose, such as text, dates, folder locations, and so on. For example, to deal with the scheduled removal of the domain, you would locate the senders who are still using your old email address by searching for as shown above. The search output window would display all email received after January 1, 2009 containing that text.

To search in specific folders, you would use the In: drop down menu and select “Folders”. You will then see a box to choose the folder you wish to search in.

Barracuda Standalone Tool

  1. In Windows, click the Start button, choose All Programs and then Barracuda Message Archiver Search.
  2. You will get the same login and search window as in the section above. Enter your search parameters as before.

Barracuda Archiver Web Interface

  1. To access the Barracuda Archiver Web interface, go to
  2. Log in with your Virginia Western username and password. Once logged in, you will see the message list window.
    barracuda web interface
  3. Enter your Search criteria and click Search. The Advanced option will let you search with multiple criteria and specify folders to search in.

Barracuda Archiver Smartphone App

  1. Go to your iOS or Android app store and search for Barracuda Archive and download the app.
  2. Configure the app by setting the Host to and using your Virginia Western email and password to log in.
    barracuda mobile setup
  3. Click the Search Icon (barracuda search icon) in the top right corner to open the search window. You can search the archive by keyword, to, from, and date range.
    Barracuda Mobile search filter

Tips for Reducing Spam

Follow these guidelines to lower your risk of receiving junk email!

  1. Take advantage of the Junk Email Filter in Outlook and Office 365 Webmail. Outlook and Office 365 webmail help mitigate the problem of spam by providing a Junk Email filter, which automatically evaluates incoming messages and sends those identified as spam to the Junk Email folder.
  2. Block pictures in HTML messages that spammers use as Web beacons. Outlook has an additional anti-spam feature. By default, this feature blocks automatic picture downloads and other external content in messages if the content is linked to another server. When this feature is turned off, if you open a message that has external content, that content downloads automatically, inadvertently verifying to the sender that your email address is valid. Your email address can then be sold to a spammer. You can unblock external content for messages that come from sources you trust.
  3. Turn off read and delivery receipts and automatic processing of meeting requests. Spammers sometimes resort to sending meeting requests and messages that include requests for read and delivery receipts. Responding to such meeting requests and read receipts might help spammers verify your email address. You can turn off tracking by:
    1. On the File menu, click Options.
    2. Click Mail, and then scroll down to the Tracking section.
    3. Uncheck any options you no longer wish to use.
  4. Limit the places where you post your email address. Be cautious about posting your email address on public web sites, such as newsgroups, chat rooms, bulletin boards, and so forth. When visiting public sites, you might want to use an email address that is different than your main email address. Whenever you list or link to your email address, you increase your chances of being spammed. Emails addresses on the VWCC website are masked in a way to prevent them being harvested by spammers.
  5. Review the privacy policies of web sites. When you sign up for online banking, shopping, or newsletters, review the privacy policy of the site carefully before you reveal your email address or other personal information. Look for a link or section (usually at the bottom of the web site’s home page) called “Privacy Policy”, “Privacy Statement”, “Terms and Conditions”, or “Terms of Use”. If the web site does not explain how your personal information will be used, consider not using the services at that site.
  6. Watch out for check boxes that are already selected. When you shop online, companies sometimes add a check box that is already selected, which indicates that it is fine with you if the company sells or gives your email address to other businesses (or “third parties). Clear this check box so that your email address is not shared.
  7. Don’t reply to spam. Never replay to an email message — even to subscribe from a mailing list — unless you know and trust the sender. For example, if the email address comes from a service, online store, or newsletter that you know you have signed up with. Answering spam just confirms to the spammer that your email address is an active one.
  8. If a company uses email messages to ask for personal information, don’t respond by sending a message. Most legitimate companies will not ask for personal information to be sent in an email. Be suspicious if they do. Such a request could be a spoofed email message disguised to look like a legitimate one. This tactic is known as phishing. If the possible spam appears to be sent by a company that you do business with — for example, your credit card company — then call the company to verify that they sent it (not using a phone number provided in the email). If the request is a legitimate one, the company’s customer service representative should be able to assist you. The Junk Email filter also includes phishing protection to help identify and disable suspicious messages.
  9. Don’t contribute to a charity in response to a request sent in email. Unfortunately, some spammers prey on your good will. If you receive an email appeal from a charity, treat it as spam. If the charity is one you want to support, locate their telephone number or web site to find out how you can make a contribution.
  10. Don’t forward chain email messages. Besides increasing overall email volume, forwarding a chain email message might be furthering a hoax — and meanwhile, you lose control over who sees your email address.

Security Access Termination

In order to comply with VCCS security audit procedures, all terminated employees that had access to the college’s information systems (including email) must be removed within 24 hours after termination. Departments/divisions that have terminated a faculty or classified staff’s employment must complete a Deletion SARF and then notify Human Resources immediately.

The Deletion SARF can be found on VWConnect (on-campus or virtual desktop access only), under links on the right side of the screen. If you believe you should have access but do not see the link, please contact the Help Desk.

Security Access Request Form (SARF)

The SARF is the college’s Security Access Request Form. This form is used to request computer and phone access for employees.

The following systems can be accessed by completing a SARF:

  • Faculty/Staff Email
  • VWCC Network
  • D-list accounts
  • Shared email accounts
  • Phone access
  • Peoplesoft/Student Information System (faculty and administrative)
  • AIS
  • Pcard
  • eVA
  • WES

When should the SARF be completed?

The SARF can take a few days to process depending on what access has been requested. A week beforehand is generally early enough to have most access set up by the time the employee begins work. Some access can only be set up once the employee’s start date has arrived. Please remember that Security Awareness Training will need to be completed 30 days within their account being set up, so it is not advised to request an account too early.

Where is the SARF located?

A link to the SARF can be found on VWConnect (on-campus or virtual desktop access only) on the right side of the page. If you believe you should have access but do not see the link, please contact the Help Desk.

Hints for Completion

  • Include as much of the employee’s information at the top of the form as possible. This information is used to populate the college’s online directory, so it should be accurate.
  • The SARF can be submitted without the EmplID if it is not known.
  • If an employee needs their own phone number and voicemail, make sure you click Yes for “Phone access needed?” and that “Voicemail is needed” is selected.
  • Do not select anything in the D-list email account list for a new employee. Secondary accounts are only allowed for existing employees.
  • When the SARF is submitted, make sure you do not have any errors. Errors are highlighted in red and the SARF will not be submitted successfully until all issues are resolved.
  • The Supervisor’s Name at the bottom of the SARF should not be the same as the name submitted at the top of the SARF.

Contact the Help Desk if you have specific questions about the form or access being given.

Setting Up Access for a New Employee

This guide is to be used by supervisors to set up a new employee with network access.

Does the new employee’s office have a computer and phone?

If Yes: If the room already has a computer and phone then you should complete a SARF (see below) so that access setup can begin.

If No: If there is not a computer and phone in the office, you should still complete a SARF (see below) but after completion you also need to contact the Help Desk and request a ticket be opened for a computer and phone install. Please inform the Help Desk that you have completed a SARF.

What is a SARF and how do I complete it?

The SARF is the college’s Security Access Request Form. This form is used to request computer and phone access for employees. For more information about the SARF, please refer to Security Access Request Form (SARF).

How do I know when my new employee’s access has been set up?

A “Welcome Email” will be sent to the employee’s VWCC email account along with a copy to the supervisor. As the supervisor, you should provide the employee with a copy of the email to assist in accessing their new accounts.

What is the K: drive and how does my employee get access?

The K: drive is a network drive that is available when using academic computers located in labs and classrooms. It allows both students and instructors to see the files without having access to edit them.

In order to access the K: drive, a user must log in to their administrative account. Contact the Help Desk if a folder needs to be created.

Is there any training for new employees?

Online New Employee Information Technology Orientation

IET has an online orientation available for new employees. The orientation can be accessed here. Please let the Help Desk know when orientation has been completed.

Security Awareness Training

As part of the Commonwealth of Virginia information security standards, employees are required to complete Security Awareness Training within 30 days of receiving their welcome email. Additional information can be found on our Security Awareness Training page.

How does my employee get access to a Virtual Desktop?

All faculty and staff have access to a virtual desktop. Using a virtual desktop allows access to VWCC cloud services such as mapped drives, printer access and VWConnect from anywhere. A virtual desktop can be accessed via a variety of end users devices, such as a thin client computer, desktop computer, iPad, iPhone, or other mobile devices. All VWCC owned computers have the hosted desktop VMWare View Client installed on them. For more information, refer to our Virtual Desktop page.

Clearing the Auto-Complete Email Address Cache in Outlook

Outlook has an automatic completion list for any email address that you try to type into the To or CC fields. This feature does not pull from the contacts or address book, because you may have tried to email somebody that isn’t in your contact list.

The problem arises when you put in a bad address, and then every time you go to type in the email address, the incorrect one appears in the auto-complete list.

To remove an email address from your auto-complete list:

  1. In the To: or CC: field, begin typing in the address that shows up incorrectly.
  2. A list of email addresses that match what you have typed will appear in a dropdown list below the field.
  3. Click the X next to the address you wish to delete.

How to Classify Quarantined Email Messages

If you receive a Spam Quarantine Summary email from Barracuda, follow the directions below to decide if you want to Deliver, Delete, Whitelist, Classify as Spam, etc.

  • Deliver: Delivers the selected message to your standard email box. Note: If you want to classify a message or add it to your whitelist, make sure to do so before delivering the message to your inbox. Once the Barracuda Spam firewall delivers a message, it is removed from your quarantine list.
  • Whitelist: Adds the selected message to your whitelist, so all future emails from this sender are not quarantined unless the message contains a virus or banned attachment type. The Barracuda Spam Firewall adds the sending email address exactly as it appears in the message to your personal whitelist.
  • Whitelist/Not Spam: Performs the functions of both Whitelist and Classify as Not Spam at the same time.
  • Delete: Deletes the selected message from your quarantine list. The main reason to delete messages is to help you keep track of which quarantine messages you have reviewed.
  • Classify as Spam: Classifies the selected message as spam.
  • Classify as Not Spam: Classifies the selected message as not spam. Note: Some bulk commercial email may be considered useful by some users and spam by others. Instead of classifying bulk commercial email, it may be more effective to add it to your whitelist (if you wish to receive such messages) or blacklist (if you prefer not to receive them).

When you receive a Spam Quarantine Summary email from Barracuda:

  1. If you would like to just delete all the messages, click the DELETE ALL DISPLAYED EMAILS link in the email. This will open a browser window, where the messages will be deleted.
  2. If you wish to more thoroughly classify the messages or inspect them further, click the View your entire Quarantine Inbox or manage your preferences link at the bottom of your email.
  3. Use the checkboxes next to each message or the links (Deliver, Whitelist, Delete) following each message to classify each message. You can use the checkboxes to select more than one message at a time.
  4. When you are finished, click the Log Off link in the upper right corner.

You will receive an email from Barracuda whenever you have messages that have been quarantined.

Please contact the Help Desk if you have any questions.

Virtual Machines/Hosted Desktops

In addition to physical desktops and laptops, the college offers virtual machines/hosted desktops through our private cloud.

Jump to: 

About Virtual Machines/Hosted Desktops

What is a virtual machine?

A virtual machine is a Windows computer, just like a dedicated laptop or desktop, but it is running on a shared hardware platform. This “computer” is actually located in the college data center, hosted on a cluster of servers.

What benefits come from using a virtual machine?

When you access your virtual machine, you are technically connecting to a computer that is internal to the college network. The enhanced security measures in place on the virtual machine offer better protection from malware and other security risks. Virtual machines are expendable and facilitate quick recovery if there is any issue in the computer. If there is a problem, it can be replaced quickly without an office visit from a technician. There is no physical PC hardware to fail in the office. The biggest benefit is Access Anywhere!

What is Access Anywhere?

As long as you have a device with access to the internet and that is: capable of running a web browser; a thin client; or a PC with the VMWare Horizon Client installed, you can access your virtual machine. Excellent performance is available with the lowest cost cable and DSL options as well as MiFi hotspots. There is no need to worry about security when connecting from an open wifi network like that provided at a conference, hotel, or other convenience location, as the connection back to the college is fully encrypted and secured using SSL.

Why does the college use virtual desktops?

There are several reasons why virtual desktops are used at VWCC. Management of the large group of computers needed by the campus community is more efficient using the virtual desktop system. Pooled resources are available to the user community as a whole, facilitating sharing of resources. Improved security, faster problem resolution, energy efficiency, flexibility and audit compliance are all factors in the decision to use virtual systems. Office relocations are able to be done without moving computer equipment. The ability to access the hosted desktop from anywhere on or off campus allows end user mobility with minimal expenditure of resources. Another key benefit is that the virtual systems have a small carbon footprint and generate minimal eWaste demonstrating the college’s regard for the environment. Since there is no actual data residing on the thin client and it is not functional without connection to the college network, theft and data security are not concerns. Access to multiple virtual machines can be provided to facilitate transition from one version of Windows to another.

What is the benefit of connecting at home?

By connecting to your virtual machine from home, you will have access to all resources internal to VWCC. The desktop is the same as the one you use every day. All applications, documents, and your recent work history are all in that machine. You can simply disconnect at work, leaving the machine where you were working, go home, and resume at the same place where you left off. Disconnect from home and when you return to work, the machine is right where you left off. For those with older, lower powered computers, remote access to a powerful virtual machine eliminates the need to upgrade. The browser or Horizon Client provides remote control over the virtual machine in the same manner as the thin client.

Note: This option is only available for exempt personnel unless specifically approved through your supervisor and Human Resources.

How much disk space does a virtual machine have?

Virtual machines are configured with 60GB of hard drive space for the C: drive. This can be increased if needed. Note: Best practice is to store important data on network drives or in My Documents, which is redirected to a network location. Storing data on the local drive creates multiple problems and is not supported.

How to Access Your Virtual Machine

Your virtual machine can be accessed from any thin client on campus, a VWCC desktop or laptop PC, from home via web browser on another computer, or by using the VMWare Horizon Client on another computer (even a Mac!). The virtual PC actually works like an application when it is accessed from another computer, and can be minimized like any other application. It can also be accessed from an Android tablet, iPad, or phone (though it may be cumbersome due to the screen size). Special keys and tools allow replication of the mouse on devices that don’t have one.

How to Access Your Virtual Desktop on campus

How to Access Your Virtual Desktop from Off-Campus

What is a thin client?

A thin client is a device that provides a remote connection to the virtual desktop. The device is designed to communicate with the virtual computer using specialized protocols that make the thin client appear to be a fully functional computer. In the vast majority of cases, thin clients meet the needs of information work tasks, saving the college money and reducing energy costs as well as eWaste.

Is a thin client slower than a regular computer?

A thin client is not a computer, but a device that remotely accesses the virtual machine so speed is not comparable. A standard template is used to build a machine for a typical knowledge worker using Office applications, web browsing, and email. Performance problems are not typical and should be reported to the Help Desk for analysis. In some cases, the virtual machine needs to be given more resources to match the applications in use by the system user.

Using & Troubleshooting Your Virtual Machine

On Mondays, my virtual machine always has to boot up. Why?

Each weekend, all virtual machines are shut down and restarted. This sets them up to get updates and forces a complete login process, which is used to deliver configuration changes.

Why does it take a long time for a virtual machine to boot up?

The virtual desktop boots like any other desktop. The typical boot time is under 2 minutes for Windows 7 machines. Physical machines have a comparable boot time. The virtual desktop does not need to be shut down every day. Powering all the virtual machines in the system all the time takes resources, so the option to boot them up was chosen to conserve power when the machines are not in use.

Note: To avoid having to boot up each morning, simply disconnect rather than shut down at the end of the day.

Can I use a USB stick on a virtual machine?

Yes, you can. On a thin client this is natively supported as it would be on any PC. Virtual machines will connect to the USB stick or any USB device. Note: If you are accessing a virtual machine from home, formatting the stick with the FAT32 filesystem will make it work faster.

Are the drive mappings the same on a virtual PC, laptop, and full desktop?

Drives are mapped based on user id and department as well as participation in special collaboration groups. Open Windows Explorer or My Computer and review your drive mappings. You will see your normal drive configuration as well as additional drives that appear with a number in the description (the ID number of your campus workstation, or some other nomenclature if accessing from a home PC). The local computer name is attached to the drive description to show you where the drive resides. As you look at the drives and explore the content, you will be able to see the additional resources that are available.

What is the recommended way to end a virtual session?

  • Disconnect and log off each day — this closes all files in an orderly fashion.
  • If you use the virtual machine frequently (daily Monday to Thursday) you may also disconnect. It will be ready to go when you sign back in without a reboot. It is recommended that you save files in any open application such as Excel or Word to make sure you saved your work.
  • On Friday, disconnect and log off or shut down.

Can I use my thin client to charge my phone?

Technically, yes. Practically, this is not recommended. The thin client is a computing device designed to consume a low amount of power. It was not designed to be a phone charger. Charging high power consumption devices or using a USB hub to plug multiple devices into the unit will create an under voltage problem on the thin client.

I have used a dual monitor configuration before, can I use 2 monitors on a thin client?

Yes, you can. Dual monitors are available for thin clients.

When I do a CTRL-ALT-DEL while in the hosted desktop connected from a PC or laptop, it prompts me to use CTRL-ALT-INS instead. Why?

This only happens when you use the VMWare Horizon Client on a PC to access your virtual machine.  This does not happen on a thin client. The virtual machine uses CTRL-ALT-INS instead of CTRL-ALT-DEL to distinguish between what this key combination does in each computer. It is cumbersome and a bit confusing, but using the incorrect combination results in a prompt telling the user what to do, so there is no problem if the wrong sequence is entered.

If I have question about using a virtual machine or have an issue with my present configuration, what do I do?

Open a work request with IET through the Help Desk. An analyst will be happy to work with you to obtain a solution.

Network Access

All computers at Virginia Western are connected to the college Local Area Network. The network consists of wired and wireless connections. Users are placed into various network segments based on their identity and connection method, wired or wireless. Security mechanisms are in place to provide access to internal and external resources based on the rule of least privilege, which means that users are subdivided into security zones that prevent their computers from accessing resources that do not pertain to their specific needs.

Additional Information