Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Resolving Video Freezing Issues in Microsoft Teams with Avid Huddle

    Overview When using Avid Huddle integrated with Microsoft Teams for video review sessions, users may experience video freezing issues. This can occur due to improper configuration of network traffic r...

  • Resolving Website Access Issues in Kerio Control Due to Content Filter Rules

    Overview When using Kerio Control, you may encounter issues where legitimate websites are blocked due to content filter rules. This can result in an Access Denied banner appearing for users.  The issu...

  • Watchdog Features in Kerio Control

    Overview Kerio Control has recently gained a new Watchdog feature in the latest version 9.4.5. The Watchdog monitors all key services of GFI KerioControl, and in case of any irregularities, it restore...

  • Setting Access Rights in Kerio Control

    Overview This article provides the required steps to configure access rights in Kerio Control. This procedure is helpful for administrators when implementing the access right access scheme within Keri...

  • Blocking Unwanted Sites in Kerio Control

    Overview If you have a Kerio Control Web Filter license, you can block unwanted sites like Facebook or other social media with the Application awareness. Step by step guide In this article, we will us...

  • Configuring Protocol Inspection

    Overview To apply a protocol inspector explicitly to other traffic, administrators must edit or add a new service where this inspector is to be used. This article provides information to configure Pro...

  • Configuring Dynamic DNS

    Overview DDNS is a service providing the automatic update of the IP address in the DNS record for the particular hostname. Kerio Control allows configuring Dynamic DNS for 3 different providers, such ...

  • Configuring Parameter 66 in DHCP Server

    Overview The DHCP protocol assigns IP addresses. Apart from these addresses, you can also send additional parameters via the DHCP protocol. Parameter 66 configures the TFTP server address.   Back to t...

  • Configuring Protocol-Specific Intrusions

    Overview Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rules are focused on special protocols on standard and frequently used ports. If an ...

  • Configuring connection limits in Kerio Control

    Overview Limiting the number of TCP and UDP connections within your network helps protect your business against denial of service (DoS) attacks. You can set connection limits based on: A source IP add...