Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Defining User Quotas

    Overview Kerio Control allows configuring a limit for the volume of data a user is allowed to transfer. Furthermore, Kerio Control allows defining what happens once the quota is exceeded.  To define u...

  • Deny traffic to a particular user in Kerio Control

    Overview Traffic policy in Kerio Control consists of rules that are ordered by priority. Rules found at the top being are considered with high priority and are processed/applied first. In the default ...

  • Disabling 2-Step Verification in Kerio Control Statistics

    Overview If you lose your mobile device, ask your system administrator to disable the 2-step verification for you. If your administrator sets the 2-step verification as compulsory, you must enable it ...

  • Exclude Specific Users from SafeSearch in Kerio Control

    Overview Users can have problems with SafeSearch enabled. For example, SafeSearch can block an important web page with harmless content. If this happens, there is a way to exclude users from the SafeS...

  • Filtering HTTPS Connections

    Overview Kerio Control decrypts and filters HTTPS (Hyper Text Transfer Protocol Secure) connections. Filtering is the same as for the HTTP (Hyper Text Transfer Protocol). Kerio Control can apply the s...

  • Kerio Control System Alerts

    Overview All system alert messages are recorded in the Alert log. The Alert log provides a complete history of system alerts generated by Kerio Control: virus detection, dialing and hanging up, reache...

  • Modifying Static Routes In Routing Tables

    Overview Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic. Depending on the number of networ...

  • Configuring the Protocol Inspection Feature

    Overview Kerio Control includes protocol inspectors, which monitor all traffic on application protocols, such as HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol). The inspectors fil...

  • Connection Limits for Excluded IP Address Groups in Kerio Control

    Overview Limiting the number of TCP and UDP connections within your network in Kerio Control has its benefits. For instance, it helps protect your business against DoS (denial of service) attacks. How...

  • Creating Service Groups in Kerio Control

    Overview Services are defined by a communication protocol and by a port number (e.g. the HTTP service uses the TCP protocol with the port number 80). You can create groups of services that simplify cr...