Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Configuring Automatic User Authentication Using NTLM

    Overview Kerio Control supports automatic user authentication by the NTLM method (NT LAN Manager authentication from web browsers). Once authenticated for the domain, users do not need to enter their ...

  • Configuring Bandwidth Rules for User Exceeded Quotas

    Overview Kerio Control enables administrators to limit the data/internet that users can use. Furthermore, using Bandwidth Management in Kerio Control, it is possible to define what happens when that l...

  • Configuring IP Address Groups in Kerio Control

    Overview IP addresses are identifiers assigned to devices connected to a TCP/IP Network. Kerio Control uses predefined IP address groups in other configuration dialogs such as the traffic and URL rule...

  • Configuring SNORT to Reduce Memory Consumption in Kerio Control

    Overview You can modify the SNORT configuration to reduce its pre-allocated memory for Kerio Control to run with more RAM available; this article provides the steps required to configure SNORT for thi...

  • Configuring Universal Plug-and-Play

    Overview Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, and Internet gateways, amongst others, to seamlessly disc...

  • Configuring Automatic User Logout Timeout in Kerio Control

    Overview Kerio Control is configured by default to log out authenticated users automatically after 120 minutes of inactivity. You can disable or adjust the timeout. This article details the steps requ...

  • Creating Certificates Signed by Certification Authorities (CA) in Kerio Control

    Overview Using the certificate means that administrators have to select it in the specific settings, e.g.,  for SSL certificates for the VPN server, administrators need to select them by going to Inte...

  • Defining Individual Scopes in Kerio Control

    Overview Kerio Control enables the administrator to define only one scope within each subnet. You can create exclusions from this scope by setting individual ranges, e.g., for a group of servers with ...

  • Extracting Kerio Control Debug Logs

    Overview Logs are required every time we need a root-cause/deep-dive analysis on a reported issue. This article provides the guidelines for extracting debug logs from Kerio Control. Back to top   Proc...

  • Making a DHCP Reservation in Active Hosts

    Overview As an administrator, you can reserve an IP address (within the DHCP scope) based on the MAC address of active hosts in Kerio Control; this can be helpful when administrators want specific IP ...