Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities
Overview Logs are required every time we need a root-cause/deep-dive analysis on a reported issue. This article provides the guidelines for extracting debug logs from Kerio Control. Back to top Proc...
Overview As an administrator, you can reserve an IP address (within the DHCP scope) based on the MAC address of active hosts in Kerio Control; this can be helpful when administrators want specific IP ...
Overview If you do not want to use the automatic configuration of IP ranges, you can switch to the manual mode. However, note that changes of interfaces in the Trusted/Local Interfaces, Guest Interfac...
Overview In some situations, administrators may need to change the Kerio Control configuration directly. For example, this needs to be done when there is a need to adjust a setting that is not availab...
Overview Two or more users can access computers in the Kerio Control network simultaneously; this article covers the steps to require user authentication for each browser session, which allows Kerio C...
Overview A DHCP Server enables you to book an IP address for any host or MAC address. Reservations can be set in both scope configuration modes, manual, and automatic. Adding a reservation in the auto...
Overview Kerio Control does not provide any built-in SMTP server. Administrators who want to get alerts, notifications, statistics or reports to their mailbox can use MyKerio notification service or c...
Overview Each Kerio Control interface on the Internet, Trusted/Local, and Other Interfaces groups can be set up in either of two modes: Automatic – This mode is used if Kerio Control detects a DHCP se...
Overview Google services like Gmail and Gdrive have the following connection errors due to DNS Issues, and logs indicate packets dropped after the DNS queries: The server encountered an error. Please ...
Overview When troubleshooting advanced Directory Services, Strongswan, or IPsec VPN issues, it might be required to review and modify the internal configuration files. The advanced configs are stored ...