Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities
Overview When using Avid Huddle integrated with Microsoft Teams for video review sessions, users may experience video freezing issues. This can occur due to improper configuration of network traffic r...
Overview When using Kerio Control, you may encounter issues where legitimate websites are blocked due to content filter rules. This can result in an Access Denied banner appearing for users. The issu...
Overview Kerio Control has recently gained a new Watchdog feature in the latest version 9.4.5. The Watchdog monitors all key services of GFI KerioControl, and in case of any irregularities, it restore...
Overview This article provides the required steps to configure access rights in Kerio Control. This procedure is helpful for administrators when implementing the access right access scheme within Keri...
Overview If you have a Kerio Control Web Filter license, you can block unwanted sites like Facebook or other social media with the Application awareness. Step by step guide In this article, we will us...
Overview To apply a protocol inspector explicitly to other traffic, administrators must edit or add a new service where this inspector is to be used. This article provides information to configure Pro...
Overview DDNS is a service providing the automatic update of the IP address in the DNS record for the particular hostname. Kerio Control allows configuring Dynamic DNS for 3 different providers, such ...
Overview The DHCP protocol assigns IP addresses. Apart from these addresses, you can also send additional parameters via the DHCP protocol. Parameter 66 configures the TFTP server address. Back to t...
Overview Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rules are focused on special protocols on standard and frequently used ports. If an ...
Overview Limiting the number of TCP and UDP connections within your network helps protect your business against denial of service (DoS) attacks. You can set connection limits based on: A source IP add...