Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Configuring Date, Time, Time Zone and Server Name for Kerio Control

    Overview Many Kerio Control features (user authentication, logs, statistics, etc.) require the correct setting of the date, time, and time zone on the firewall. Kerio Control allows manual settings or...

  • Creating Time Ranges in Kerio Control

    Overview Time ranges allow you to define time intervals for specific rules to be active. This article shares information about creating time ranges that can be configured and applied to various polici...

  • Customizing Page Title, Logo and Favicon in Kerio Control

    Overview Kerio Control allows you to customize a Logo, Page title, and Favicon on the login page that allows your users to access the internet, denial pages, and user alerts. However, the login pages ...

  • Defining User Quotas

    Overview Kerio Control allows configuring a limit for the volume of data a user is allowed to transfer. Furthermore, Kerio Control allows defining what happens once the quota is exceeded.  To define u...

  • Deny traffic to a particular user in Kerio Control

    Overview Traffic policy in Kerio Control consists of rules that are ordered by priority. Rules found at the top being are considered with high priority and are processed/applied first. In the default ...

  • Disabling 2-Step Verification in Kerio Control Statistics

    Overview If you lose your mobile device, ask your system administrator to disable the 2-step verification for you. If your administrator sets the 2-step verification as compulsory, you must enable it ...

  • Exclude Specific Users from SafeSearch in Kerio Control

    Overview Users can have problems with SafeSearch enabled. For example, SafeSearch can block an important web page with harmless content. If this happens, there is a way to exclude users from the SafeS...

  • Filtering HTTPS Connections

    Overview Kerio Control decrypts and filters HTTPS (Hyper Text Transfer Protocol Secure) connections. Filtering is the same as for the HTTP (Hyper Text Transfer Protocol). Kerio Control can apply the s...

  • Kerio Control System Alerts

    Overview All system alert messages are recorded in the Alert log. The Alert log provides a complete history of system alerts generated by Kerio Control: virus detection, dialing and hanging up, reache...

  • Modifying Static Routes In Routing Tables

    Overview Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic. Depending on the number of networ...