Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities
Overview Many Kerio Control features (user authentication, logs, statistics, etc.) require the correct setting of the date, time, and time zone on the firewall. Kerio Control allows manual settings or...
Overview Time ranges allow you to define time intervals for specific rules to be active. This article shares information about creating time ranges that can be configured and applied to various polici...
Overview Kerio Control allows you to customize a Logo, Page title, and Favicon on the login page that allows your users to access the internet, denial pages, and user alerts. However, the login pages ...
Overview Kerio Control allows configuring a limit for the volume of data a user is allowed to transfer. Furthermore, Kerio Control allows defining what happens once the quota is exceeded. To define u...
Overview Traffic policy in Kerio Control consists of rules that are ordered by priority. Rules found at the top being are considered with high priority and are processed/applied first. In the default ...
Overview If you lose your mobile device, ask your system administrator to disable the 2-step verification for you. If your administrator sets the 2-step verification as compulsory, you must enable it ...
Overview Users can have problems with SafeSearch enabled. For example, SafeSearch can block an important web page with harmless content. If this happens, there is a way to exclude users from the SafeS...
Overview Kerio Control decrypts and filters HTTPS (Hyper Text Transfer Protocol Secure) connections. Filtering is the same as for the HTTP (Hyper Text Transfer Protocol). Kerio Control can apply the s...
Overview All system alert messages are recorded in the Alert log. The Alert log provides a complete history of system alerts generated by Kerio Control: virus detection, dialing and hanging up, reache...
Overview Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic. Depending on the number of networ...