Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Reading the User's Activity

    Overview The User's activity tab shows detailed information about your browsing activities. You can see: What you were doing on the Internet during the selected period How much time you spent browsing...

  • Disabling TLS 1.0 on Kerio Control Box

    Overview Administrators may fail PCI compliance scans because the TLS 1.0 protocol is still enabled on the Kerio VPN port 4090. This version of TLS is affected by multiple cryptographic flaws. This ar...

  • Using WiFi Channels Above 140 in Kerio Control NG100W and NG300W Models

    Overview This article describes relevant information regarding the use of WiFi channels above 140 in Kerio Control NG100W and NG300W models; this information is pertinent to understand the reason for ...

  • Email and Drive Services Are Unstable with DNS Errors

    Overview Google services like Gmail and Gdrive have the following connection errors due to DNS Issues, and logs indicate packets dropped after the DNS queries: The server encountered an error. Please ...

  • Configuring Kerio Control's SMTP Server

    Overview Kerio Control does not provide any built-in SMTP server. Administrators who want to get alerts, notifications, statistics or reports to their mailbox can use MyKerio notification service or c...

  • Modifying Configuration Parameters in Kerio Control

    Overview In some situations, administrators may need to change the Kerio Control configuration directly. For example, this needs to be done when there is a need to adjust a setting that is not availab...

  • Making a DHCP Reservation in Active Hosts

    Overview As an administrator, you can reserve an IP address (within the DHCP scope) based on the MAC address of active hosts in Kerio Control; this can be helpful when administrators want specific IP ...

  • Extracting Debug Kerio Control Logs

    Overview Logs are required every time we need a root-cause/deep-dive analysis on a reported issue. This article provides the guidelines in extracting debug logs from Kerio Control. Back to top   Proce...

  • Creating Certificates Signed by Certification Authorities (CA) in Kerio Control

    Overview Using the certificate means that administrators have to select it in the specific settings, e.g.,  for SSL certificates for the VPN server, administrators need to select them by going to Inte...

  • Connecting Kerio Control to Other Domains

    Overview Once successfully connected to the primary domain, you can also connect Kerio Control to other domains. Click Microsoft Active Directory and Apple Open Directory to get a step-by-step guide o...