- Page 7 and 8: Monitoring Kerio Connect . . . . .
- Page 9 and 10: Configuring Caller ID and SPF in Ke
- Page 13 and 14: Installing Kerio ConnectProduct edi
- Page 15 and 16: 1.5 Linux — DEBExample:# rpm -i k
- Page 17 and 18: 1.6 Configuration WizardOn Windows
- Page 19 and 20: 2.2 Microsoft WindowsIf Kerio Conne
- Page 21 and 22: Uninstalling Kerio ConnectHow to un
- Page 23 and 24: Switching from 64-bit installation
- Page 25 and 26: 5.3 How to work with Kerio Connect
- Page 27 and 28: Accessing Kerio ConnectWhat interfa
- Page 29 and 30: 6.2 Kerio Connect administrationTo
- Page 31 and 32: Licenses in Kerio ConnectLicenses i
- Page 33 and 34: 8.2 Registering Kerio Connect in th
- Page 35 and 36: Accessing Kerio Connect administrat
- Page 37 and 38: 9.4 Creating administrator accounts
- Page 39 and 40: Domains in Kerio ConnectWhat are do
- Page 41 and 42: 10.4 Domains section in Kerio Conne
- Page 43 and 44: 11.3 Deleting domainsIn the Configu
- Page 45 and 46: 12.3 Connecting to directory servic
- Page 47 and 48: 12.4 Mapping usersNow you can map u
- Page 49 and 50: 13.3 Post-renaming issues4. Restart
- Page 51 and 52: Creating user accounts in Kerio Con
- Page 53 and 54:
15.3 Templates• set space quotas
- Page 55 and 56:
15.5 Troubleshooting4. Confirm.•
- Page 57 and 58:
16.2 Creating user groups3. On the
- Page 59 and 60:
Setting access rights in Kerio Conn
- Page 61 and 62:
17.3 Built-in administrator account
- Page 63 and 64:
18.3 How to recover deleted itemsIf
- Page 65 and 66:
18.5 How to limit size of incoming
- Page 67 and 68:
Creating mailing lists in Kerio Con
- Page 69 and 70:
19.3 Accessing the mailing list arc
- Page 71 and 72:
20.3 Importing from a directory ser
- Page 73 and 74:
Exporting users in Kerio ConnectWha
- Page 75 and 76:
Creating aliases in Kerio ConnectAl
- Page 77 and 78:
22.3 Username aliasesFigure 3Domain
- Page 79 and 80:
22.3 Username aliasesAlias for mess
- Page 81 and 82:
23.4 TroubleshootingTroubleshooting
- Page 83 and 84:
24.2 Monitoring incoming and outgoi
- Page 85 and 86:
24.4 Viewing statisticsViewing stat
- Page 87 and 88:
Services in Kerio ConnectSetting se
- Page 89 and 90:
25.2 What services are availableSin
- Page 91 and 92:
25.4 Troubleshooting3. Select a Use
- Page 93 and 94:
26.2 How to configure who can conne
- Page 95 and 96:
26.4 How to send outgoing messages
- Page 97 and 98:
Securing Kerio ConnectIssues to add
- Page 99 and 100:
27.4 Configuring secure connection
- Page 101 and 102:
28.3 Enabling anti-spoofing per dom
- Page 103 and 104:
Password policy in Kerio ConnectAbo
- Page 105 and 106:
29.4 Enabling password expiry (for
- Page 107 and 108:
Authenticating messages with DKIMAb
- Page 109 and 110:
30.2 Enabling DKIM in Kerio Connect
- Page 111 and 112:
31.2 Acquiring DKIM public key in K
- Page 113 and 114:
31.3 Creating a short DKIM public k
- Page 115 and 116:
Configuring spam control in Kerio C
- Page 117 and 118:
32.3 Monitoring spam filter’s fun
- Page 119 and 120:
Configuring greylistingWhat is grey
- Page 121 and 122:
33.4 What data is sent to Kerio Tec
- Page 123 and 124:
34.1 How to automatically block or
- Page 125 and 126:
Configuring Caller ID and SPF in Ke
- Page 127 and 128:
35.3 How to configure SPFFigure 2SP
- Page 129 and 130:
36.3 Defining actions for custom ru
- Page 131 and 132:
37.2 External antivirusExternal ant
- Page 133 and 134:
Filtering message attachments in Ke
- Page 135 and 136:
Using external antivirus with Kerio
- Page 137 and 138:
40.2 How to configure IP address gr
- Page 139 and 140:
Public folders in Kerio ConnectWhat
- Page 141 and 142:
42.4 Global Address ListAccount Ema
- Page 143 and 144:
43.2 Sending messages outside of yo
- Page 145 and 146:
43.7 Configuring IM clientsIf a use
- Page 147 and 148:
44.3 Configuring DNS records for cl
- Page 149 and 150:
45.2 Localizing the user interfaceI
- Page 151 and 152:
45.3 Additional settings for old We
- Page 153 and 154:
Configuring data store in Kerio Con
- Page 155 and 156:
47.3 Data store sizeDo not use a UN
- Page 157 and 158:
48.2 Configuring archivingFigure 1A
- Page 159 and 160:
Backups in Kerio ConnectWhat backup
- Page 161 and 162:
49.4 Recovering data from backupsNo
- Page 163 and 164:
50.2 Examples for Microsoft Windows
- Page 165 and 166:
50.3 Examples for Mac OS XRecovery
- Page 167 and 168:
51.1 Recovering data from backupAdv
- Page 169 and 170:
51.2 Backup filesBackup filesFile n
- Page 171 and 172:
Configuring SSL certificates in Ker
- Page 173 and 174:
52.4 Intermediate certificatesukrkD
- Page 175 and 176:
53.3 Types of logsTypes of logsConf
- Page 177 and 178:
Kerio Active Directory ExtensionHow
- Page 179 and 180:
55.4 TroubleshootingIn Kerio Connec
- Page 181 and 182:
56.3 Remotely deleting data from a
- Page 183 and 184:
Support for BlackBerry devices in K
- Page 185 and 186:
58.3 Switching from old WebMail to
- Page 187 and 188:
59.2 Used open source softwareSpamA
- Page 189 and 190:
59.2 Used open source softwareICU (
- Page 191:
PHPPHP is a widely-used scripting l