The Logs are files where Kerio Connect records information about certain events. These log files record relevant strings and information that are useful to both customers and support agents to identify errors and exceptions. This article explains each log type and the kind of information it provides that is relevant to troubleshooting.
The Config log keeps a complete history of configuration changes. It tells you which user performed individual administration tasks and when.
The Debug log monitors various kinds of information and is used for problem-solving.
The Mail log contains information about individual messages processed by Kerio Connect.
The Security log contains information related to Kerio Connect's security. It also contains records about all messages that failed to be delivered.
The Warning log displays warning messages about errors of little significance. Events causing display of warning messages in this log do not greatly affect Kerio Connect's operation. However, they can indicate certain (or possible) problems. For example, the Warning log can help if users complain that certain services are not working.
The Operations log gathers information about removed and moved items (folders, messages, contacts, events, tasks, and notes) in user mailboxes. It is helpful especially if a user cannot find a particular message in their mailbox.
The Error log displays errors of great significance that usually affect the mail server's operation (in contrast to the Warning log). Typical error messages displayed in the Error log concern service initiation (usually due to port conflicts), disk space allocation, antivirus check initialization, improper authentication of users, and so on.
The Spam log displays information about all spam emails stored (or marked) in Kerio Connect.
The Audit log displays information about all successful authentication attempts to Kerio Connect accounts, including Kerio Connect Administration, Kerio Connect Client, Microsoft Outlook with KOFF, etc. This is a new log type available in Kerio 9.
To get these logs on a Windows-based deployment, please take a look at the Collecting KOFF and KCC Logs on Windows KB Article.