Basic Information FAQs Feature requests Limitations
Overview Please be aware that this feature is supported starting with the 9.4.2 release. This article shares information about Kerio Connect Multi-Server and its limitations. Kerio Connect Multi-Ser...
Overview User groups belong to a domain. Each domain may include any number of local and mapped groups. The number of groups is NOT limited by your license. Note: You can create local user groups an...
Overview This is an article explaining what is Kerio Connect Client and its features and will serve as a reading material if general information is required about Kerio Connect Client. In Kerio Conne...
Overview This article contains a few general examples of how to perform different types of data recovery on the Linux platform. Data Recovery Processes Full Backup Recovery Conditions The configurat...
This article describes the different ways of performing data recovery on Mac OS X for Kerio Connect. Note: You need Superuser privileges to run kmsrecover commands. From the Terminal app, run sudo s...
Overview Administrators can recover lost, deleted, or migrated data into the Kerio Connect installation. To recover the data, there should be a clean backup that was completed successfully. The data t...
Overview You can recover the lost, deleted, or migrated data into your Kerio Connect installation. To recover the data, you must have a clean backup that was completed successfully. The data you want ...
The Logs are files where Kerio Connect records information about certain events. These log files record relevant strings and information that are useful to both customers and support agents to identif...
Overview When an email is moved from the spam folder to the Kerio connect client inbox, the email subject has the ** SPAM ** tag removed on the server, but it is not removed in the local KOFF cache. T...
Overview Kerio Connect users are created locally or by mapping them from Active Directory (AD) and the authentication mechanism for them to login is used accordingly. SSO authentication mechanism is n...