Activity logs Accesses HowTo's/Configuration Reporting
Overview Kerio Connect applies outgoing rules to all the messages that Kerio Connect sends to the local or remote recipients. These rules are applied after the Incoming rules and before the User filte...
Overview When deleting or moving items through IMAP protocol, the designed behavior is to mark messages for the performed action. The resulting behavior in some IMAP clients is to display these marked...
Overview After migrating Kerio Connect to a new system, the administrator tries to start the service and logs in using the account used to access the source server. The service fails to start. This m...
Overview One of your users reports not seeing any content in their mailbox or missing certain content, despite having the content in their mail store folder on the backend. Within the Webadmin, you re...
Overview Strong user passwords should be long and complex. This is intended for the benefit of both the end user and for app protection purposes. IMPORTANT: Any shared password must be changed immedia...
Overview For performance optimization, you can limit the size of the outgoing messages sent by users. By default, new users inherit settings from their domain. But you can change the settings for indi...
Overview For performance optimization, administrators can limit the size of outgoing messages sent by users in a particular domain; this article provides the steps for administrators to achieve this i...
Overview While sending Calendar invitation with assigned Resource or Room, the event subject (summary) is not displayed automatically. Personal calendars cannot obtain this information because of secu...
Overview The Deleted Items Recovery is a soft-delete mechanism that allows administrators to help end users recover accidentally deleted emails. This article provides instructions to recover deleted i...
Overview Kerio Connect administrator of the company can recover public folders of a particular domain on Linux if it’s accidentally deleted or corrupted. NOTE: - The configuration data is stored at t...