|
Gfi software HelpBog'liq kerio-control-userguide ШАХСИЙ РЕЖА KITOBCHA, истиқболли режа З.Бозоров, Informatika 7-sinf. 1-Mavzu axborot tushunchasi va bilish haqid, AXBOROT TUSHUNCHASI VA BILISH HAQIDA, 7-sinf, Ta`lim muassasasi menejmenti Reja, Pedagogik mahorat. Mavlonova, Sinfdan tashqari o‘qish uchun mavzular bo‘yicha badiiy asarlar ro‘yxatini tuzish, TUG’ILISH DAVRI INQIROZI, 6277 403 5112000-Жисмоний маданият узбек 2021, “Bir million dasturchi”, 1-mavzu amaliy hemis, 8742dd91-7cd2-429e-adb3-a15c062acb18, 270dc967-8e4e-40e0-8914-aa118f3de539Contents
1 Introduction
4
2 Kerio Control Statistics
5
2.1 Managing your Kerio Control Statistics account
5
2.1.1 Accessing the web interface
5
2.1.2 Switching between Kerio Control Statistics and account settings
6
2.1.3 Reading statistics and reports
6
2.1.4 Setting up 2-step verification
6
2.1.5 Checking your quota
6
2.1.6 Changing your password
7
2.1.7 Setting a language for Kerio Control Statistics and email reports
7
2.2 Reading managerial statistics and reports in Kerio Control
8
2.2.1 Reading the summary report
10
2.2.2 Reading individual statistiscs
17
2.2.3 Special users in Kerio Control Statistics
17
2.3 Viewing activity reports in Kerio Control Statistics
18
2.3.1 Accessing the web interface
18
2.3.2 Switching between Kerio Control Statistics and account settings
19
2.3.3 Displaying Kerio Control Statistics
19
3 Kerio Control VPN Client
24
3.1 Installing and configuring Kerio Control VPN Client for users
24
3.1.1 System requirements
24
3.1.2 Prerequisites
24
3.1.3 Kerio Control VPN Client for Windows
25
3.1.4 Kerio Control VPN Client for OS X
26
3.1.5 Kerio Control VPN Client for Linux
29
3.1.6 Troubleshooting
29
3.2 Deleting VPN client entries on OS X
29
3.3 Upgrading Kerio VPN Client for OS X 10.9.5, OS X 10.10 and later
30
3.3.1 Upgrading Kerio VPN Client
30
4 Authenticating with 2-step verification
31
4.1 Enabling the 2-step verification
31
4.2 Disabling the 2-step verification
33
4.3 Enabling the 2-step verification when you use Kerio Control VPN Client
34
4.4 Enabling the 2-step verification when you use IPsec VPN client
34
www.gfi.com
1 Introduction
|
| |