3
Contents1Introduction ............................................................... 5
2QuickChecklist ............................................................ 7
3TechnicalInformation ...................................................... 9
3.1 Kerio Network Monitor Components ................................... 9
3.2 How does Kerio Network Monitor work? ................................ 9
3.3 TechnicalLimitations ............................................... 12
4Installation............................................................... 15
4.1 UpgradeandUninstallation .......................................... 16
4.2 ImportingtheLicenseKey ........................................... 16
5ProgramControl ......................................................... 19
5.1 LoggingintheViewer ............................................... 19
5.2 ControllingtheService .............................................. 20
5.3 InitialConfiguration ................................................. 21
6Configuration ............................................................ 23
6.1 IPAddressesRanges ................................................ 23
6.2 MonitoredServices .................................................. 27
6.3 UserAccounts ...................................................... 29
6.4 LogSettings ........................................................ 32
6.5 ProtocolMonitoringParameters ..................................... 34
6.6 WWWInterfaceParameters .......................................... 35
6.7 AdditionalSettings .................................................. 37
7Viewing and Analysis of CapturedData . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.1 ListofComputers ................................................... 42
7.2 Trafficchart ........................................................ 45
7.3 CurrentConnections ................................................ 46
7.4 TreeofScannedData ................................................ 49
7.5 StatusInformation .................................................. 51
7.6 TransferredDataVolumeTable ...................................... 53
7.7 LogWindows ....................................................... 55